Skip to main content
Erschienen in: Information Systems and e-Business Management 4/2018

17.06.2017 | Original Article

What’s your real age? an empirical analysis of identity fraud in online game

verfasst von: Daehwan Ahn, Seongmin Jeon, Byungjoon Yoo

Erschienen in: Information Systems and e-Business Management | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we empirically examine the ID fraud problem in online game. We analyzed over 260,000 users’ behavior using terabytes of big data. The results of the econometrics analysis showed that the behavior pattern of group around 40 years old was very similar to that of teenagers. Considering that the game used for the analysis is a game for young users, this means that some of the users in the group around 40 years old may be teenagers who have stolen the parent’s ID. In addition, we performed discriminant analysis and log traffic analysis to estimate how many young users were using their parent IDs. As a result, about 47% of the users around 40 years old were found to be teenager users. Also, behavior patterns of users who are estimated to be teenagers have been found in other age groups.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Aissa AB, Abercrombie RK, Sheldon FT, Mili A (2012) Defining and computing a value based cyber-security measure. IseB 10(4):433–453CrossRef Aissa AB, Abercrombie RK, Sheldon FT, Mili A (2012) Defining and computing a value based cyber-security measure. IseB 10(4):433–453CrossRef
Zurück zum Zitat Alemi F (2007) An avatar’s day in court: a proposal for obtaining relief and resolving disputes in virtual world games. UCLA J Law Technol 11(2):1–54 Alemi F (2007) An avatar’s day in court: a proposal for obtaining relief and resolving disputes in virtual world games. UCLA J Law Technol 11(2):1–54
Zurück zum Zitat Assmann JJ, Drescher MA, Gallenkamp JV, Picot A, Welpe IM, Wigand RT (2010) MMOGs as emerging opportunities for research on virtual organizations and teams. In: Americas conference on information systems (AMCIS), p 335 Assmann JJ, Drescher MA, Gallenkamp JV, Picot A, Welpe IM, Wigand RT (2010) MMOGs as emerging opportunities for research on virtual organizations and teams. In: Americas conference on information systems (AMCIS), p 335
Zurück zum Zitat Barfield W (2006) Intellectual property rights in virtual environments: considering the rights of owners, programmers and virtual avatars. Akron Law Rev 39(3):649–700 Barfield W (2006) Intellectual property rights in virtual environments: considering the rights of owners, programmers and virtual avatars. Akron Law Rev 39(3):649–700
Zurück zum Zitat Bell MW (2008) Toward a definition of "virtual worlds". J Virtual Worlds Res 1(1) Bell MW (2008) Toward a definition of "virtual worlds". J Virtual Worlds Res 1(1)
Zurück zum Zitat Bureau of Justice Statistics (2013) National Crime Victimization Survey (NCVS) Bureau of Justice Statistics (2013) National Crime Victimization Survey (NCVS)
Zurück zum Zitat Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2012) Behavioral analysis of botnets for threat intelligence. IseB 10(4):491–519CrossRef Caglayan A, Toothaker M, Drapeau D, Burke D, Eaton G (2012) Behavioral analysis of botnets for threat intelligence. IseB 10(4):491–519CrossRef
Zurück zum Zitat Castronova E (2007) Exodus to the virtual world: how online fun is changing reality. Palgrave Macmillan, New York Castronova E (2007) Exodus to the virtual world: how online fun is changing reality. Palgrave Macmillan, New York
Zurück zum Zitat Digi-Capital (2011) Global games investment review Digi-Capital (2011) Global games investment review
Zurück zum Zitat Farrell J, Saloner G (1985) Standardization, compatibility, and innovation. RAND J Econ 16(1):70–83CrossRef Farrell J, Saloner G (1985) Standardization, compatibility, and innovation. RAND J Econ 16(1):70–83CrossRef
Zurück zum Zitat Federal Trade Commission (2010) Talking about identity theft: a how-to guide Federal Trade Commission (2010) Talking about identity theft: a how-to guide
