Cyber Identity Theft: A Conceptual Model and Implications For Public Policy Angeline G. Close, UGA/NGCSU George M. Zinkhan, UGA R. Zachary Finney, NGCSU.

Slides:



Advertisements
Similar presentations
Ethical Hacking Introduction. EC-Council Introductions Name Company Affiliation Title / Function Job Responsibility System security related experience.
Advertisements

Neofunctionalism Ernst Haas. Assumptions (i) Regional basis (ii) Central institutions crucial (iii) Advanced industrial societies (iv) International/domestic.
Neofunctionalism Ernst Haas Initial critical encounter Schmitter & Lindberg Obsolescent?
Hamlet /Media Outline. I. Thesis Statement: (Director)s To be or not to be and (director)s Alas poor Yorick best exemplify William Shakespeares original.
DOCUMENTATION COMMITTEE I.INTRODUCTORY PAGE A. NAME AND ADDRESS OF BUSINESS (include LOGO and Tagline) B. NAME(S) AND ADDRESS(ES) OF PRINCIPALS webpage.
Identity Theft Ta’Mar Boyd Adam Devin. What is Identity Theft  Identity theft occurs when someone uses your personally identifying information, like.
Introduction and Overview of Digital Crime and Digital Terrorism
Decisions of the Parties Related to Essential Use Nominations (EUNs) Ozone Secretariat 6 July 2008 Bangkok.
My Name is Todd Davis My Social Security # is
Disclaimer The presentation is intended for educational purposes only and does not replace independent professional judgement. Statements of fact and opinions.
Fourth Annual Ecotourism Conference
Identity Theft Stefany K. Watson Brandon K. Mosley.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Investment Management_Year IV Prepared by Ra Chanroat 1 CAMBODIAN UNIVERSITY FOR SPECIALTIES saklviTüal½y ÉkeTsénkm
Public Health Bill 2014 An exciting time for public health in WA.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
1 Series RLC Resonant Circuit V s = 10 Vrms, R = 10 , L = 100 mH, C = 10  F VsVs R L C I + V R - + V L - +VC-+VC-   (varied) Assignment #1: Part.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Electronic Transaction Use & Risk of Identity Theft.
Government Promotion Schemes. Central Government Incubation centres – 100 with a budget of Rs lakhs per BI Host Institutions i) Indian Institutes.
Roman Numerals. Roman Numerals - Past and Present  Romans used them for trading and commerce.  When Romans learned to write they needed a way to write.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Financial Service 1. Definition under the Services Sectoral Classification List W/120, Section 7.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
November 209-April 2010 “EU public administration and implementation of EU regional policy and rural development in V- 4 countries” Project No /IVF/2009.
PowerPoint Presentation  Section 8.2  Pages
On-Line Marketing Fall 2000 Dr. Ugur Yucelt MWF 2:00-2:50
Consumer Health. I. Consumer A person who buys or uses products or servicesA person who buys or uses products or services.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
People, Places and Partnerships: Keys to Success National Extension Tourism Conference Orlando, Florida September 28, 2004 By James A. Maetzold Natural.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Identity Theft Project Erin L. Caraway Jacob Locke.
DATA REPRESENTATION, DATA STRUCTURES AND DATA MANIPULATION TOPIC 4 CONTENT: 4.1. Number systems 4.2. Floating point binary 4.3. Normalization of floating.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Barry J. Koestler II, CFA Chief Ratings Officer, Demotech, Inc. October 27, 2011.
The Perfect Economic Storm. Figure I AVERAGE WEEKLY EARNINGS GROWTH BY OCCUPATION,
- Existing Multilateral Disciplines on Trade in Services First agreement of multilateral and legally-enforceable rules aimed at the liberalisation of trade.
Roman Numeral Multiplication Quiz
Global and China Underfloor Heating Industry Report 2015 Website : No of Pages: 231 Published: November 2015 Single User PDF: US$ 2800.
Agriculture and Rural Development SFC2014 structured approach DG Agriculture and Rural Development G.2 - Unit "Financial coordination of Rural development"
NS4054 Fall Term 2014 Climate Change, Energy and Security.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
What is History? Presentation #3 Mr. Bridgeo. How do we measure or retrace the evolution of societies? The unit of time that historians use to measure.
(I) New EC definition and new 2003 Regulations LACORS welcomes new EC meat definition Provides improved consumer information Pragmatic, flexible enforcement.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Report on 12 th Session of WIPO SCP Casey An APAA Patents Committee meeting, Oct. 19, 2008, Singapore.
Chapter 40 The Resurgence of Conservatism, 1980–1992.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
7.0 Project Cycle Preamble Whether it is an investment or servicing project, every project is expected to take off with initiation of ideas and creation.
County and District Clerk’s Association 101
MGMT 452 Corporate Social Responsibility
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Flow diagrams (i) (ii) (iii) x – Example
Introduction to Youth Apprenticeship
3. Old Brain I III II V IV VII VI VIII IX X XII XI
Terry’s Code of Ethics for Bus Service Contractors
Protecting Yourself from Fraud including Identity Theft
County and District Clerk’s Association 101
Registered Apprenticeship Youth Apprenticeship
Protecting Yourself from Fraud including Identity Theft
NS4960 Spring Term 2018 Climate Change, Energy and Security
Roman Numerals.
Roman numerals -Rules for writing.
International Marketing
Protecting Yourself from Fraud including Identity Theft
Roman Numerals.
I II III IV V VI VII VIII IX X XI XII XIII XIV XV XVI
Presentation transcript:

