Skip to main content

Privacy Compliant Internal Fraud Screening

  • Chapter
ISSE 2010 Securing Electronic Business Processes

Abstract

In the year 2009 several data privacy scandals have hit the headlines where major corporations had a legitimate need for detecting fraud conducted by their own employees, but chose inappropriate measures for data screening. This contribution presents architectures and pseudonymization technology for privacy compliant fraud screening or fraud detection, in order to reduce the number of undiscovered fraud cases and to reduce the time to discovery.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, October 1995. http://europa.eu.int/eur-lex/en/lif/dat/1995/en_395L0046.html.

  • Johann Bizer. Sieben goldene Regeln des Datenschutzes (in German). Datenschutz und Datensicherheit, 31(5):350–356, 2007.

    Article  Google Scholar 

  • Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, and Frank Leymann. Insider Threats in Cybersecurity – And Beyond, chapter Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. Advances in Information Security. Springer, New York, 2010. To appear.

    Google Scholar 

  • Ulrich Flegel. Privacy-Respecting Intrusion Detection, volume 35 of Advances in Information Security. Springer, New York, 2007.

    Google Scholar 

  • Ulrich Flegel, Oliver Raabe, and Richard Wacker. Technischer Datenschutz für IDS und FDS durch Pseudonymisierung (in German). Datenschutz und Datensicherheit (DuD), 33(12):735–741, December 2009.

    Article  Google Scholar 

  • Ulrich Flegel, Julien Vayssière, and Gunter Bitz. Insider Threats in Cybersecurity – And Beyond, chapter A State of the Art Survey of Fraud Detection Technology. Advances in Information Security. Springer, New York, 2010. To appear.

    Google Scholar 

  • Alexander Grosskopf, Gero Decker, and Mathias Weske. The Process: Business Process Modeling Using BPMN. Meghan Kiffer, 2009.

    Google Scholar 

  • Peter Gemmel. An introduction to threshold cryptography. Cryptobytes, 2(3):7, 1997.

    Google Scholar 

  • Andreas Knöpfel, Bernhard Gröne, and Peter Tabeling. Fundamental modeling concepts: Effective communication of IT systems. Wiley, 2006.

    Google Scholar 

  • Association of Certified Fraud Examiners. Report to the nation on occupational fraud and abuse, 2006.

    Google Scholar 

  • Reuters. German snooping scandal engulfs Airbus, April 2009.

    Google Scholar 

  • Adi Shamir. How to share a secret. Communications of the ACM, 22:612–613, 1979.

    Article  MATH  Google Scholar 

  • Deutsche Welle. Spy scandal widens at German rail Deutsche Bahn, February 2009.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH

About this chapter

Cite this chapter

Flegel, U. (2011). Privacy Compliant Internal Fraud Screening. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2010 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9788-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9788-6_19

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-1438-8

  • Online ISBN: 978-3-8348-9788-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics