Abstract
The exposure of online identities grows rapidly nowadays and so does the threat of having even more impersonated identities. Internet users provide their private information on multiple web-based agents for a number of reasons, online shopping, memberships, social networking, and many others. However, the number of ID Theft victims grows as well, resulting to the growth of the number of incidents that require computer forensics investigation in order to resolve this type of crime. For this reason, it appears of value to provide a systematic approach for the computer forensics investigators aiming to resolve such type of computer based ID Theft incidents. The issues that demand individual examinations of this type of crime are discussed and the plan of an ID Theft computer forensics investigation framework is presented.
Original language | English |
---|---|
Title of host publication | Proceedings of the 5th Australian Digital Forensics Conference |
Pages | 67-78 |
Number of pages | 12 |
Publication status | Published - 2007 |
Event | 5th Australian Digital Forensics Conference - Perth, WA, Australia Duration: 3 Dec 2007 → 3 Dec 2007 |
Conference
Conference | 5th Australian Digital Forensics Conference |
---|---|
Country/Territory | Australia |
City | Perth, WA |
Period | 3/12/07 → 3/12/07 |
Keywords
- Computer crime
- Computer forensic investigator
- Computer forensics
- Digital evidence
- Id theft
- Incident investigation