Cyber Identity Theft: A Conceptual Model and Implications For Public Policy Angeline G. Close, UGA/NGCSU George M. Zinkhan, UGA R. Zachary Finney, NGCSU

A 1957 Sylvester & Tweety Cartoon Image source: davemackey.com

Identity Theft Most common classification of consumer complaints to FTC (42%) Victimization costs beyond $ Growing problem attributed to the emergence of the e-marketplace Top online fraud (FBI 2003) Re-appraisals of research & public policy are needed

Cyber Stalkers Laughing Behind the Screen…For Now Image Source: greenberg-art.com

Objectives 1) Introduce 3 classification schemes, which synthesize conceptualizations of ID theft and the Internet: a) methods, b) time-frame, c) victims behavioral responses 2) Recognize key issues & regulations related to public policy and consumer welfare

Cyber ID Theft Defined Online or electronic acquisition of personal information with the purpose of utilizing such information for deceitful activity either on the Internet or offline Using electronic (i.e., web-based) means to carry out any form of identity theft

Cyber Identity Theft: An E-Merging Public Policy Issue Process Schemes Time-Frame Victim Response

Cyber ID Theft Process Table 1 Methods of Cyber- ID Theft Cyber- Identity Theft Figure 2 (lower) ID Theft Recurs Figure 2 (Upper) ID Theft Does Not Recur Table 2 Victim Reacts Table 3 Public Policy Issues

Cyber ID Theft Schemes: Broad Scope

Cyber ID Theft Schemes: Narrow Scope

Cyber ID Theft Time Frame

Cyber- ID Theft Victim Response

An Atypical Response Image Source: glasbergen.com

A More Extreme Response: Serious Password Strategy Image Source: glasbergen.com

Public Policy & Consumer Welfare I.Dissemination of cyber identity theft methods II.Employee access to data and associated potential for misuse III. Credit-reporting bureaus IV. The inherent difficulty associated with proving you did not commit acts

Public Policy & Consumer Welfare V.Regulation of data exchanges VI.Uses of marketing databases VII. Use of data by financial institutions VIII. Liability issues IX. Assisting cyber identity theft victims

Public Policy & Consumer Welfare X.Expanding public education/ awareness XI. Educating the populace so that overall crime rates decline XII. Effective criminal enforcement XIII. Risk analysis & risk assessment XIV. What are the specific costs for consumers?

Public Policy & Consumer Welfare XV. What are the costs for business (at the firm level and the industry level)? What are the threats to our economic system? XVI. What are the best ways to promote safety tips and improved technologies? XVII. What are the best media for implementing education or remedial programs? XVIII. What are the best ways to reform identify thieves?

Regulation The Identity Theft and Assumption Deterrence Act (governmental): 1) allows victims of identity theft to recover financial damages 2) imposes criminal penalties of <15 years imprisonment & fines of < $250,000 3) directs the FTC to enforce the act

Regulation The Coalition on Online Identity Theft (corporate- based): 1) expands public education campaigns, promoting technology and tips for preventing and dealing with online theft 2) documents and shares non-personal information about emerging online fraudulent activity to prevent future scams 3) works with the government to ensure effective enforcement of criminal penalties against cyber thieves

Information Paradox Image Source: glasbergen.com

Cyber ID Theft and the Market A threat to economic systems, e-commerce- demanding scholarly, practitioner and regulatory attention/ action Citibanks ID Theft Page TV Campaign

Reclaim Cyberspace A broader change in human identity Another paradox of technology Researchers have an important role to play in suppressing cyber-identity theft in the future. Reclaiming cyberspace as a means of enhancing and enriching (our own) human experiences