Identity Theft and Solutions: Research for the Future Dr. Milena Head Associate Professor Director, McMaster eBusiness Research Centre (MeRC) McMaster.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

FRAUD PREVENTION TRAINING FRAUD PREVENTION TRAINING.
My Name is Todd Davis My Social Security # is
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Protecting Yourself from Fraud including Identity Theft
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
FDIC Money Smart for Young Adults
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Fastest Growing Crime in America. IDENTITY THEFT IS COSTING YOU BIG MONEY. 10 million people are effected by identity theft each year. More than 46 million.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
Identity theft By: Blake D uncan.
Simon’s Situation… When Simon lost his wallet, he thought it was a pain. He had over $50 in it, and his driver’s license and bank card. The next day he.
2015 ANNUAL TRAINING By: Denise Goff
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Identity Theft Andrew Schreiber Alex Demetriou Jessica Ferrell.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft The Dangers Involved and How It Affects You!
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
You. are at risk for the fastest growing crimes crime.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
BBB IDENTITY THEFT By Blake Bowland Computers III.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Identity Theft How bad people get good credit. Lindsey Bertugli.
Protecting Your Credit Identity
Add video notes to lecture
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity:
Tax Identity Theft Presenter Date
When you get caught for Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Identity Theft and Solutions: Research for the Future Dr. Milena Head Associate Professor Director, McMaster eBusiness Research Centre (MeRC) McMaster University

What is Identity Theft? Any impersonation or misappropriation of an individual's identity

Misusing personal information to … Open a telephone account Lease an apartment Open new credit cards Obtain passports Fill out legal documents Take out loans

What are the implications for victims?  Possible loss of money … and more importantly … reputation  False credit reports that can be difficult to correct  Average cost per victim is $740 US  The average time spent by victims is about 600 hours  Lost opportunities  False arrests  Emotional impact of identity theft has been found to parallel that of victims of violent crime

How big is the problem?  7 million Americans (3.4% of consumers) were victims of IDT during the 12 months ending June % increase from previous year! FTC states IDT is America’s fasting growing crime  Annual cost in the US is $53B (2003)  In Canada, over 600,000 victims during 2003 (3% of consumers)  Annual cost in Canada is $21.5M (2003)

How are identities stolen?  34% : obtained or forged credit card  12% : obtained improperly a paper or computer record with personal information.  11% : stole wallet or purse.  10% : opened charge accounts in stores.  7% : opened a bank account or forged cheques.  7% : got to mail or mailbox.  5% : lost wallet or purse.  4% : went to a public record.  3% : created false IDs.

How is this happening?  Dumpster diving  Shoulder surfing  Bribing  Spyware  Hacking  Online searching of publicly available data  Phishing and spoofing Designed to fool recipients into divulging personal information Example: password verification request sent by a victim’s “bank” Example: fake listings on Monster.com

Who are the thieves? A true story …  Michelle Thibodeau of Worcester, Mass. took her 16-year old son to get his learner’s permit  He already had a driver’s license!  Photo on the license was his father … in jail  Teen started getting notices that he was delinquent in his child support  DoR seized part of his grocery store bagger paycheques  After a year of frustration, had to apply for a new SSN (implications for getting college loans)

Who are the thieves?  Should we just be concerned about hackers? NO!  Most identities stolen from trusted insiders who already have easy access to private information … 70%!  Acquaintances, friends … even family … 16%!

Theory of Human Identification  “Knowledge-based” identification In possession of information which only that person would be expected to know  “Token-based” identification Recognized by possession of some item  “Biometric” identification Variety of identification techniques which are based on some physical and difficult-to- alienate characteristics

Are we careless about our private information? Careless disposal of private information Careless protection of private information In a word … YES

Careless protection of private information  Passwords are a very weak form of protection Let’s have an HONEST show of hands 80% select a common password where possible 67% rarely or never change their passwords 49% of heavy computer users (more than 10 passwords) write them down Willing to compromise for a “bribe”!  Not isolated to passwords

Careless disposal of private information  People increasingly are learning to destroy paper-based information that can lead to privacy and security breaches But still a major issue  Often don’t think to “shred” the data stored at various locations within the computer

Yes, we can be more careful. Is it all our fault? Procedures and processes are careless Organizations are careless In a word … NO

Careless business & government practices  Sloppy security practices  Easy credit  Greater access to personal information  Widespread use of SIN as unique customer identifier  Increasing commercial trade in personal consumer information And a good policy is not enough!

