Abstract
In the year 2009 several data privacy scandals have hit the headlines where major corporations had a legitimate need for detecting fraud conducted by their own employees, but chose inappropriate measures for data screening. This contribution presents architectures and pseudonymization technology for privacy compliant fraud screening or fraud detection, in order to reduce the number of undiscovered fraud cases and to reduce the time to discovery.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, October 1995. http://europa.eu.int/eur-lex/en/lif/dat/1995/en_395L0046.html.
Johann Bizer. Sieben goldene Regeln des Datenschutzes (in German). Datenschutz und Datensicherheit, 31(5):350–356, 2007.
Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, and Frank Leymann. Insider Threats in Cybersecurity – And Beyond, chapter Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. Advances in Information Security. Springer, New York, 2010. To appear.
Ulrich Flegel. Privacy-Respecting Intrusion Detection, volume 35 of Advances in Information Security. Springer, New York, 2007.
Ulrich Flegel, Oliver Raabe, and Richard Wacker. Technischer Datenschutz für IDS und FDS durch Pseudonymisierung (in German). Datenschutz und Datensicherheit (DuD), 33(12):735–741, December 2009.
Ulrich Flegel, Julien Vayssière, and Gunter Bitz. Insider Threats in Cybersecurity – And Beyond, chapter A State of the Art Survey of Fraud Detection Technology. Advances in Information Security. Springer, New York, 2010. To appear.
Alexander Grosskopf, Gero Decker, and Mathias Weske. The Process: Business Process Modeling Using BPMN. Meghan Kiffer, 2009.
Peter Gemmel. An introduction to threshold cryptography. Cryptobytes, 2(3):7, 1997.
Andreas Knöpfel, Bernhard Gröne, and Peter Tabeling. Fundamental modeling concepts: Effective communication of IT systems. Wiley, 2006.
Association of Certified Fraud Examiners. Report to the nation on occupational fraud and abuse, 2006.
Reuters. German snooping scandal engulfs Airbus, April 2009.
Adi Shamir. How to share a secret. Communications of the ACM, 22:612–613, 1979.
Deutsche Welle. Spy scandal widens at German rail Deutsche Bahn, February 2009.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH
About this chapter
Cite this chapter
Flegel, U. (2011). Privacy Compliant Internal Fraud Screening. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2010 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9788-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9788-6_19
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-1438-8
Online ISBN: 978-3-8348-9788-6
eBook Packages: EngineeringEngineering (R0)