An approach to managing identity fraud

Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

2 Citations (Scopus)

Abstract

This chapter outlines components of a strategy for government and a conceptual identity fraud enterprise management framework for organizations to manage identity crime occurring via cyberspace. Identity crime, related cybercrimes and information systems security breaches are insidious motivators for governments and organizations to protect and secure their systems, databases and other assets against intrusion and loss. Managing identity crime is a critical step in cyber security and global information assurance. Strategy components and conceptual model elements are constructed through analysis and synthesis of models from academic literature, and reports by industry and government professionals. A comprehensive government strategy with a legislative component reinforces organizational policies to combat identity crimes. Model components used to develop our identity fraud organizational framework were selected from cost of identity fraud, identity risk management, identity fraud profiling, and fraud risk management literature. Our framework is organized into anticipatory, reactionary and remediation phases.
Original languageEnglish
Title of host publicationCyber security and global information assurance
Subtitle of host publicationThreat Analysis and Response Solutions
EditorsKenneth J Knapp
Place of PublicationHershey, PA
PublisherInformation Science Reference
Pages233-248
Number of pages16
ISBN (Print)9781605663265
DOIs
Publication statusPublished - 2009

Fingerprint

Dive into the research topics of 'An approach to managing identity fraud'. Together they form a unique fingerprint.

Cite this