The Role of Identity Theft in Identity and Access Management

The Australian Federal Police (https://www.afp.gov.au/what-we-do/crime-types/fraud/identity-crime) report that identity crime has critically threatened the Australian community as this type of crime has generated significant profits for offenders and caused considerable financial losses to the Australian Government, private industry and individuals. Recent estimates by the Attorney-General's Department indicate that identity crime costs Australia upwards of $1.6 billion each year, with the majority (around $900m) lost by individuals through credit card fraud, identity theft and scams. More alarmingly, identity crime continues to be a key enabler of serious and organised crime, which in turn costs Australia around $15 billion annually. This chapter discusses how personal identities can be stolen and exploited and proposes a Self-learning Context Aware Identity Access and Management Framework (SCAIAM) for combating identity theft.

Author(s):  
Miguel M. Pereira

Abstract Prior research suggests that partisanship can influence how legislators learn from each other. However, same-party governments are also more likely to share similar issues, ideological preferences and constituency demands. Establishing a causal link between partisanship and policy learning is difficult. In collaboration with a non-profit organization, this study isolates the role of partisanship in a real policy learning context. As part of a campaign promoting a new policy among local representatives in the United States, the study randomized whether the initiative was endorsed by co-partisans, out-partisans or both parties. The results show that representatives are systematically more interested in the same policy when it is endorsed by co-partisans. Bipartisan initiatives also attract less interest than co-partisan policies, and no more interest than out-partisan policies, even in more competitive districts. Together, the results suggest that ideological considerations cannot fully explain partisan-based learning. The study contributes to scholarship on policy diffusion, legislative signaling and interest group access.


2019 ◽  
Vol 38 (2) ◽  
pp. 368-383
Author(s):  
King Yin Wong ◽  
Michael Lynn

Purpose The extant literature has mixed results regarding the credit card cue effect. Some showed that credit card cues stimulate spending, whereas others were unable to replicate the findings or found that cues discourage consumer spending. The purpose of this paper is to investigate how consumers’ sensitivity to the pain of payment affects their mental associations about credit cards and how the differences in credit card associations moderate the credit card cue effect on spending, providing a possible explanation for the mixed results in the literature. Furthermore, this paper examines the role of consumers’ perceived financial well-being, measured by their perceptions of current and future wealth and their sense of financial security, in mediating this moderation effect. Design/methodology/approach An experimental study was conducted with a sample of 337 participants to test the hypothesized model. Findings After being shown credit card cues, spendthrift participants had more spending-related thoughts and less debt-related thoughts, perceived themselves as having better financial well-being and consequently spent more than tightwad participants. Originality/value To the authors’ knowledge, this is the first study to investigate the direct link between an exposure to credit card cues and perceived financial well-being, and one of the few to show evidence of the moderating effect of consumers’ sensitivity to the pain of payment on spending when credit card cues are present. This study suggests that marketers may use credit card cues to promote consumer spending, whereas consumers, especially spendthrifts, should be aware of how credit card cues may inflate their perceived financial well-being and stimulate them to spend more.


Birth ◽  
2004 ◽  
Vol 31 (2) ◽  
pp. 117-124 ◽  
Author(s):  
Ruth Walker ◽  
Deborah Turnbull ◽  
Chris Wilkinson

1986 ◽  
Vol 21 (1) ◽  
pp. 40-47
Author(s):  
Richard M. Neustadt

Since this is a legal seminar, I thought it would be appropriate to begin with a case. There is a person in Los Angeles who has been operating an electronic bulletin board on his personal computer. What that means is that he has memory attached to his computer, and it is possible for anyone else in the country with a computer to dial into that bulletin board and leave a message automatically in the memory. That message can then be accessed by anyone else who dials in.This person does not exercise any control over the messages that are put in. It is open to anyone who wants to put a message in there. Somebody put into that bulletin board the telephone credit card number of a rich person. Subsequently, many other people dialed into the bulletin board, got the telephone credit card number and charged phone calls to that person. No one knows where the number came from. The board operator was prosecuted under a criminal charge. The question is, is he liable?