Zurück zum Zitat Gensollen M (2007) L’Economie Réelle des Univers Peristants: Vers une Propriété Virtuelle? In: Beau F (ed) Culture d’univers: jeux en réseau, mondes virtuels, le nouvel âge de la société numérique. FYP éditions, Paris, pp 1–13 Gensollen M (2007) L’Economie Réelle des Univers Peristants: Vers une Propriété Virtuelle? In: Beau F (ed) Culture d’univers: jeux en réseau, mondes virtuels, le nouvel âge de la société numérique. FYP éditions, Paris, pp 1–13
Zurück zum Zitat Itsuki H, Takeuchi A, Fujita A, Matsubara H (2010) Exploiting MMORPG log data toward efficient RMT player detection. In: Proceedings of the 7th international conference on advances in computer entertainment technology, ACM, pp 118–119 Itsuki H, Takeuchi A, Fujita A, Matsubara H (2010) Exploiting MMORPG log data toward efficient RMT player detection. In: Proceedings of the 7th international conference on advances in computer entertainment technology, ACM, pp 118–119
Zurück zum Zitat Katz ML, Shapiro C (1985) Network externalities, competition, and compatibility. Am Econ Rev 75:424–440 Katz ML, Shapiro C (1985) Network externalities, competition, and compatibility. Am Econ Rev 75:424–440
Zurück zum Zitat Koops BJ, Leenes R (2006) Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit-DuD 30(9):553–556CrossRef Koops BJ, Leenes R (2006) Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit-DuD 30(9):553–556CrossRef
Zurück zum Zitat Kozinets RV (2010) Netnography. Doing ethnographic research online. Sage Publications Ltd, London Kozinets RV (2010) Netnography. Doing ethnographic research online. Sage Publications Ltd, London
Zurück zum Zitat Lai F, Li D, Hsieh CT (2012) Fighting identity theft: the coping perspective. Decis Support Syst 52:353–363CrossRef Lai F, Li D, Hsieh CT (2012) Fighting identity theft: the coping perspective. Decis Support Syst 52:353–363CrossRef
Zurück zum Zitat Lazarus RS (1993) Coping theory and research: past present, and future. Psychosom Med 55(3):234–247CrossRef Lazarus RS (1993) Coping theory and research: past present, and future. Psychosom Med 55(3):234–247CrossRef
Zurück zum Zitat Parthasarathy R, Shirazi BA, Peterson N, Song WZ, Hurson A (2012) Management and security of remote sensor networks in hazardous environments using over the air programming. IseB 10(4):521–548CrossRef Parthasarathy R, Shirazi BA, Peterson N, Song WZ, Hurson A (2012) Management and security of remote sensor networks in hazardous environments using over the air programming. IseB 10(4):521–548CrossRef
Zurück zum Zitat Ramaswamy VM (2006) Identity-theft toolkit. CPA J 76(10):66–70 Ramaswamy VM (2006) Identity-theft toolkit. CPA J 76(10):66–70
Zurück zum Zitat Rheingold H (2000) The virtual community: homesteading on the electronic frontier. MIT Press, London Rheingold H (2000) The virtual community: homesteading on the electronic frontier. MIT Press, London
Zurück zum Zitat Roquilly C (2011) Control over virtual worlds by game companies: issues and recommendations. MIS Q 35(3):653–671CrossRef Roquilly C (2011) Control over virtual worlds by game companies: issues and recommendations. MIS Q 35(3):653–671CrossRef
Zurück zum Zitat Shankar V, Bayus BL (2003) Network effects and competition: an empirical analysis of the home video game industry. Strateg Manag J 24(4):275–384CrossRef Shankar V, Bayus BL (2003) Network effects and competition: an empirical analysis of the home video game industry. Strateg Manag J 24(4):275–384CrossRef
Zurück zum Zitat Shy O (2001) The economics of network industries. Cambridge University Press, CambridgeCrossRef Shy O (2001) The economics of network industries. Cambridge University Press, CambridgeCrossRef
Zurück zum Zitat Wang JA, Guo M, Wang H, Zhou L (2012) Measuring and ranking attacks based on vulnerability analysis. IseB 10(4):455–490CrossRef Wang JA, Guo M, Wang H, Zhou L (2012) Measuring and ranking attacks based on vulnerability analysis. IseB 10(4):455–490CrossRef
Metadaten
Titel
What’s your real age? an empirical analysis of identity fraud in online game
verfasst von
Daehwan Ahn
Seongmin Jeon
Byungjoon Yoo
Publikationsdatum
17.06.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Information Systems and e-Business Management / Ausgabe 4/2018
Print ISSN: 1617-9846
Elektronische ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-017-0347-x

Weitere Artikel der Ausgabe 4/2018

Information Systems and e-Business Management 4/2018 Zur Ausgabe

Premium Partner