Skip to main content

On the Statistical Dependency of Identity Theft on Demographics

  • Conference paper
Protecting Persons While Protecting the People (ISIPS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5661))

Included in the following conference series:

  • 602 Accesses

Abstract

An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. US Dept. of Justice website, http://www.usdoj.gov/criminal/fraud/websites/idtheft.html

  2. Consumer Fraud and Identity Theft Complaint Data 2005 and 2006, FTC, http://www.consumer.gov/sentinel/pubs/Top10Fraud{2005,2006}.pdf

    Google Scholar 

  3. The 1998 Identity Theft and Assumption Deterrence Act, http://www.ftc.gov/os/statutes/itada/itadact.htm

  4. Announcement of the Release of the Presidents Identity Theft Task Force Comprehensive Strategic Plan (April 2007), http://www.sec.gov/news/press/2007/2007-69.htm

  5. Law enforcement publications related to identity theft from the Federal Trade Commission, http://www.ftc.gov/bcp/edu/microsites/idtheft/law-enforcement/law-enforcement-publications.html

  6. http://internetcommunications.tmcnet.com/topics/broadband-mobile/articles/13757-fed-takes-steps-against-id-theft.htm

  7. http://www.forbes.com/markets/feeds/afx/2007/10/31/afx4284882.html

  8. ACM CCS 2007 Workshop on Digital Identity Management (DIM 2007) (November 2007), http://www2.pflab.ecl.ntt.co.jp/dim2007/

  9. DIMACS Workshop on Theft in E-Commerce: Content, Identity, and Service, DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ (April 2005), http://dimacs.rutgers.edu/Workshops/Intellectual/

  10. Kutner, M., Nachtsheim, C., Neter, J.: Applied Linear Regression Models, 4th edn. McGraw Hill, New York (2004)

    Google Scholar 

  11. Miller, A.: Subset Selection in Regression, 4th edn. Chapman and Hall, Boca Raton (1990)

    MATH  Google Scholar 

  12. DeGroot, M., Schervish, M.: Probability and Statistics, 3rd edn. Addison-Wesley, Reading (2002)

    Google Scholar 

  13. Federal Trade Commission’s Consumer Sentinel Network, http://www.ftc.gov/sentinel/reports/sentinel-annualmsa-reports/topidttheft-msa2006.pdf

  14. http://www.city-data.com/

  15. Federal Trade Commission’s Consumer Sentinel Network, http://www.ftc.gov/sentinel/

  16. http://en.wikipedia.org/wiki/Variance_inflation_factor

  17. Di Crescenzo, G., Cochinwala, M., Shim, H.: Modeling Cryptographic Properties of Voice and Voice-based Entity Authentication. In: Proc. of ACM CCS 2007 Workshop on Digital Identity Management (DIM 2007). ACM Press, New York (2007)

    Google Scholar 

  18. Di Crescenzo, G., Lipton, R., Walfish, S.: Perfectly-Secure Password Protocols in the Bounded Retrieval Model. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 225–244. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  19. De Santis, A., Di Crescenzo, G., Persiano, G.: Communication-Efficient Group Identification. In: Proc. of 5th ACM Conference on Computers and Communication Security (ACM CCS 1998). ACM Press, New York (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Di Crescenzo, G. (2009). On the Statistical Dependency of Identity Theft on Demographics. In: Gal, C.S., Kantor, P.B., Lesk, M.E. (eds) Protecting Persons While Protecting the People. ISIPS 2008. Lecture Notes in Computer Science, vol 5661. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10233-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10233-2_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10232-5

  • Online ISBN: 978-3-642-10233-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics