메뉴 건너뛰기




Volumn , Issue , 2007, Pages 67-78

ID theft: A computer forensics' investigation framework

Author keywords

Computer crime; Computer forensic investigator; Computer forensics; Digital evidence; Id theft; Incident investigation

Indexed keywords

DIGITAL EVIDENCE; ID THEFT; INCIDENT INVESTIGATION; INTERNET USERS; ONLINE IDENTITY; ONLINE SHOPPING; PRIVATE INFORMATION;

EID: 84867713017     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (16)
  • 1
    • 19844379355 scopus 로고    scopus 로고
    • A hierarchical, objectives-based framework for the digital investigations process
    • June 2005
    • Beebe N.L., Clark J. G, 2005, A hierarchical, objectives-based framework for the digital investigations process, Digital Investigation, Volume 2, Issue 2, June 2005, Pages 147-167.
    • (2005) Digital Investigation , vol.2 , Issue.2 , pp. 147-167
    • Beebe, N.L.1    Clark, J.G.2
  • 2
    • 77952355042 scopus 로고    scopus 로고
    • Categories of digital investigation analysis techniques based on the computer history model
    • September 2006, Carrier B. 2006, Basic Digital Forensic Investigation Concepts, Internet, Available from:, [Last Accessed: 12/03/2007]
    • Carrier B.D., Spafford E.H., 2006, Categories of digital investigation analysis techniques based on the computer history model, Digital Investigation Volume 3, Supplement 1, September 2006, Pages 121-130 The Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06) Carrier B., 2006, Basic Digital Forensic Investigation Concepts, Internet, Available from: http://www.digitalevidence.org/di-basics.html, [Last Accessed: 12/03/2007].
    • (2006) The Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06) , vol.3 , Issue.SUPPL. 1 , pp. 121-130
    • Carrier, B.D.1    Spafford, E.H.2
  • 3
    • 0037387448 scopus 로고    scopus 로고
    • Determining intent- Opportunistic vs targeted attacks
    • April
    • Casey, E., April 2003, Determining Intent - Opportunistic vs Targeted Attacks, Computer Fraud & Security, Volume 2003, Issue 4, pp. 8-11.
    • (2003) Computer Fraud & Security , vol.2003 , Issue.4 , pp. 8-11
    • Casey, E.1
  • 4
    • 84867714874 scopus 로고    scopus 로고
    • Academic Press Inc.U.S. ISBN-10: 0123693756, Chapter 1: A History of Crime Reconstruction
    • Chisum W.J., Turvey B., 2006, Crime Reconstruction, Academic Press Inc., U.S., ISBN-10: 0123693756, Chapter 1: A History of Crime Reconstruction, p.23.
    • (2006) Crime Reconstruction , pp. 23
    • Chisum, W.J.1    Turvey, B.2
  • 5
    • 84867723151 scopus 로고    scopus 로고
    • Is identity theft serious?
    • Available from:, [Last Accessed: 14/09/2007]
    • CIFAS, 2007, Is Identity Theft Serious?, Internet, Available from: http://www.cifas.org.uk/default.asp?edit-id=556-56, [Last Accessed: 14/09/2007].
    • (2007) Internet
  • 7
    • 53549122113 scopus 로고    scopus 로고
    • Federal Trade Commission, February, January - December 2004. pdf, downloaded from:, [Last Accessed: 11/09/2007]
    • Federal Trade Commission, February 2005, National and State Trends in Fraud & Identity Theft, January - December 2004., pdf, downloaded from: http://www.ftc.gov/opa/2005/02/top102005.htm [Last Accessed: 11/09/2007].
    • (2005) National and State Trends in Fraud & Identity Theft
  • 8
    • 39349087810 scopus 로고    scopus 로고
    • Federal Trade Commission, February, January - December 2006, .pdf, downloaded from:, [Last Accessed: 14/09/2007]