2021 ◽  
Vol 11 (11) ◽  
pp. 1405-1415
Author(s):  
Omar Jabak

The present study aimed to explore the role of English songs in Saudi students’ self-learning of English as a foreign language. The study employed one data collection tool which was an online questionnaire. The questionnaire was completed by 38 Saudi students at the Community College of King Saud University in the second semester of the academic year 2020. The examination and analysis of the data showed that listening to English songs motivated the Saudi students to learn English in a self-study mode, augmented their English vocabulary, improved their speaking skill and developed their spelling or writing skill to a considerable extent. It is, therefore, recommended that more large-scale quantitative or qualitative studies on the role of English songs in Saudi students’ self-learning of English as a foreign language be conducted to confirm the findings of the present study, challenge them or yield new ones.


Learning in Massive Open Online Courses (MOOCs) necessitates learners to be capable of self-regulating their learning in order to oversee and adapt their behaviour and actions in certain learning settings. Studies have highlighted that learners who have good control of self-regulation in their learning, either formal or informal learning contexts, utilise more competent learning strategies in online learning context. Nevertheless, MOOCs attract a diverse range of learners, each with different experience and satisfaction. The aim of this study is to examine the role of self-regulated learning (SRL) and its components (time management, planning, self-evaluation, and help-seeking) on learners’ satisfaction in MOOC. Data were collected from 281 learners of a Malaysia MOOC namely Asas Keusahawanan (Introduction to Entrepreneurship), in the second semester of the Malaysian universities academic calendar. A cross-sectional web-based survey was applied and a Partial Least Square (PLS) approach was use for analysing data. Findings indicated that all of SRL components except help-seeking are important factors for explaining learners’ satisfaction in a MOOC. This study provides useful suggestions for the course designers of MOOCs platforms, and the facilitators in engaging learners with suitable SRL strategies and increase the level of course satisfaction.


Author(s):  
N. Qwynne Lackey ◽  
Kelly Bricker

Concessioners play an important role in park and protected area management by providing visitor services. Historically, concessioners were criticized for their negative impacts on environmental sustainability. However, due to policy changes, technological advances, and shifting market demands, there is a need to reevaluate the role of concessioners in sustainable destination management in and around parks and protected areas. The purpose of this qualitative case study situated in Grand Teton National Park (GTNP), which was guided by social exchange theory, was to explore U.S. national park concessioners’ influence on sustainable development at the destination level from the perspective of National Park Service (NPS) staff, concessioners, and local community members. Sustainability was examined holistically as a multifaceted construct with integrated socioeconomic, cultural, and environmental dimensions. Twenty-three participants completed semistructured interviews. Researchers identified four thematic categories describing concessioners’ influence on sustainability; motivations and barriers to pursuing sustainability initiatives; and situational factors that facilitated concessioners’ sustainability actions. While participants commented on the negative environmental impacts of concessioners and their operations, these data suggest that concessioners were working individually and collaboratively to promote environmental, socioeconomic, and cultural sustainability in and around GTNP. Some concessioners were even described as leaders, testing and driving the development of innovative sustainability policies and practices. These actions were motivated, in part, by contractual obligations and profit generation. However, concessioners also had strong intangible motivators, such as intrinsic values and a strong sense of community, that drove their positive contributions to sustainability. Based on these data, we recommend that those involved in future theoretical and practical work with concessioners acknowledge the importance of both tangible and intangible motivators when attempting to promote higher levels of sustainability achievement and collaboration. This will become increasingly important as land management agencies continue to embrace strategies beyond the traditional “parks as islands” approach to management. Additionally, future work should explore more specifically the role of policy, conceptualizations of sustainability, and private industry sponsorship in promoting concessioners’ contributions to sustainability, especially in collaborative settings. This work is needed to understand if and how these observations generalize to other contexts.


2021 ◽  
pp. 88-108
Author(s):  
Roderic Broadhurst

This chapter describes the definitions and scope of cybercrime including an outline of the history of hackers and the role of criminal networks and markets in the dissemination of malicious software and other contraband such as illicit drugs, stolen credit cards and personal identification, firearms, and criminal services. Different cybercrime types and methods are described, including the widespread use of ‘social engineering’ or deception in computer misuse and identity theft. The challenges facing law enforcement in the suppression of cybercrime and the important role of private and public partnerships, as well as cross-national cooperation in the suppression of cybercrime is illustrated.


Sign in / Sign up

Export Citation Format

Share Document