ID theft: A computer forensics' investigation framework

Olga Angelopoulou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The exposure of online identities grows rapidly nowadays and so does the threat of having even more impersonated identities. Internet users provide their private information on multiple web-based agents for a number of reasons, online shopping, memberships, social networking, and many others. However, the number of ID Theft victims grows as well, resulting to the growth of the number of incidents that require computer forensics investigation in order to resolve this type of crime. For this reason, it appears of value to provide a systematic approach for the computer forensics investigators aiming to resolve such type of computer based ID Theft incidents. The issues that demand individual examinations of this type of crime are discussed and the plan of an ID Theft computer forensics investigation framework is presented.

Original languageEnglish
Title of host publicationProceedings of the 5th Australian Digital Forensics Conference
Pages67-78
Number of pages12
Publication statusPublished - 2007
Event5th Australian Digital Forensics Conference - Perth, WA, Australia
Duration: 3 Dec 20073 Dec 2007

Conference

Conference5th Australian Digital Forensics Conference
Country/TerritoryAustralia
CityPerth, WA
Period3/12/073/12/07

Keywords

  • Computer crime
  • Computer forensic investigator
  • Computer forensics
  • Digital evidence
  • Id theft
  • Incident investigation

Fingerprint

Dive into the research topics of 'ID theft: A computer forensics' investigation framework'. Together they form a unique fingerprint.

Cite this