Cyber Identity Theft

Cyber Identity Theft

Lynne D. Roberts (Curtin University of Technology, Australia)
Copyright: © 2012 |Pages: 16
DOI: 10.4018/978-1-61350-323-2.ch103
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Information and communication technologies (ICTs) provide substantial benefits to governments, organizations and individuals through providing low cost, instantaneous, global communication capabilities. However, an unintended consequence of these new technologies is their use for criminal purposes. The technology can be used as the mechanism for organizing and committing criminal activity and as a means of protecting criminals against detection and punishment. Cyber identity theft is an internationally recognized problem resulting from the introduction of new information technologies. This chapter provides an overview of cyber identity theft and related fraud, describing the impact of cyber identity theft on governments, organizations, law enforcement agencies and individuals. Methods currently being used, or proposed, to combat cyber identity fraud are outlined and the potential impact of these examined. The tension between using technological solutions to reduce cyber identity theft and privacy and civil liberties concerns is explored.
Chapter Preview
Top

Identity Theft, Identity Fraud And Identity Crime

Identity theft involves the theft of legal identity, manifest in identity tokens such as SSNs, documents or knowledge of factual information that identifies an individual. That is, it is the theft of a pre-existing identity for use in presenting oneself as somebody else (Finch, 2003; Australasian Centre for Policing Research, 2006).

Complete Chapter List

Search this Book:
Reset