Analysis of Identity Theft Survey



Similar documents
Cybersecurity. Are you prepared?

2012 NORTON CYBERCRIME REPORT

How To Prevent Cybercrime

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Identity Theft Protection Plans

Money, fees and payment

Women in an Age of Cyber Wars: Risks, Management and Opportunity

2012 NCSA / McAfee Online Safety Survey

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Corporate Account Take Over (CATO) Guide

NATIONAL CYBER SECURITY AWARENESS MONTH

Malware & Botnets. Botnets

Issues in Information Systems Volume 15, Issue I, pp , 2014

Awareness, Deterrence and

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

How To Protect Your Endpoints From Attack

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia

Background. Executive Summary

Your security is our priority

RMIT University Bachelor of Engineering (Electrical Engineering)(Honours)

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Identity Theft. What it is and How to Protect Yourself

LANDSCAPE ANALYSIS - BRING YOUR OWN DEVICE

The Pennsylvania Lawyer May June 2012

Identity Theft Protection Plan Descriptions

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Female Student Nurses Attitudes towards Electronic Medical Records in Riyadh City*

Remote Deposit Quick Start Guide

The Unintentional Insider Risk in United States and German Organizations

National Cyber Security Month 2015: Daily Security Awareness Tips

privacy and credit reporting policy.

Cyber Security Strategy

Cybersecurity Protecting Yourself, Your Business, Your Clients

Don t Fall Victim to Cybercrime:

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

plantemoran.com What School Personnel Administrators Need to know

Learn to protect yourself from Identity Theft. First National Bank can help.

The Impact of Cybercrime on Business

2012 NCSA / Symantec. National Small Business Study

Fraud Guide Fraud Protection

10 Quick Tips to Mobile Security

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Case study: What the? Online scams and identity theft

Great Wall International Credit Card Application Form F.PBD.CCAF

PRIVACY POLICY. comply with the Australian Privacy Principles ("APPs"); ensure that we manage your personal information openly and transparently;

Course Title: Penetration Testing: Network & Perimeter Testing

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Protecting Yourself from Identity Theft

2012 Endpoint Security Best Practices Survey

Given Name (in full): Surname (Family Name): Residential Address: (Number/Unit/Street/Suburb/State/Postcode) Town: State:

EL/Civics Lesson Plan

High Speed Internet - User Guide. Welcome to. your world.

State of SMB Cyber Security Readiness: UK Study

Identity Theft Victim s Complaint and Affidavit

2009 Antispyware Coalition Public Workshop

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

OIG Fraud Alert Phishing

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Internet threats: steps to security for your small business

Common Data Breach Threats Facing Financial Institutions

Cyber Security Awareness. Internet Safety Intro.

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Identity Theft Protection

Special Eurobarometer 423 CYBER SECURITY SUMMARY

2011 NATIONAL SMALL BUSINESS STUDY

what you need to know


Transcription:

Analysis of Identity Theft Survey GNANAMBIKAI KAMAL KUMAR, SAVITRI BEVINAKOPPA School of IT and Engineering Melbourne Institute of Technology Lonsdale St, Melbourne AUSTRALIA akamalkumar@academic.mit.edu.au, sbevinakoppa@mit.edu.au Abstract: In Recent years, identity theft is being one of the biggest threats in the internet world. Identity theft occurs in areas like financial, business, educational, government and health services. Cyber technology is playing a major role in these breach categories. There are many surveys available from major consultants. Most of the consultants design and develop surveys based on customer requirements and some of the real data will be biased. It is very important to analyse real data and facts. Our aim is to take survey from range of people and analyse without any biasing collected data. We designed initial semantic model of the form. This paper gives survey form and data collected from participants. These data are analysed and found that % of participants experience identity theft. Key-Words: Identity theft, survey, semantic modeling, theoretical framework Introduction Latest studies reveal that cybercrime is large, rapidly growing and profitable [] []. Due to the identity theft in cyber world the cost of loss to the customers ranges up to $ billion globally []. Most of the identity theft and fraud are analysed on surveys of customers, consumers, and corporates. Analysis of these surveyson the cost of identity theft is inaccurate in the reports. Main reason of inaccurate data is because of biasing data from customers. According to Symantec, about million victims are affected per day in the world. Majority of the victims of identity theft accept their mistakes on the loss. The victims targeted mostly are being, Mobile users and falls under the age category to. Australia is holding th hotspot in cybercrime out of countries with 7%[]. This survey is performed in the state of Victoria, Australia to analyse the impact and cost of identity theft with participants categorized as males and females. Section is a survey form. Analysis of survey is given in section. Overall survey results are given in section and section is conclusion. Survey Form The survey form consists of sections: personal details, social, practical experience, professional and ethics. Personal information is to analysecategory of participants, their age group and their nationality [].Social Information is a two way communication, explaining how people get and exchange information online, to improve, attain evidence and relationships in the cyber world environment [] [].Practical refers to the actions to implement hands-on methods to solve the problems [7]. A Professional section is a person who meets the requirements of the procedures or moral practically, whose knowledge is measured with set of standards. Ethical section is a system of guidelines to assess what is right or wrong and act accordingly.privacy section is individual protected from information access by others. Survey form is given as follows: Section : Personal I am Ο Student Ο Professional Ο Other Ο Ο Highest Education Ο Dip Ο Adv. Dip Ο Bachelor Ο Masters ΟPh.D I live Country State Age Ο<9Ο<9 Ο<9 Ο<9 Ο<9 Ο<9 Section : Social Do you use Internet? If yes, Always Hourly Daily Fortnightly Other Access Place Home Office Public Other Applications used Web Mobile Wireless Other Internet for E-mailBanking Shopping Other Section : Practical Do you check Safety for website access? ISBN: 97----

