Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $42.00
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
23Activity

Table Of Contents

Executive Summary
Part I. The Scope of Online Identity Theft
Chapter 1. The Problem Posed by Online Identity Theft
A new Internet landscape
What is identity theft?
ID theft’s main elements
Chapter 2. Online Identity Theft: Tools of the Trade
ID theft based solely on malware5
Key drivers of online ID theft: Phishing and its variants
Phishing techniques
Phishing evolution and trends
Chapter 3. The Impact of Online Identity Theft
Defining the victims
Victims’ direct and indirect losses
Are there more victims off line than on line?24
Remediation tools for victims
Part II. Addressing Online Identity Theft
Chapter 4. The Role of Government
How OECD countries currently define ID theft
The option of criminalising ID theft
Public education and awareness campaigns
Annex 4.2 United States Initiatives to Combat Identity Theft
A serious private-sector threat
Chapter 6. International, Bilateral and Regional Initiatives
International organisations
International informal networks
Annex 6.1 Multilateral Instruments Addressing Online ID Theft
Annex 6.2 United Nations Study on Identity Fraud
Chapter 7. Online Identity Theft: What Can Be Done?
Enhancing education and awareness
Dissemination of information
Co-ordination of education initiatives
Authentication and data security
Electronic authentication
Areas for further work
Chapter 8. Conclusions and Recommendations
Part III. OECD Policy Guidance on Online Identity Theft
I. Introduction
III. Data security
IV. Electronic authentication
V. Further work
Glossary
Bibliography
P. 1
Online Identity Theft

Online Identity Theft

Ratings:

4.0

(1)
|Views: 9,094|Likes:
Published by OECD Publications
Using widely available Internet tools, internet thieves trick unsuspecting computer users into providing personal data, which they then use for illicit purposes, causing mistrust of online payment and banking services. This book defines identity theft and studies how it is perpetrated, outlines what is being done to combat the major types of ID theft, and recommends specific ways that ID theft can be addressed in an effective, global manner.
Using widely available Internet tools, internet thieves trick unsuspecting computer users into providing personal data, which they then use for illicit purposes, causing mistrust of online payment and banking services. This book defines identity theft and studies how it is perpetrated, outlines what is being done to combat the major types of ID theft, and recommends specific ways that ID theft can be addressed in an effective, global manner.

More info:

Publish date: Apr 2009
Added to Scribd: Sep 13, 2010
Copyright:Traditional Copyright: All rights reservedISBN:9789264056589
List Price: $42.00 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
See more
See less

08/14/2013

141

9789264056589

$42.00

USD

You're Reading a Free Preview
Pages 4 to 85 are not shown in this preview.
You're Reading a Free Preview
Pages 89 to 141 are not shown in this preview.

Activity (23)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
neha16sept liked this
Shiru AmaniShiru liked this
Derera James liked this
Seham Tolba liked this
Dan liked this
Lavanya Reddy liked this

You're Reading a Free Preview

Download