Content Analysis of Online Documents on Identity Theft Using Latent Dirichlet Allocation Algorithm

Devine Grace D. Funcion

Abstract


Victims of identity theft are growing as technology progresses. The increasing number of digital transactions (i.e., credit cards, online payment, banking) have become vulnerable to the cybercrime. Victims suffer from social and economic sabotage due to identity fraud. It is vital to dig available documents of the countries which have the most cases of identity theft as shown in Google trends for the past five years. Hence, this work is anchored on web mining technique and utilizes the unsupervised machine learning with the application of Latent Dirichlet Allocation Algorithms for content analysis of online information related to identity theft. The five identified underlying theme was generated using the R-programming software for data analysis,and literature supports discussion.

Keywords


Cybercrime; identity theft; latent dirichlet allocation algorithm; unsupervised machine learning

Full Text:

JSET006

References


ABS-CBN News (2012). Call center agent arrested for facebook ‘identity theft’. Retrievedfromhttp://news. abs-cbn.com/ -depth/04/20/12/ call-center- agentarrested-facebook-identity-theft

Abramowitz, M., & Stegun, I. A. (1966). Handbook of mathematical functions. AppliedMathematicsSeries,55(62).

Allison, S. F., Schuck, A. M., & Lersch, K. M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of CriminalJustice,33(1),19-29.

Andrea F., Michael B., Stephanie E.,(2012). Identity theft soars as technology races forward. Retrieve from: https:// theimpactnews.com/ specialreport-archive/ 2012/02/23/ identity- theftsoars-as-technology-races-forward/

Australian Federal Police. (n.d.). Identity crime. Retrieve from https:// www.afp.gov.au/ what- we- do/ crimetypes/fraud/identity-crime

Australian Law Reform Commission. (n.d.). Other responses to identity theft. Retrieved from http:// www.alrc.gov.au/ publications/12. %20Identity %20Theft/ other-responses-identity-theft

BBC News. (2015). Number of Identity victims ‘rises by a third.’ Retrieved from http://www.bbc.com/news/uk-32890979BBC Watchdog. (n.d.). Identity fraud. Retrieved from http:// www.bbc.co.uk/ programmes/ articles/ Pmw0JZLRc 3T2NGT8nv78JJ/identity-fraud

Berghel, H. (2001). Cyberprivacy in the new millennium. Computer,34(1),132-134.

Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009). All your contacts belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th International conference on World Wide Web,pp. 551-560.

Brody, R. G., Mulig, E., & Kimball, V. (2007). Phishing, pharming and identity theft. Academy of Accounting and Financial StudiesJournal,11(3),43.

BureauofJusticeStatistics(2013). Victimsof identitytheft. Retrievedfromhttps://www. bjs. gov/content/pub/pdf/vit12. pdf

Bureau of Justice Statistics (2015). 17.6 millionU.S.residentsexperiencedidentity theftin2014. Retrievedfromhttps://www. bjs. gov/content/pub/press/vit14pr. cfm

Bureau of Justice Statistics (2015), Victims of identity theft 2014. Retrieved from https:// www. bjs. gov/ content/ pub/ pdf/ vit14 sum. pdfApril10,2017.

Canadian Consumer Handbook (2017). Identity theft. Retrieved from http:// www.consumerhandbook.ca/ en/topics /consumer-protection/identity-theft

Chawki, M., & Abdel Wahab, M. (2006). Identity theft in cyberspace: Issues and solutions.

Copes, H. & Vieraitis, L. 2007. Identity theft: Assessing offenders’ strategies and perceptions of risk. Technical Report for NationalInstituteofJustice.

Copes, H., &Vieraitis, L.M.(2009). Bounded rationality of identity thieves: Using offender-based research to inform policy. Criminology & Public Policy, 8(2), 237262.

DelaPaz,C.(2016). Advicefrombanks: How topreventidentitytheft’Theweakestlinkin asocialnetworkistheonepersonwhodid not protect himself or herself’. Retrieved from http:// www.rappler.com/ business/ 130326- comelec -data- breach-identitytheft

Douglas, R. (2017). Identity theft victim statistics. Retrieved from http://www.identitytheft.info/victims.aspx

Edwards, M. (2015). Identity theft: More than 770,000 Australian victims in past year. Retrieved from http:// www.abc.net.au/ news/ 2015- 04- 14/ identity -theft -hits -australians-veda/6390570

Federal Bureau of Investigation (2003). Role of FBI in Cybercrime. Retrieved from https:// archives.fbi.gov/ archives/ news/ testimony/the-fbis-cyber-division

Gercke, M. (2012). Understanding cybercrime: Phenomena, challenges, and legal responses. Retrieved from http:// www.itu.int/ ITU-D/cyb/ cybersecurity/ docs/ Cybercrime %20legislation %20EV6.pdf

GMANewsOnline(2015). Top5cybercrimes complaints in the Philippines, according to PNP. Retrieved from: http:// www.gmanetwork.com/ news/ scitech/ technology/ 534597/ top-5- cybercrimescomplaints-in-the-philippines-accordingto-pnp/story#sthash. JW9Rc8FU.dpuf

He, B. Z., Chen, C. M., Su, Y. P., & Sun, H. M. (2014). A defense scheme against identity theft attack based on multiple social networks. Expert Systems with Applications,41(5),2345-2352.

Holmes, T. E. (2015). Credit card fraud and ID theft statistics. Retrieved from http:// www.nasdaq.com/ article/ credit- card -fraud-and-id-theft-statistics-cm520388 #ixzz4hQ3KWlxw

Identity Theft Resource Center (2017). Protect yourself against identity theft in social media. Retrieved from: http:// www.idtheftcenter.org/ Cybersecurity/ protect- yourself -against- identity- theftin-social-media.html

Identity Theft Resource Center. (n.d.). ITRC Fact Sheet 138 Social Networking and Identity Theft. Retrieved from http://www.idtheftcenter.org/ Fact- Sheets/ fs138.html. Inquirer.net (2013). Tips to avoid becoming an identity theft victim. Retrieved from http://technology.inquirer.net/25769/tipsto- avoid- becoming- an- identity -theft#ixzz4dRCnDuY1

Internal Revenue Service (2015). IRS’s Top ten identity theft prosecutions: Part of ongoing efforts to protect taxpayers, prevent refund fraud. Retrieved from https://www.irs.gov/uac/newsroom/irs-stop-ten-identity-theft-prosecutions

Johnson, R. & Trim, S. (2012). Social media use among most-at-risk Populations in Jamaica. Retrieved from https:// c-changeprogram.org/ sites/ default/ files/ Social-Media-Assessment-Jamaica.pdf.

Cabuenas, J.K. (2016). Bangko Sentral warns against identity theft in wake of ’Comeleak’ . Retrieved from http:// www.gmanetwork.com/ news/ story/ 563991/ scitech/ technology/ bangkosentral -warns -against -identity -theft -in -wake-of-comeleak

Kaur, G. (2016). Social media marketing. Asian Journal of Multidisciplinary Studies, 4(7).

Landau, I. (2015). How to prevent identity theft. Retrieved from http:// www.newsweek.com/ how- preventidentity- theft- 381649? utm ssource= internal&utm scampaign=incontent&utm smedium=related1

Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoreticalandempiricalanalysis. Deviant Behavior,37(3),263-280.

LoPucki, L. M. (2001). Human identification theory and the identity theft problem. Retrieved from http:// heinonline.org/ HOL /LandingPage? collection= journals& handle= hein.journals/ tlr80& div=12& id=&page=

Macapagal, M. (2012). Call center agent arrested for Facebook ‘identity theft’. Retrieved from http:// news.abs-cbn.com/ -depth/ 04/20/12/ call- center- agent -arrested-facebook-identity-theft

Mazowita, B., & V´ezina. (2012). Police-reported cybercrime in Canada. Retrieved from http:// www.statcan.gc.ca/ pub/ 85-002-x/ 2014001/ article/ 14093-eng.htm

Ministry of Health (2014). JAMAICA Country Progress Report 2014. Retrieved from http:// files.unaids.org/ en/dataanalysis/ knowyourresponse/ countryprogressreports/ 2014countries/ JAM snarrative sreport s2014.pdf

Mukhongo, L. L. (Ed.). (2016). Political influence of the media in developing countries. IGIGlobal.

Newman, J. Q. (1999). Identity theft: The cybercrime of the millennium. Loompanics Unlimited.

Newman, G. (2004). Identity theft. Problem-orientedguidesforpoliceno. 25. DepartmentofJustice,COPS,andCenter for Problem-Oriented Policing. Retrieve fromhttp://www.popcenter.org/Problems/ problemidentity stheft.htm.

Newman, G., & McNally, M. M. (2005). Identitytheftliteraturereview.

Philippine Daily Inquirer. (2016). Jobless man nabbed for ID theft, attempt to use uncle’s credit card Philippine Daily Inquirer. Retrieved from http:// newsinfo.inquirer.net/ 782633/jobless -man-nabbed-for-id-theft-attempt-to-use -uncles-credit-card#ixzz4dRDcB3Gp

Shoudt, E. M. (2002). Identity theft: Victims cry out for reform. American University LawReview.,52,339.

Smart Card Alliance. (2006). The top 10 hot identity topics. Retrieved from https:// www.library.ca.gov/ crb/ rfidap/ docs/ SCA-Top s10 sIdentity s sTopics.pdf

Smith,R.G.(1998). Identity-relatedeconomic crime: Risks and countermeasures. Victoria. Supreme Court, (2012). Decision of the Supreme Court upholding most provisions of Republic Act 10175 or the Cybercrime Prevention Act of 2012.Retrieved from http:// www.rappler.com/ nation/ special-coverage/ cybercrime- law/ 51197- full -text-supreme- court -decision-cybercrime-law

Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2),216-238.

Reyns, B. W., & Henson, B. (2016). The thief with a thousand faces and the victim with None: Identifying determinants for online identity theft victimization with routine activity theory. International Journal of Offender Therapy and Comparative Criminology,60(10),1119-1139.

United States Department of Justice. (n.d). Identity Theft. Retrieved from https:// www.justice.gov/usao-ndga/identity-theft

USA.Gov. (n.d.). Identitytheft: How to protect yourself against identity theft and respond if it happens. Retrieved from https://www.usa.gov/identity-theft

Western Australian Police. (n.d.). Crime: Identity theft. Retrieved from https:// www.police.wa.gov.au/ Crime/ Fraud/ Identity-theft

Yildirim, I. (2012). Bayesian inference: Gibbs sampling. Technical Note, University of Rochester.

Ghahramani, Z.(2014). Unsupervised learning. In Olivier Bousquet, Ulrike von Luxburg, and Gunnar R¨atsch (eds.), Advanced Lectures on Machine Learning. Berlin: Springer


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.