skip to main content
article
Free Access

Scoping identity theft

Published:01 May 2006Publication History
Skip Abstract Section

Abstract

The computer's role in identity theft incidents may have been misgauged through overestimates of reported losses.

References

  1. Bergel, H. Identity theft, Social Security numbers, and the Web. Commun. ACM 43, 2 (Feb. 2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bergstein, B. Beware the numbers hype about ID theft. Associated Press, Nov. 13, 2005; www.usatoday.com/tech/news/techinnovations/2005-11-13-id-theft-numbers_x.htm.Google ScholarGoogle Scholar
  3. Kappelman, L.A., Fent, D., Keeling, K.B., and Prybutok, V. Calculating the cost of year-2000 compliance. Commun. ACM 41, 2 (Feb. 1998). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. McCarty, B. Automated identity theft. IEEE Security and Privacy 1, 5 (Sept./Oct. 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Synovate. Federal Trade Commission---Identity Theft Survey Report. Sept. 2003; www.ftc.gov/os/2003/09/synovatereport.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Scoping identity theft

      Recommendations

      Reviews

      Arvid G. Larson

      The assertion in the popular media that "identity theft is the fastest-growing crime in the US" is a too familiar factoid. Even to those of us practicing computer professionals, this frequently encountered expression of inherent dangers in our information system-based culture is usually taken as an accepted reality without the underlying analytic rigor we apply to debunking other such urban myths. This article attempts to set the record straight by providing the quantitative background data necessary to understand and put identity theft (also known as identity fraud) into a general law enforcement context. In an attempt to more precisely define and bound the true scope of the problem, the author suggests that the computer's role in identity theft incidents may have been misgauged through overestimates of reported losses. In fact, it would appear that too many crimes are counted as identity theft that are just traditional fraud, though perhaps facilitated by computer technology. Moreover, this article makes the case that the fastest-growing crime in terms of monetary losses is not identity theft, but rather bankruptcy, both personal and corporate. The author concludes that identity theft-related crime is within a family of security problems whose sociological aspects present greater obstacles than can be resolved by reducing technological risks. Identity theft is a fascinating and often-cited topic. This article is recommended to all readers, not only to appear smarter at the next cocktail party discussion, but also to provide useful insight into popular information system security policy implementation and practice, as well as the consequences thereof. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 49, Issue 5
        Two decades of the language-action perspective
        May 2006
        125 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/1125944
        Issue’s Table of Contents

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 May 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format