Economics of Identity Theft (eBook)

Avoidance, Causes and Possible Cures

(Autor)

eBook Download: PDF
2007 | 2007
XV, 184 Seiten
Springer US (Verlag)
978-0-387-68614-1 (ISBN)

Lese- und Medienproben

Economics of Identity Theft - L. Jean Camp
Systemvoraussetzungen
53,49 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This professional book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and placing biometric security in an economically broken system, which results in a broken biometric system. The last chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status. While a plethora of books on identity theft exists, this book combines both technical and economic aspects, presented from the perspective of the identified individual.

 


Anyone who has ever bought a car, rented an apartment, had a job or conversation that they would rather not see in their employee review may find this book of interest. There is a collision occurring in identity management. Identity technologies are problematic, and many see light at the end of the identity theft tunnel. Yet the innovation is driven by individual tendencies to seek convenience and business imperatives to minimize risk with maximized profit. The light is an oncoming identity train wreck of maximum individual exposure, social risk and minimal privacy. The primary debate over identity technologies is happening on the issue of centralization. RealID is effectively a centralized standard with a slightly distributed back-end (e.g., fifty servers). RealID is a national ID card. Many mechanisms for federated identities, such as OpenID or the Liberty Alliance, imagine a network of identifiers shared on an as-needed or ad-hoc process. These systems accept the limits of human information processing, and thus use models that work on paper. Using models that work on paper results in systematic risk of identity theft in this information economy. There are alternatives to erosions of privacy and increasing fraud. There is an ideal where individuals have multiple devices, including computers, smart cards, and cell phones. Smart cards are credit card devices that are cryptographically secure. This may be shared and misused, or secure and privacy enhancing. Yet such a system requires coordinated investment.

List of Figures & Tables
List of Contributors 7
Preface 8
Acknowledgments 10
Table of Contents 11
1. Identity in Economics, and in Context 12
Where are Your Papers? 13
2. Modern Technological and Traditional Social Identities 16
Identity In a Community 16
Papers vs. Avatars 18
The Elements of Identity 22
3. Identity Theft 28
Avoiding Identity Theft, Individually 31
Identity versus Risk Management 36
4. Who Owns You? 44
Me@WhereIAm 45
Email Trust-Based Viruses 46
Possible Solutions 47
Federated Identity 49
CardSpace 52
Microsoft ID Card 54
Real ID 56
Implications of Different Identity Management Systems 58
5. Defeating the Greatest Masquerade 60
Web Spoofing and Scams 60
Third-Party Assertions of Identity 63
Proving Identity Through Personal Disclosure 66
Signaling Identities 67
6. Secrecy, Privacy, Identity 71
Laws of Identity 73
Privacy as Spatial 74
Data Protection 77
Autonomy 78
Property 79
Sign on the Virtual Line 80
7. Security and Privacy as Market Failures 83
Economics of Security 86
Economics of Privacy 88
8. Trusting Code and Trusting Hardware 92
9. Technologies of Identity 95
10. Anonymous Identifiers 98
11. Digital Signatures 107
The Public Key Infrastructure 108
End Note: What Are Public Keys 113
12. Strengths and Weaknesses of Biometrics 115
Introduction 115
Identification and Verification 116
Overview 116
Three Basic Elements of All Biometric Systems 117
Enrollment 117
Templates 118
Matching 118
Template Management, Storage and Security 119
Biometric Applications 122
Mainstream Biometrics 123
Classifying Biometric Applications 126
Salient Characteristics of Biometrics 128
Biometric Conclusions 130
13. Reputation 131
Proving Identity Through Social Networks 131
Functions and Authentication in P2P Systems 133
Peer Production and Identification 142
14. Scenario I: Your Credentials Please 146
Introduction 146
The State of Identity 146
The Path to Today 149
The Technology and Policies 151
Closing 151
15. Scenario II: Universal National Identifier 153
Introduction 153
The Path to Today 155
Motivation: Terror and Fraud 155
Early Efforts 156
A National ID System 157
Phase-in 158
The Technology and the Policy: Privacy Protection 160
Trust and Administration 162
The Future of UID 162
16. Scenario III: Sets of attributes 164
Introduction 164
The Evolution of Identity 164
How IDs are used in 2040 165
17. Scenario IV: Ubiquitous Identity Theft 167
The State of Identity 167
The Path to Today 169
18. Closing 175
19. References and Further Reading 177
20. Index 184
A 184
B 184
C 184
D 184
E 184
F 184
I 184
L 184
M 184
P 184
R 185
S 185
T 185
V 185

Erscheint lt. Verlag 30.9.2007
Zusatzinfo XV, 184 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften
Recht / Steuern Strafrecht Kriminologie
Sozialwissenschaften
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Wirtschaft Volkswirtschaftslehre
Schlagworte CAMP • Communication • Cryptology • data encryption • data structure • Economics • Good name • Identity • Identity Management • Information • Information Theory • Networks • privacy • SIGNATUR • Theft • Value
ISBN-10 0-387-68614-2 / 0387686142
ISBN-13 978-0-387-68614-1 / 9780387686141
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 5,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99