Do you provide Personal information online? Do you download from internet? Do you do Online payments? If yes, ΟPay at first Ο Pay at end Methods of payment Bank A/c Cr card Pay pal Wire transfer Cash advance Cheque Other Are you aware of Identity theft? How do you know about Identity Theft? TV Word of mouth Magazine Social network Other Did you experience any issues in online transactions? Fraud Phishing Scam Other_ Section : Professional Have you experienced Identity Theft? ΟYes Ο No Type of Identity theft? Bank Cr card Loan Phone/Utilities Govt. docs Other If Yes, Year Loss of Amount Have you complained about the loss? Complaint Method?Internet Mail Website Phone Law enforcement Police Other Did you try to recover the loss? If Yes, Recovered amount If No, Why? Did you spend any amount for recovery? What is the time period spent on recovery? Have you taken any precautions/ actions after the issue? If yes, How? Do you have updated Security software installed? If No, Why? Do you still do online transactions? Section : Ethical Privacy: Do you carry your identity information all time with you? Do you give personal information over phone? (Ex: D.O.B, TFN no, Passport no) Security: Unauthorized access. Do you scan your computer for viruses regularly? Do you use wireless connection in public? Do you worry about insecurity? Desktop Laptop Mobile Other Time spent accessing internet every week? hrs. Confidentiality: Secrecy relating to information. Do you post your personal information on Social networking site? Do you communicate with strangers online? Have you experienced any problem? If yes, How? Survey Results We have taken survey of participants with mix of students and professionals. Most of the category is comparison of male and female.. Personal details survey results.. Category Participants in total were, in which were males and were females... Education Most of the male participants are educated with Bachelors and females with Masters as shown in table. Table: Survey summary on education Diploma Adv. Diploma Bachelor 9 Masters 7 PhD No Entry 7 Total.. Age category Participants both male and female were under the age category less than 9 as shown in table. Table : Survey summary on age category <9 <9 <9 <9 <9 <9 No entry Total. Social aspect.. Use of computer/internet male and female participants use computer/ internet. ISBN: 97----

.. How often? Both male and female participants were always on the internet for usage as shown in table. Table : Survey summary on internet usage Always Hourly Daily 9 7 Total.. Location of usage Though the numbers of people accessing the internet were high at home, but the second place of access for both male and female is the office as shown in Fig.. Home Office Public Other Fig. Location of internet usage.. Devices usage Wireless applications and web applications scored the high score in usage for both male and female participants as shown in Fig.. Fig. Applications usage. Practical aspects.. Safety check Out of male participants, 9 check for safety to access. And out of females, check for safety access... Online payments 99 male participants pay online and female participants pay online as shown in table. Table : Survey summary on online payment Online YES Online-NO Online-NONE Total 99.. Method of payment participants used Bank A/c, Credit card and pay pal for making payments, where as females pay mostly with pay pal as shown in Fig.. Bank A/C Cr card Pay pal Wire tfr Cash Adv Cheque Other None Fig. Devices Usage.. Application usage Participants used internet for checking emails, banking, shopping and for other, where the usage by male and female falls under same priority as shown in Fig.. Fig. Method of payment.. Awareness of Identity theft Most of the participants were aware of identity Theft as shown in table. ISBN: 97----

Table : Survey summary on awareness Aware YES 9 Aware-NO Aware-NONE Total Social network plays a major role for the males about the awareness of identity theft but females were aware via TV and d word of mouth, magazine, etc. as shown in table. Table : Survey summary on social networking TV Word of Mouth 9 Magazine 7 Social Network 9 Other None Total 7.. Online transactions issue Both male and female participants have known about the issues other than Fraud, Scam, etc as shown in table. Table : Survey summary on online transaction Fraud Phishing Scam 7 Other None 7 Total 7. Professional.. Experience male experienced identity theft out of. And females experienced identity theft out of as shown in table 7. Table 7: Survey summary on identity theft experience ID Theft YES ID Theft-NO 9.. Type of theft s experienced identity theft in Utilities, where as females experienced with Credit card payments as shown in Fig.. Fig. Type of theft graph.. Loss The amount lost due to identity theft by males is more or less equal to $, but females have lost amount from $ up to $ as shown in Fig.. < < < < < < < None Fig. Loss of amount graph Both male and female participants complained about the loss via phone and then with online complaining methods as shown in table 9. 9 Table 9: Survey summary on complained Internet Mail Website Phone Law Enforce Other No Entry Out of 7 people experienced identity theft, males and females complained about the loss as shown in table. Table : Survey summary on number of people where amount lost YES NO Total 7 ISBN: 97----