Theory of Human Identification  “Knowledge-based” identification In possession of information which only that person would be expected to know  “Token-based” identification Recognized by possession of some item  “Biometric” identification Variety of identification techniques which are based on some physical and difficult-to- alienate characteristics

The clever identity thief …  Knows personal information AND  has physical items  Tokens can be stolen and altered OR  manufactured

Theory of Human Identification  “knowledge-based” identification In possession of information which only that person would be expected to know  “Token-based” identification Recognized by possession of some item  “Biometric” identification Variety of identification techniques which are based on some physical and difficult-to- alienate characteristics

The promise … … to unequivocally identify individuals The hurdles … … technology, infrastructure, privacy

Stakeholders Identity Protector Identity Issuer Identity Checker Identity Owner Identity Thief From Wang, Yuan and Archer (2004)

Stakeholders Identity Protector Identity Issuer Identity Checker Identity Owner Identity Thief  Role Legally own and use ID  Responsibilities Safeguard ID Fast victim recovery to reduce loss Legally use ID

Stakeholders Identity Protector Identity Issuer Identity Checker Identity Owner Identity Thief  Role Authenticate and issue ID  Responsibilities Issue secured certificates Protect ID certificate & information Protect ID owner and checker

Stakeholders Identity Protector Identity Issuer Identity Checker Identity Owner Identity Thief  Role Authenticate ID and provide services  Responsibilities ID authentication Provide services to real ID owner Protect ID information Protect ID owner

Stakeholders Identity Protector Identity Issuer Identity Checker Identity Owner Identity Thief  Role Protect and prosecute  Responsibilities Legislate Enforce laws Protect ID owners Educate and guide Provide technical solutions Record and track complaints and detect trends

IDT Prevention Activities Identity Protector Identity Issuer Identity Checker Identity Owner Identity Thief Guidance Education Guidance IDT Alert Self Protection Prevention Policies & Tech Prevention Policies & Tech.

What research is needed? But first a bit about ….

McMaster eBusiness Research Centre (MeRC)  Established in 2000  Part of the Ontario Research Network in e- Commerce (ORNEC)  How we define eBusiness We believe that the “e” will disappear. We are focused on business innovation in the networked economy  Our mission: focus on research, education and outreach

Research  Interdisciplinary research  Research groups have developed expertise in areas of: Identity Theft Privacy Security Trust Consumer Behaviour Mobile Commerce eHealth Portals Online Negotiation Supply Chain Management Interface Design eLearning Change Management Knowledge Management among others …

Education  Providing graduates with the managerial and technical knowledge demanded and necessary in the electronic marketplace Undergraduate eBusiness courses eBusiness MBA specialization PhD (currently 12 candidates engaged in eBusiness research)  Co-op, internship, full time placements  Opportunities for course projects

Outreach  Providing an interface to facilitate dialogue between academics and business leaders  Distributing research papers and reports  eBusiness Seminar series  Industry speakers in the classroom  On-site executive training programs  On-line courses for SMEs  Supply Chain Symposium  World Congress Conference  eCase Competition

Ontario Research Network for Electronic Commerce (ORNEC)

Initial Researchers ClusterNumber Law12 Business56 Technology12 Total80

Ontario Research and Development Fund (ORDCF)  1/3 private sector, 1/3 institutions, 1/3 ORDCF

ID Theft as a Flagship Project Funds assigned by the ORNEC Board of IDT …. 3 Expressions of Interest developed $1.9 Million!

Project 1: Defining and Measuring IDT  Scattered and incomplete Canadian data  Research questions: What types of stats should be gathered? How? How can businesses be encouraged to report IDT? How can technology help to gather stats? What are the various jurisdictions doing? What is the magnitude and nature of IDT? What are the real costs of IDT to consumers, businesses, governments, and the economy?

Project 2: Management Approaches to Combating IDT  Research questions: How does IDT affect trust? What are the direct and indirect costs? What are the risks? What is the “business case” for stakeholders? Are current policies & practices effective? What are the “leak-points”? What are the costs/benefits of countermeasures? What is the effectiveness of various multi- party approaches? How can employee attitudes be improved?

Project 3: Technical Tools to Address IDT  Some available technical solutions: digital signatures, PKI, smartcards, biometrics  Research questions: How effective are alternative tech solutions? What is the impact on privacy and other social values? How can security systems be designed to give consumers informed choice in the level of security they are provided? Who will manage biometric information? How can reputation management systems build trustworthiness? How can user profiling effectively detect IDT?

Is there anything positive we can say about identity theft? It’s a fruitful area for research!

And the last word by William Shakespeare … Who steals my purse steals trash… But he that fliches from me my good name.... makes me poor indeed - from Othello

Thank you Milena Head