    • Federal Trade Commission, February 2007, Consumer Fraud and Identity Theft Complaint Data, January - December 2006, .pdf, downloaded from: http://www.consumer.gov/sentinel/pubs/Top10Fraud2006.pdf [Last Accessed: 14/09/2007].
    • (2007) Consumer Fraud and Identity Theft Complaint Data
  • 9
    • 84867709951 scopus 로고    scopus 로고
    • Home Office Identity Fraud Steering Committee, [Last Accessed: 02/04/2007]
    • Home Office Identity Fraud Steering Committee, 2006, http://www.identity- theft.org.uk, [Last Accessed: 02/04/2007].
    • (2006)
  • 10
    • 84867714872 scopus 로고    scopus 로고
    • H. R. 2622, Fair and Accurate Credit Transactions Act of 2003, H. R. 2622, 2003, Internet, Available from:, [Last Accessed: 11/09/2007
    • H. R. 2622, Fair and Accurate Credit Transactions Act of 2003, H. R. 2622, Fair and Accurate Credit Transactions Act of 2003, 2003, Internet, Available from: http://financialservices.house.gov/media/pdf/108hr2622ai.pdf [Last Accessed: 11/09/2007].
    • Fair and Accurate Credit Transactions Act of 2003
  • 11
    • 0004265173 scopus 로고
    • O'Reilly, ISBN: 1-56592-086-4 ID Theft and Assumption Deterrence Act, 1998, available from:, United States Code, § 003 (7), 30/10/1998 [Last Accessed: 11/09/2007
    • Icove D. et al., 1995, Computer Crime, A Crimefighter's Handbook, O'Reilly, ISBN: 1-56592-086-4 ID Theft and Assumption Deterrence Act, 1998, available from: http://www.ftc.gov/os/statutes/itada/itadact.htm, United States Code, § 003 (7), 30/10/1998 [Last Accessed: 11/09/2007].
    • (1995) Computer Crime, A Crimefighter's Handbook
    • Icove, D.1
  • 13
    • 2942740967 scopus 로고    scopus 로고
    • Cyber attacks on banks double from 2003
    • McKenna B., 2004, Cyber attacks on banks double from 2003, Computer Fraud and Security, Volume 2004, Issue 6, Page 3.
    • (2004) Computer Fraud and Security , vol.2004 , Issue.6 , pp. 3
    • Mckenna, B.1
  • 14
    • 69349085858 scopus 로고    scopus 로고
    • Postnote Computer Crime, October, Number 271, Available from:, [Last Accessed: 25/04/2007]
    • Postnote Computer Crime, October 2006, Parliamentary Office of Science and Technology, Number 271, Available from: http://www.parliament.uk/documents/ upload/postpn271.pdf [Last Accessed: 25/04/2007].
    • (2006) Parliamentary Office of Science and Technology
  • 15
    • 0003370628 scopus 로고    scopus 로고
    • The general assumptions and rationale of forensic identification
    • David L. Faigman, David H. Kaye, Michael J. Saks, & Joseph Sanders, St. Paul: West Publishing Co
    • Thornton, J.I., 1997, "The General Assumptions And Rationale Of Forensic Identification", in David L. Faigman, David H. Kaye, Michael J. Saks, & Joseph Sanders, Modern Scientific Evidence: The Law And Science Of Expert Testimony, vol. 2, St. Paul: West Publishing Co.
    • (1997) Modern Scientific Evidence: The Law and Science of Expert Testimony , vol.2
    • Thornton, J.I.1
  • 16
    • 84867701859 scopus 로고    scopus 로고
    • unknown, 26/03/, Available from:, [Last Accessed: 03/09/2007]
    • unknown, 26/03/2007, One in ten Britons victim to online fraud, Available from: http://www.inthenews.co.uk/news/news/finance/one-in-ten-britons-victim- online-fraud-$1071167.htm [Last Accessed: 03/09/2007].
    • (2007) One in Ten Britons Victim to Online Fraud


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.