Document Type
Conference Proceeding
Publisher
School of Computer and Information Science, Edith Cowan University
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Information Science
RAS ID
3237
Abstract
A substantial quantity of research has previously been conducted into the identification and application of measures related to the detection and prevention of identity theft and identity fraud. In the current security conscious environment, the concept of creating an artificial identity is generally met with both caution and suspicion. Much of the attention placed on the concept of identity fabrication has been focused on the unlawful or the malicious use of created identities. Admittedly, the primary intention of a falsified identity is to usually gain a financial benefit however, instances such as long-term witness protection would provide a legitimate need for the use of an alias identity for the purposes of protection. Previous research associated with the development and potential uses of a manufactured identity is somewhat limited and any references to a developed identity are quickly associated with various aspects of computer and electronic crime and the appropriate preventative or protective procedures.In order to address the imbalance, this article has been developed in an attempt to determine the theoretical framework involved with the development of a secondary identity and the necessary process that are likely to be involved in the " construction" of an alternate identity.
Comments
Hopkins, L. (2005). Identity synthesis: Creating an identity from scratch. In Proceedings of the 3rd Australian Information Security Management Conference (p. 27-32). Edith Cowan University. Available here