Escolar Documentos
Profissional Documentos
Cultura Documentos
Identity Theft
Most common classification of consumer complaints to FTC (42%) Victimization costs beyond $ Growing problem attributed to the emergence of the e-marketplace Top online fraud (FBI 2003) Re-appraisals of research & public policy are needed
Objectives
1) Introduce 3 classification schemes, which synthesize conceptualizations of ID theft and the Internet: a) methods, b) time-frame, c) victims behavioral responses 2) Recognize key issues & regulations related to public policy and consumer welfare
Schemes
Time-Frame
Multi-time
Unauthorized use of anothers e-mail Consistent use of SSN to obtain new, fraudulent document(s)
Recurring
Consistent use of Photo to impersonate
e-tailers
Retailers
e-commerce; e-dating
Shopping; credit card use Requesting to check identification for credit card purchases
Security checks
An Atypical Response
Regulation
The Identity Theft and Assumption Deterrence Act (governmental): 1) allows victims of identity theft to recover financial damages 2) imposes criminal penalties of <15 years imprisonment & fines of < $250,000 3) directs the FTC to enforce the act
Regulation
The Coalition on Online Identity Theft (corporatebased): 1) expands public education campaigns, promoting technology and tips for preventing and dealing with online theft 2) documents and shares non-personal information about emerging online fraudulent activity to prevent future scams 3) works with the government to ensure effective enforcement of criminal penalties against cyber thieves
Information Paradox
Reclaim Cyberspace
A broader change in human identity Another paradox of technology Researchers have an important role to play in suppressing cyber-identity theft in the future. Reclaiming cyberspace as a means of enhancing and enriching (our own) human experiences