Cyber Identity Theft: A Conceptual Model and Implications For Public Policy - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber Identity Theft: A Conceptual Model and Implications For Public Policy

Description:

Cyber Identity Theft: A Conceptual Model and Implications For Public Policy Angeline G. Close, UGA/NGCSU George M. Zinkhan, UGA R. Zachary Finney, NGCSU – PowerPoint PPT presentation

Number of Views:143
Avg rating:3.0/5.0
Slides: 25
Provided by: Angelin49
Category:

less

Transcript and Presenter's Notes

Title: Cyber Identity Theft: A Conceptual Model and Implications For Public Policy


1
Cyber Identity TheftA Conceptual Model and
Implications For Public Policy
  • Angeline G. Close, UGA/NGCSU
  • George M. Zinkhan, UGA
  • R. Zachary Finney, NGCSU

2
A 1957 Sylvester Tweety Cartoon
Image source davemackey.com
3
Identity Theft
  • Most common classification of consumer complaints
    to FTC (42)
  • Victimization costs beyond
  • Growing problem attributed to the emergence of
    the e-marketplace
  • Top online fraud (FBI 2003)
  • Re-appraisals of research public policy are
    needed

4
Cyber Stalkers Laughing Behind the ScreenFor Now
Image Source greenberg-art.com
5
Objectives
  • 1) Introduce 3 classification schemes, which
    synthesize conceptualizations of ID theft and the
    Internet a) methods, b) time-frame, c) victims
    behavioral responses
  • 2) Recognize key issues regulations related to
    public policy and consumer welfare

6
Cyber ID Theft Defined
  • Online or electronic acquisition of personal
    information with the purpose of utilizing such
    information for deceitful activity either on the
    Internet or offline
  • Using electronic (i.e., web-based) means to carry
    out any form of identity theft

7
Cyber Identity Theft An E-Merging Public Policy
Issue
Process
Victim Response
Schemes
Time-Frame
8
Cyber ID Theft Process
       
       
Table 2 Victim Reacts
Figure 2 (lower) ID Theft Recurs
Cyber- Identity Theft


Table 3 Public Policy Issues
Figure 2 (Upper) ID Theft Does Not Recur
Table 1 Methods of Cyber- ID Theft
9
Cyber ID Theft Schemes Broad Scope
10
Cyber ID Theft Schemes Narrow Scope
11
Cyber ID Theft Schemes Narrow Scope
12
Cyber ID Theft Time Frame
13
Cyber- ID TheftVictim Response
14
An Atypical Response
Image Source glasbergen.com
15
A More Extreme ResponseSerious Password Strategy
Image Source glasbergen.com
16
Public Policy Consumer Welfare
  • Dissemination of cyber identity theft methods
  • Employee access to data and associated potential
    for misuse
  • III. Credit-reporting bureaus
  • IV. The inherent difficulty associated with
    proving you did not commit acts

17
Public Policy Consumer Welfare
  • Regulation of data exchanges
  • Uses of marketing databases
  • VII. Use of data by financial institutions
  • VIII. Liability issues
  • IX. Assisting cyber identity theft victims

18
Public Policy Consumer Welfare
  1. Expanding public education/ awareness
  2. Educating the populace so that overall crime
    rates decline
  3. Effective criminal enforcement
  4. Risk analysis risk assessment
  5. What are the specific costs for consumers?

19
Public Policy Consumer Welfare
  • XV. What are the costs for business (at the firm
    level and the industry level)? What are the
    threats to our economic system?
  • XVI. What are the best ways to promote safety
    tips and improved technologies?
  • XVII. What are the best media for implementing
    education or remedial programs?
  • XVIII. What are the best ways to reform
    identify thieves?

20
Regulation
  • The Identity Theft and Assumption Deterrence Act
    (governmental)
  • 1) allows victims of identity theft to recover
    financial damages
  • 2) imposes criminal penalties of lt15 years
    imprisonment fines of lt 250,000
  • 3) directs the FTC to enforce the act

21
Regulation
  • The Coalition on Online Identity Theft
    (corporate-based)
  • 1) expands public education campaigns, promoting
    technology and tips for preventing and dealing
    with online theft
  • 2) documents and shares non-personal information
    about emerging online fraudulent activity to
    prevent future scams
  • 3) works with the government to ensure effective
    enforcement of criminal penalties against cyber
    thieves

22
Information Paradox
Image Source glasbergen.com
23
Cyber ID Theft and the Market
  • A threat to economic systems, e-commerce-
    demanding scholarly, practitioner and regulatory
    attention/ action
  • Citibanks ID Theft Page
  • TV Campaign 

24
Reclaim Cyberspace
  • A broader change in human identity
  • Another paradox of technology
  • Researchers have an important role to play in
    suppressing cyber-identity theft in the future.
  • Reclaiming cyberspace as a means of enhancing and
    enriching (our own) human experiences
Write a Comment
User Comments (0)
About PowerShow.com