DocumentCode
175371
Title
Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories
Author
Yongpeng Yang ; Manoharan, Manmohan ; Barber, K. Suzanne
Author_Institution
Dept. of Electr. & Comput. Eng., Univ. of Texas at Austin, Austin, TX, USA
fYear
2014
fDate
24-26 Sept. 2014
Firstpage
184
Lastpage
191
Abstract
Identity theft, fraud, and abuse are problems affecting all market sectors in society. Identity theft is often a "gateway" crime, as criminals use stolen or fraudulent identities to steal money, claim eligibility for services, hack into networks without authorization, and so on. The available data describing identity crimes and their aftermath is often in the form of recorded stories and reports by the news press, fraud examiners, and law enforcement. All of these sources are unstructured. Hence, in order to analyze identity theft data, this research proposes an approach which involves the collection of online news stories and reports on the topic of identity theft. Our approach preprocesses the raw text and extracts semi-structured information automatically, using text mining techniques. This paper presents statistical analysis of behavioral patterns and resources used by thieves and fraudsters to commit identity theft, including the identity attributes commonly linked to identity crimes, resources thieves employ to conduct identity crimes, and temporal patterns of criminal behavior. Analyses of these results increase empirical understanding of identity threat behaviors, offer early warning signs of identity theft, and thwart future identity theft crimes.
Keywords
data analysis; data mining; police data processing; text analysis; criminal behavior; gateway crime; identity theft stories; identity threat behavior; semistructured information extraction; text mining; theft data analysis; Analytical models; Government; Internet; Security; Text mining; PII attribute; identity theft; news stories; text mining;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint
Conference_Location
The Hague
Print_ISBN
978-1-4799-6363-8
Type
conf
DOI
10.1109/JISIC.2014.35
Filename
6975571
Link To Document