27,972 research outputs found

    Risks of identity theft: Can the market protect the payment system?

    Get PDF
    Identity theft has been a feature of financial markets for as long as alternatives have existed to cash transactions. But identity theft has recently occurred on a much larger scale. Data breaches often involve the apparent loss or acknowledged theft of the personal identifying information of thousands--or millions--of people. ; Identity theft poses risks, not only to individuals, but to the integrity and efficiency of the payment system--the policies, procedures, and technology that transfer information for authenticating and settling payments among participants. Identity theft can cause a loss of confidence in the security of certain payment methods and an unwillingness to use them. Markets can cease operating or switch to less efficient payment methods. Either represents a loss of efficiency for the economy. ; Schreft looks at the nature of identity theft today and the factors underlying its mounting risks. She also explores whether markets are able to limit the risks identity theft poses to the payment system.Identity theft ; Payment systems

    Participatory Evaluation of the Tribal Victim Assistance Programs at the Lummi Nation and Passamaquoddy Tribe

    Full text link
    The high rate of crime in American Indian/Alaska Native (AI/AN) communities and/or against AI/AN people reflected in numerous studies in the last three decades, demonstrates the need for victim assistance programs in Indian Country to help victims cope with and heal from violent crime (Wolk 1982; Allen 1985; Sacred Shawl Women’s Society, no date; McIntire 1988; DeBruyn, Lujan & May 1995; Norton & Manson 1995; Fairchild et. al 1998; Greenfield & Smith 1999; Alba, Zieseniss, et al 2003; Perry 2004). The U.S. Department of Justice, Office for Victims of Crime (OVC) became aware of the lack of resources available to AI/AN crime victims living on Indian lands. OVC, acknowledging the intense and extensive need for culturally relevant resources on reservations, established the Victim Assistance in Indian Country (VAIC) Discretionary Program in 1988, which later became the Tribal Victim Assistance Program (TVA). OVC initiated this program to establish “on-reservation” victim assistance programs that would provide permanent, accessible, and responsive victim assistance services on tribal lands. Recognizing the need for evaluation of promising victim services programs operating in Indian Country, OVC, in collaboration with the USDOJ National Institute of Justice (NIJ) supported an evaluation of two TVA programs—the Lummi Victims of Crime (LVOC) Program in Washington and the Passamaquoddy Tribal Victim Outreach Advocate (TVOA) Program in Maine. This report summarizes the results of the participatory evaluation conducted at these two sites

    Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e

    Get PDF
    In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible. In those efforts, we focused on reasonable expectations held by “the people” that they will not be subjected to broad and indiscriminate surveillance. These expectations are anchored in Founding-era concerns about the capacity for unfettered search powers to promote an authoritarian surveillance state. Although we also readily acknowledged that there are legitimate and competing governmental and law enforcement interests at stake in the deployment and use of surveillance technologies that implicate reasonable interests in quantitative privacy, we did little more. In this Article, we begin to address that omission by focusing on the legitimate governmental and law enforcement interests at stake in preventing, detecting, and prosecuting cyber-harassment and healthcare fraud

    Assessing the trends, scale and nature of economic cybercrimes: overview and issues

    Get PDF
    Trends in police-recorded and (where they exist) household survey-measured cybercrimes for economic gain are reviewed in a range of developed countries – Australia, Canada, Germany, Hong Kong, the Netherlands, Sweden, the UK and the US - and their implications for criminal policy are considered. The datasets indicate a substantial rise in online fraud – though one that is lower than the rise in online shopping and other ‘routine activity’ indicators - but it is not obvious whether this is just displacement for the fall in household and automobile property crime, nor how much overlap there is between the offenders and past ‘offline’ offenders. Nor do the data indicate whether the frauds result from insiders or outsiders, or are collusive. The direct and indirect costs of cyberfrauds are examined, and it is concluded that there is no satisfactory basis for the larger estimates of cost, but it is undeniable that those costs are large enough to merit concern. There remains a problem of what metrics are appropriate for judging the threat and harm from cybercrimes, and their impact on national and human security. There is not a sharp division between these larger national security issues and cyber attacks on banks, businesses, and the spear phishing of individuals with important knowledge of system vulnerabilities in the public or the private sector. Rather there is a punctuated continuum in the interplay between private, corporate governmental and wider social risks

    The Australian Cyber Security Centre threat report 2015

    Get PDF
    Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for malicious activities even if they do not think the information held on their networks is valuable, or that their business would be of interest to cyber adversaries. This first unclassified report by the ACSC describes the range of cyber adversaries targeting Australian networks, explains their motivations, the malicious activities they are conducting and their impact, and provides specific examples of activity targeting Australian networks during 2014. This report also offers mitigation advice on how organisations can defend against these activities. The ACSC’s ability to detect and defend against sophisticated cyber threats continues to improve. But cyber adversaries are constantly improving their tradecraft in their attempts to defeat our network defences and exploit the new technologies we embrace. There are gaps in our understanding of the extent and nature of malicious activity, particularly against the business sector. The ACSC is reaching out to industry to build partnerships to improve our collective understanding. Future iterations of the Threat Report will benefit from these partnerships and help to close gaps in our knowledge

    Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies

    Get PDF
    While steps have been undertaken in the last five years to better understand the problem of identity theft, there has been little research done in the areas of high tech crime victim profiling and prevention. Most studies focus on victim demographics without examining ways in which the victimization may have been facilitated technologically. Attempts to look at precipitating behaviors in the context of victimization are limited. As such, a weak empirical base exists on which to generate additional research and potential solutions to identity theft victimization. This thesis bridges previous identity theft research with other empirical studies in order to offer recommendations for a comprehensive survey framework in which to study identity theft victimization and for information technology strategies to enhance prevention efforts

    Children’s experiences of domestic violence and abuse: siblings’ accounts of relational coping

    Get PDF
    This article explores how young people see their relationships, particularly their sibling relationships, in families affected by domestic violence, and how relationality emerges in their accounts as a resource to build an agentic sense of self. The ‘voice’ of children is largely absent from domestic violence literature, which typically portrays them as passive, damaged and relationally incompetent. Children’s own understandings of their relational worlds are often overlooked, and consequently existing models of children’s social interactions give inadequate accounts of their meaning-making-in-context. Drawn from a larger study of children’s experiences of domestic violence and abuse, this paper uses two case studies of sibling relationships to explore young people’s use of relational resources, for coping with violence in the home. The paper explores how relationality and coping intertwine in young people’s accounts, and disrupts the taken for granted assumption that children’s ‘premature caring’ or ‘parentification’ is (only) pathological in children’s responses to domestic violence. This has implications for understanding young people’s experiences in the present, and supporting their capacity for relationship building in the future

    The Importance of Transparency and Willingness to Share Personal Information

    Get PDF
    This study investigates the extent to which individuals are willing to share their sensitive personal information with companies. The study examines whether skepticism can influence willingness to share information. Additionally, it seeks to determine whether transparency can moderate the relationship between skepticism and willingness to share and whether 1) companies perceived motives, 2) individual’s prior privacy violations, 3) individuals’ propensity to take risks, and 4) individuals self-efficacy act as antecedents of skepticism. Partial Least Squares (PLS) regression is used to examine the relationships between all the factors. The findings indicate that skepticism does have a negative impact on willingness to share personal information and that transparency can reduce skepticis
    corecore