males and females recovered their loss due to identity theft as shown in table. Table : Survey summary on recovery Recover YES Recover-NO Only male and female spent money for the recovery of their loss out of 7 victims. But many haven t spent anything for recovery as shownin table. Table : Survey summary on money spent to recovery Spent YES Spent-NO More or less the male victims have spent less than days for the recovery where as female victims have spent up to months for recovery as shown in Fig. 7. Fig. 7 Time sepnt on recovery graph. Ethical.. Privacy Identification: More or less both male and female participants seem to be keen with privacy issues as shown in table. Table : Survey summary on privacy YES 9 9 NO.. Personal information The numbers of male and female victims were equal in providing personal information over phone as shown in table. Table : Survey summary on provision of personal information Over Phone-YES Over Phone-NO 9.. Security With this survey result, most of all the participants appear to check for security check as shown in table. Table : Survey summary on security check YES NO 9 More than % of males check for security using wireless and % of females check for security check as shown in table. Table : Survey summary on wireless security check Wireless-YES Wireless-NO 7 Though female are paying more attention with confidential information posted in social networking sites, males are comfortable in posting the information as shown in table. Table : Survey summary on social networking Social Network-YES Social Network-NO Both male and female participants are not interested in communicating with strangers via social networking websites to secure their confidential information as shown in table 7. Table 7: Survey summary on communicating with strangers Communicate-YES Communicate-NO 7 Overall survey results The Surveys is conducted among participants in total categorized as female and male. As shown in table, approximately % of female and male experienced identity theft. Fig. shows the no of participants experienced identity theft.in which 7 participants including professinals and students experienced identity theft out of which is % in Victoria, Australia. ISBN: 97----

Table : Survey summary on experienced identity theft ID theft -YES ID theft -NO Total Percentage 7.% 9.% ID theft - YES Conclusion ID theft - NO Fig. Overall Survey Results Student- Student- In the survey % of total participants experienced identity theft in total. In the last years, the year has % of people experienced identity theft with an average of $ which is %. Out of which 7% experienced because of Credit cards and Utilities. 7% complained the loss through phone(%) and using internet(%). 7% tried to recover the loss but only % was able to recover all the amount. Though 7% did not spend any amount for recovery but % spent less than days of duration for the recovery. 7% installed updated security software after the experience but only % took precautions in usage.but in total, % of participants still do online transactions even aware of the consequences experienced. This study will be continued further by comparing the study with Symantec and with studies comparing globally [] [9] []. http://www.symantec.com/about/news/release/a rticle.jsp?prid=97_ [] R. Anderson,C. Barton,R. Bohme, R. Clayton, Measuring the cost of cybercrime, th Annual workshop on the economics of Information Security (WEIS), Berlin, Germany, - June, pp. -. [] Walther, B. Joseph,,Interpersonal effects in computer-mediated mediated interaction: A relational perspective.communication Research9, 99, Vol.,pp. 9. [] Olaniran, A. Bolanle Social Information Processing Theory (SIPT): A Cultural Perspective for International Online Communication Environments.IGI Global, pp. -. [7] T. DeMario, J. Beck, Developing D questionnaire items to measure identity theft developing questionnaire items to measure identity theft, American Association for Public Opinion Research AAPOR, Section on Survey Research Methods,,, pp 9. [] S. Ji, J. Wang, Q. Min, S. Smith-Chao, Systems Plan for Combating Identity Theft - A Theoretical Framework, International Conference onwireless Communications, Networking and Mobile Computing, 7. WiCom. - Sept. 7,pp.. [9] I. Bose, A.C.M. Leung, A comparative study of anti-phishing hing preparedness of Hong Kong and Singapore banks,7 IEEE International Conference on Industrial Engineering and Engineering Management, - Dec. 7, pp. 9-97 [] B. McCarty, Automated identity theft, IEEE Security & Privacy, Sept.-Oct., Vol., Issue, pp. 9-9X. References: [] S. Sproule, N. Archer, Defining Identity Theft, 7. Eighth World Congress on themanagement of ebusiness,, 7. WCMeB, - July 7, pp. [] D. Florêncio, C. Herley, The cybercrime wave that wasn t. The New York Times. Retrieved on April, from http://www.nytimes.com////opinion/s unday/the-cybercrime-wave-that- wasnt.html?_r= [] Norton Study Calculates Cost of Global Cybercrime. Retrieved eved February, from ISBN: 97----