License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.08302.3
URN: urn:nbn:de:0030-drops-17947
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1794/
Go to the corresponding Portal


Flegel, Ulrich ; Kerschbaum, Florian ; Wacker, Richard

Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality

pdf-format:
08302.FlegelUlrich.ExtAbstract.1794.pdf (0.08 MB)


Abstract

In this paper we investigate the privacy dimension of collaborative
fraud detection envisioned for outsourcing scenarios. Firstly, we investigate the
privacy requirements derived from privacy law and present the resulting judicial
argument for pseudonymizing audit data generated for the purpose of fraud
detection. Second, we summarize the requirements for such pseudonymization
derived from the requirements of the misuse detection approach for fraud detection.
Third, we describe our approach for pseudonymization of audit data and two
approaches for hiding timestamps in audit data.

BibTeX - Entry

@InProceedings{flegel_et_al:DagSemProc.08302.3,
  author =	{Flegel, Ulrich and Kerschbaum, Florian and Wacker, Richard},
  title =	{{Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--5},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/opus/volltexte/2008/1794},
  URN =		{urn:nbn:de:0030-drops-17947},
  doi =		{10.4230/DagSemProc.08302.3},
  annote =	{Keywords: Insider threat; occupational fraud; privacy law; PET; logical clocks, pseudonyms,}
}

Keywords: Insider threat; occupational fraud; privacy law; PET; logical clocks, pseudonyms,
Collection: 08302 - Countering Insider Threats
Issue Date: 2008
Date of publication: 23.12.2008


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI