Abstract

This paper addresses many important questions. Firstly, what are the main identity fraud perpetrator categories? Secondly, what are the current Information Systems (IS) facilitated attack channels and methods used by identity fraud perpetrators? Thirdly, what are the effects sustained by targeted victim organisations? The major contribution of this paper is the development of an identity fraud perpetrator framework and an understanding of the model’s elements and relationships. This framework will be useful to law enforcement, business and government organisations when fighting identity crime. This research has spawned a larger research agenda into identity fraud.

Share

COinS