Online ID theft techniques, investigation and response

Olga Angelopoulou, Paula Thomas, Konstantinos Xynos, Theodore Tryfonas

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

ID theft, especially in its online form, is currently one of the most prevalent types of computer crime. The limited end-user awareness as well as the retention and business processing of large amounts of personal data in a manner that does not meet security and regulatory requirements provide plenty of opportunities to fraudsters. A number of organisations have produced guidelines of good practice targeted to individuals and organisations, however the matter is still on the rise. In this paper, we review computer-based techniques employed by fraudsters in order to steal IDs and refer to published guidelines and the documented good practice against those. We discuss the issues related to the investigation of such incidents and provide the grounds for the development of a framework to assist in their forensic examination.
Original languageEnglish
Pages (from-to)76-88
Number of pages13
JournalInternational Journal of Electronic Security and Digital Forensics (IJESDF)
Volume1
Issue number1
DOIs
Publication statusPublished - 9 May 2007

Keywords

  • computer forensics
  • digital evidence
  • e-Crime
  • ID theft
  • incident investigation

Fingerprint

Dive into the research topics of 'Online ID theft techniques, investigation and response'. Together they form a unique fingerprint.

Cite this