Table of Contents

  • Part I of this book examines the multiple facets of the ID theft problem and the different methods used to perpetrate ID theft via the Internet. Chapter 2 describes the techniques implemented by ID thieves to lure victims online, which increasingly involve the use of spam and malware, and how thieves abuse this stolen information. Chapter 3 focuses on ID theft victims. It draws on the available statistical data reflecting victims’ complaints and losses trends, and it questions whether ID theft is more prevalent off line than on line.

  • Part II of this book focuses on public and private efforts to combat online ID theft. Chapter 4 presents government efforts; Chapter 5 private-sector efforts; and Chapter 6 international efforts. The book concludes with suggestions for preventing online ID theft via the key areas of consumer awareness and ID authentication, as well as other measures to enhance international co-operation. The final chapter summarises key findings and recommendations. 

  • The following are extracts from the OECD Policy Guidance on Online Identify Theft, which followed the OECD Ministerial Meeting on the Future of the Internet Economy in Seoul, Korea on 17-18 June 2008.