Center Project Reports

Economic Machine Learning for Fraud Detection

Author(s): Maytal Saar-Tesechansky
Published on Aug 14, 2016
Download Report as PDF

Our results demonstrate that evaluating the expected improvement in performance yield an ability to select generally good acquisitions in a cost-effective manner. Several policies yield comparable performance. These results suggest that our policies are able to identify acquisition costs that yield labeling quality to produced the desired improvement in performance.

Chaotic Hybrid Encryption Communication Kit

Author(s): Benito Fernandez, Jose Capriles, Carlos Garcia
Published on Aug 14, 2016
Download Report as PDF

In this research, we have developed successfully a software-only prototype of the technology that could be used (as-is) as a potential product to be beta-tested within UT. In addition to the prototype, the long term vision of this project includes hardware components inside a secure hardware-software architecture. For instance, the architecture could be included inside communications devices currently available in the market (e.g., iPhone) in order to offer a new option for data protection.

The roadmap also includes the following features:

  • An “infinite key” generation algorithm.
  • Software-reconfigurable hardware.
  • On-demand selection of Chaotic oscillators and mixed-signal processes.
  • Cloud-enabled service.

Since our solution ultimately will be implemented in hardware, it will execute faster than current techniques of similar complexity. The several layers of complexity offered by this inven- tion may thwart an attack or convert it into an ineffective endeavor. This research has delivered a crypto-tool that uses keys generated by an integrated piece of software that simulates chaotic oscillators with mixed-signal integrators. 

Identity Theft Assessment and Prediction

Author(s): Jennifer Miller, K. Suzanne Barber
Published on Aug 10, 2016
Download Report as PDF

The ITAP, or Identity Theft Assessment and Prediction Tool, is a tool that allows computational representation and quantitative measurement to better understand a fraudster’s behaviors and inevitably, make connections and visualize patterns of those behaviors.  How are fraudsters accessing information, i.e. through what vulnerabilities?  What tools are they using in order to overcome security hurdles?  What steps are they taking? Behavior patterns and trends identified in the ITAP will answer these and many more questions to include the entry points, vulnerabilities and consequences of fraudsters.

Modelling and Analysis of Identity Threat Behaviors Through Text Mining of Identity Theft Stories

Author(s): Yongpeng Yang, Monisha Manoharan, K. Suzanne Barber
Published on Aug 8, 2016
Download Report as PDF

Identity theft, fraud, and abuse are problems affecting all market sectors in society. Identity theft is often a gateway crime, as criminals use stolen or fraudulent identities to steal money, claim eligibility for services, hack into networks without authorization, and so on. The available data describing identity crimes and their aftermath is often in the form of recorded stories and reports by the news press, fraud examiners, and law enforcement. All of these sources are unstructured. Hence, in order to analyze identity theft data, this research proposes an approach which involves the collection of online news stories and reports on the topic of identity theft. Our approach preprocesses the raw text and extracts semi-structured information automatically, using text mining techniques. This paper presents statistical analysis of behavioral patterns and resources used by thieves and fraudsters to commit identity theft, including the identity attributes commonly linked to identity crimes, resources thieves employ to conduct identity crimes, and temporal patterns of criminal behavior. Analyses of these results increase empirical understanding of identity threat behaviors, offer early warning signs of identity theft, and thwart future identity theft crimes.

The Danger of Putting Your Digital Life in One Place

Published on Aug 8, 2016
Download Report as PDF

Over ninety percent of all data in the world has been collected in the past few years alone.1 As technology becomes increasingly integral to our lives, we create an incredible and unprecedented amount of personal data. There is more data than ever before and, consequently, more digital information about out lives.

Hail to the Thief: Linguistic Agency Increases the Power of Consumer Education Materials about Identity Theft

Author(s): Matthew S. McGlone, Joseph McGlynn, III, Maxim V Baryshevstev, Kathleen G Blackburn, Max Aaron Wartel, Alexandra Abbott
Published on Aug 8, 2016
Download Report as PDF

Dramatic increases in the incidence and severity of identity theft have prompted many observers to characterize the problem as an “epidemic.” Combating the threat will require a multimodal intervention of new technologies, innovative business practices, a strengthened legislative framework, more engagement from law enforcement, and expanded victim assistance. It will also require comprehensive consumer education about the nature of the crime and measures people can take to reduce their vulnerability to it. In this respect, intervention efforts might benefit from the lessons learned in education campaigns about actual epidemiological threats such as influenza or HIV/AIDS.

The "Identity Literacy" Scale: A Preliminary Report

Author(s): Matthew S. McGlone, Dawna I. Ballard, Brenda L. Berkelaar, Maxim V Baryshevstev, Laura Brown
Published on Aug 8, 2016
Download Report as PDF

Identity theft has become the defining crime of the information age, with an estimated 13 million or more incidents each year in the U.S. alone (Finklea, 2014). Publicity generated by news coverage of severe cases of identity theft as well as various information campaigns in the public and private sector have raised consumer awareness about pernicious crime (Greis, Nogueira, & Kellogg, 2012). Arguably, however, relatively few consumers are aware of different identity theft varieties, which can range from minor swindles to major heists and are perpetrated by a broad spectrum of offenders, from family members to shadowy, international gangs.

Convenience vs. Security for Mobile Wallet Use

Author(s): Dawna I. Ballard, Matthew S. McGlone, Brenda L. Berkelaar, Maxim V Baryshevstev, Laura Brown
Published on Aug 8, 2016
Download Report as PDF

Industry professionals and scholars recognize that consumers make privacy decisions, such as the desirability of mobile wallet use, through weighing a variety of competing material and social factors. One of the classic reflections of this tension is the frequently cited “convenience-security” factor (Kim & Park, 2012). While the meaning of security is well-defined—if how to achieve it is an ever-changing issue and open to hot debate—there have been almost no attempts to define convenience. Various types of service convenience have been identified in marketing related to buying or using a service (Berry, Seiders, & Grewal, 2002), but this is domain specific and focuses on different types of service convenience without defining its fundamental attributes. This absence poses problems for an entire literature and industry that references an issue as if there is any understanding about what we mean.

Facial Recognition and Perceptions of Identity After Surgery

Author(s): Mia Markey
Published on Sep 1, 2015
Download Report as PDF

While this extensive data set affords many opportunities for continued analysis, this report highlights a few preliminary findings of particular interest: patterns in the observers’ emotional responses to facial disfigurement as a function of time since the patient underwent surgery; patterns in the observers’ emotional responses to facial disfigurement as a function of the location of the disfigurement (midface vs. peripheral); demonstration that our disfigurement model is able to simulate disfigurements in a way that evokes consistent emotional responses; and correlation between the proposed quantitative measure of retention of facial identity and observers’ subjective assessment of retention of facial identity. 

Enhancing Physical Device Identity Technology Through Physical Unclonable Functions

Author(s): Michael Orshansky
Published on Sep 1, 2015
Download Report as PDF

There exists a strong need for security, unique identification, and authentication of many of today’s electronic systems. It has been widely recognized that relying on the intrinsic properties of integrated circuits (ICs) that cannot be reproduced, or cloned, at will is attractive as it promises to create a unique and secure chip identity that is more resistant to malicious manipulation than other known techniques. Physical unclonable functions (PUFs) serve the role of such intrinsic chip identifiers

Previous Page

Sign Up for CID News