Logo image
Understanding victim-enabled identity theft
Conference paper   Peer reviewed

Understanding victim-enabled identity theft

David Lacey, Jim Zaiss and K Suzanne Barber
2016 Fourteenth Annual International Conference on Privacy, Security and Trust, pp.196-202
Annual Conference on Privacy, Security and Trust (PST), 14th (Auckland, New Zealand, 12-Dec-2016–14-Dec-2016)
IEEE Publishing Inc.
2017
url
https://doi.org/10.1109/PST.2016.7906926View
Published Version

Abstract

identity theft iTunes Personally Identifable Information (PII) telephone scams victimisation
Victim-enabled identity theft is a crime in which an individual victim is deceived into providing their personally identifying information (PII) to a criminal to facilitate its theft and/or misuse. In this paper we analyse a particular victim-enabled tax-related identity theft scheme recently reported in Australia, which has also been reported, in a slightly different guise, in the US. We find that this scheme, and others like it, are best understood when studied from both the perpetrator's and the victim's points of view. The criminal perspective and business practices have been captured and analysed in the Identity Threat Assessment and Prediction (ITAP) model developed by the Center for Identity at The University of Texas (UT CID). The victim perspective has been captured from multiple victim case files captured by IDCARE. The research findings support the view that combining perspectives enhances the analytical value of a threat assessment and prediction model. The multi-actor nature of victim-enabled identity theft complements the methodological approach adopted in the paper, and provides new insights on a growing form of identity theft that can inform future prevention and detection response strategies. © 2016 IEEE.

Details

Metrics

4 File views/ downloads
505 Record Views
Logo image