Economics of Identity Theft (eBook)
XV, 184 Seiten
Springer US (Verlag)
978-0-387-68614-1 (ISBN)
This professional book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and placing biometric security in an economically broken system, which results in a broken biometric system. The last chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status. While a plethora of books on identity theft exists, this book combines both technical and economic aspects, presented from the perspective of the identified individual.
Anyone who has ever bought a car, rented an apartment, had a job or conversation that they would rather not see in their employee review may find this book of interest. There is a collision occurring in identity management. Identity technologies are problematic, and many see light at the end of the identity theft tunnel. Yet the innovation is driven by individual tendencies to seek convenience and business imperatives to minimize risk with maximized profit. The light is an oncoming identity train wreck of maximum individual exposure, social risk and minimal privacy. The primary debate over identity technologies is happening on the issue of centralization. RealID is effectively a centralized standard with a slightly distributed back-end (e.g., fifty servers). RealID is a national ID card. Many mechanisms for federated identities, such as OpenID or the Liberty Alliance, imagine a network of identifiers shared on an as-needed or ad-hoc process. These systems accept the limits of human information processing, and thus use models that work on paper. Using models that work on paper results in systematic risk of identity theft in this information economy. There are alternatives to erosions of privacy and increasing fraud. There is an ideal where individuals have multiple devices, including computers, smart cards, and cell phones. Smart cards are credit card devices that are cryptographically secure. This may be shared and misused, or secure and privacy enhancing. Yet such a system requires coordinated investment.
List of Figures & Tables
List of Contributors 7
Preface 8
Acknowledgments 10
Table of Contents 11
1. Identity in Economics, and in Context 12
Where are Your Papers? 13
2. Modern Technological and Traditional Social Identities 16
Identity In a Community 16
Papers vs. Avatars 18
The Elements of Identity 22
3. Identity Theft 28
Avoiding Identity Theft, Individually 31
Identity versus Risk Management 36
4. Who Owns You? 44
Me@WhereIAm 45
Email Trust-Based Viruses 46
Possible Solutions 47
Federated Identity 49
CardSpace 52
Microsoft ID Card 54
Real ID 56
Implications of Different Identity Management Systems 58
5. Defeating the Greatest Masquerade 60
Web Spoofing and Scams 60
Third-Party Assertions of Identity 63
Proving Identity Through Personal Disclosure 66
Signaling Identities 67
6. Secrecy, Privacy, Identity 71
Laws of Identity 73
Privacy as Spatial 74
Data Protection 77
Autonomy 78
Property 79
Sign on the Virtual Line 80
7. Security and Privacy as Market Failures 83
Economics of Security 86
Economics of Privacy 88
8. Trusting Code and Trusting Hardware 92
9. Technologies of Identity 95
10. Anonymous Identifiers 98
11. Digital Signatures 107
The Public Key Infrastructure 108
End Note: What Are Public Keys 113
12. Strengths and Weaknesses of Biometrics 115
Introduction 115
Identification and Verification 116
Overview 116
Three Basic Elements of All Biometric Systems 117
Enrollment 117
Templates 118
Matching 118
Template Management, Storage and Security 119
Biometric Applications 122
Mainstream Biometrics 123
Classifying Biometric Applications 126
Salient Characteristics of Biometrics 128
Biometric Conclusions 130
13. Reputation 131
Proving Identity Through Social Networks 131
Functions and Authentication in P2P Systems 133
Peer Production and Identification 142
14. Scenario I: Your Credentials Please 146
Introduction 146
The State of Identity 146
The Path to Today 149
The Technology and Policies 151
Closing 151
15. Scenario II: Universal National Identifier 153
Introduction 153
The Path to Today 155
Motivation: Terror and Fraud 155
Early Efforts 156
A National ID System 157
Phase-in 158
The Technology and the Policy: Privacy Protection 160
Trust and Administration 162
The Future of UID 162
16. Scenario III: Sets of attributes 164
Introduction 164
The Evolution of Identity 164
How IDs are used in 2040 165
17. Scenario IV: Ubiquitous Identity Theft 167
The State of Identity 167
The Path to Today 169
18. Closing 175
19. References and Further Reading 177
20. Index 184
A 184
B 184
C 184
D 184
E 184
F 184
I 184
L 184
M 184
P 184
R 185
S 185
T 185
V 185
Erscheint lt. Verlag | 30.9.2007 |
---|---|
Zusatzinfo | XV, 184 p. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Naturwissenschaften | |
Recht / Steuern ► Strafrecht ► Kriminologie | |
Sozialwissenschaften | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
Wirtschaft ► Volkswirtschaftslehre | |
Schlagworte | CAMP • Communication • Cryptology • data encryption • data structure • Economics • Good name • Identity • Identity Management • Information • Information Theory • Networks • privacy • SIGNATUR • Theft • Value |
ISBN-10 | 0-387-68614-2 / 0387686142 |
ISBN-13 | 978-0-387-68614-1 / 9780387686141 |
Haben Sie eine Frage zum Produkt? |
Größe: 5,8 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich