Corpus ID: 166660406

39P. Nature and Extent of Identity Crime through Wireless Technology Abuse and its Impact on Individual and Organisational Levels

@inproceedings{Ahmad201039PNA,
  title={39P. Nature and Extent of Identity Crime through Wireless Technology Abuse and its Impact on Individual and Organisational Levels},
  author={Salman Ahmad and D. Winchester and L. Land and R. Jamieson},
  year={2010}
}
Perpetrator(s) are stealing personal data abusing wireless networks to commit identity fraud and related crimes that is affecting us on individual, organisational and national levels. These threats affect national security also (Smith et al. 2010). There have been instances of identity and data theft crimes involving millions of debit and credit card numbers, which indicate the seriousness of this issue and reinforce the concerns of security professionals. These cases were taken from newspapers… Expand

Figures and Tables from this paper

References

SHOWING 1-10 OF 18 REFERENCES
Detection of rogue devices in wireless networks
The need for robust access control mechanisms is paramount, especially in Wireless Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current authentication systems are vulnerable toExpand
Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization
TLDR
Investigation of ISS within government finds that a strategy based on organization subunit size is helpful in motivating and assisting organizations to move toward accreditation, and highlights that mandated standard accreditation was inhibited by insufficient resource allocation, lack of senior management input, and commitment. Expand
Mobile and wireless technologies: security and risk factors
Funded by the Australian High Tech Crime Centre, this research identifies the spread of mobile and wireless technologies in all aspects of business and private life, but shows the increased risk ofExpand
Identity Theft: Trends and Issues
This report first provides a brief federal legislative history of identity theft laws. It analyzes the current trends in identity theft, including prevalent identity theft-related crimes, the federalExpand
A Secure Billing Architecture for 4G Wireless Networks
TLDR
This paper proposes a security architecture that provides informed consent for users and providers, per unit billing and per use billing with non-repudiation and provides an informal analysis of the performance and security of this new architecture. Expand
Analysis of secure handover for IEEE 802.1x-based wireless ad hoc networks
TLDR
This article presents the 802.1X model and evaluates its application to ad hoc networks based on IEEE 802.11 i or IEEE802.1 be standards and presents a novel protocol to perform secure handovers that is respectful of the previous analysis and that has been implemented in a mesh environment. Expand
Key management issues in wireless sensor networks: current proposals and future developments
TLDR
The security and operational requirements of WSNs are examined and then five key management protocols are reviewed: Eschenauer, Du, LEAP, SHELL, and Panja. Expand
Legal programming
Using a process modeling-based approach to address privacy and related legal issues arising in an RFID-based augmented reality shopping situation.
) " Identity Theft Clearinghouse data , Consumer Sentinel Network Data Book for January – December 2008 "
  • 2009
" Credit cards targeted in high - tech street scams "
  • 2009
...
1
2
...