1 / 24

Cyber Identity Theft: A Conceptual Model and Implications For Public Policy

Cyber Identity Theft: A Conceptual Model and Implications For Public Policy. Angeline G. Close, UGA/NGCSU George M. Zinkhan, UGA R. Zachary Finney, NGCSU. A 1957 Sylvester & Tweety Cartoon. Image source: davemackey.com. Identity Theft.

Download Presentation

Cyber Identity Theft: A Conceptual Model and Implications For Public Policy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Identity Theft:A Conceptual Model and Implications For Public Policy Angeline G. Close, UGA/NGCSU George M. Zinkhan, UGA R. Zachary Finney, NGCSU

  2. A 1957 Sylvester & Tweety Cartoon Image source: davemackey.com

  3. Identity Theft • Most common classification of consumer complaints to FTC (42%) • Victimization costs beyond $ • Growing problem attributed to the emergence of the e-marketplace • Top online fraud (FBI 2003) • Re-appraisals of research & public policy are needed

  4. Cyber Stalkers Laughing Behind the Screen…For Now Image Source: greenberg-art.com

  5. Objectives 1) Introduce 3 classification schemes, which synthesize conceptualizations of ID theft and the Internet: a) methods, b) time-frame, c) victims’ behavioral responses 2) Recognize key issues & regulations related to public policy and consumer welfare

  6. Cyber ID Theft Defined • Online or electronic acquisition of personal information with the purpose of utilizing such information for deceitful activity either on the Internet or offline • Using electronic (i.e., web-based) means to carry out any form of identity theft

  7. Cyber Identity Theft: An E-Merging Public Policy Issue Process Victim Response Schemes Time-Frame

  8. Cyber ID Theft Process Table 2 Victim Reacts Figure 2 (lower) ID Theft Recurs Cyber- Identity Theft Table 3 Public Policy Issues Figure 2 (Upper) ID Theft Does Not Recur Table 1 Methods of Cyber- ID Theft

  9. Cyber ID Theft Schemes: Broad Scope

  10. Cyber ID Theft Schemes: Narrow Scope

  11. Cyber ID Theft Schemes: Narrow Scope

  12. Cyber ID Theft Time Frame

  13. Cyber- ID TheftVictim Response

  14. An Atypical Response Image Source: glasbergen.com

  15. A More Extreme Response:Serious Password Strategy Image Source: glasbergen.com

  16. Public Policy & Consumer Welfare • Dissemination of cyber identity theft methods • Employee access to data and associated potential for misuse III. Credit-reporting bureaus IV. The inherent difficulty associated with proving you did not commit acts

  17. Public Policy & Consumer Welfare • Regulation of data exchanges • Uses of marketing databases VII. Use of data by financial institutions VIII. Liability issues IX. Assisting cyber identity theft victims

  18. Public Policy & Consumer Welfare • Expanding public education/ awareness • Educating the populace so that overall crime rates decline • Effective criminal enforcement • Risk analysis & risk assessment • What are the specific costs for consumers?

  19. Public Policy & Consumer Welfare XV. What are the costs for business (at the firm level and the industry level)? What are the threats to our economic system? XVI. What are the best ways to promote safety tips and improved technologies? XVII. What are the best media for implementing education or remedial programs? XVIII. What are the best ways to “reform” identify thieves?

  20. Regulation • The Identity Theft and Assumption Deterrence Act (governmental): 1) allows victims of identity theft to recover financial damages 2) imposes criminal penalties of <15 years imprisonment & fines of < $250,000 3) directs the FTC to enforce the act

  21. Regulation • The Coalition on Online Identity Theft (corporate-based): 1) expands public education campaigns, promoting technology and tips for preventing and dealing with online theft 2) documents and shares non-personal information about emerging online fraudulent activity to prevent future scams 3) works with the government to ensure effective enforcement of criminal penalties against cyber thieves

  22. Information Paradox Image Source: glasbergen.com

  23. Cyber ID Theft and the Market • A threat to economic systems, e-commerce- demanding scholarly, practitioner and regulatory attention/ action • Citibank’s ID Theft Page • TV Campaign

  24. Reclaim Cyberspace • A broader change in human identity • Another paradox of technology • Researchers have an important role to play in suppressing cyber-identity theft in the future. • Reclaiming cyberspace as a means of enhancing and enriching (our own) human experiences

More Related