Advertisement

Privacy Compliant Internal Fraud Screening

  • Ulrich Flegel

Abstract

In the year 2009 several data privacy scandals have hit the headlines where major corporations had a legitimate need for detecting fraud conducted by their own employees, but chose inappropriate measures for data screening. This contribution presents architectures and pseudonymization technology for privacy compliant fraud screening or fraud detection, in order to reduce the number of undiscovered fraud cases and to reduce the time to discovery.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, October 1995. http://europa.eu.int/eur-lex/en/lif/dat/1995/en_395L0046.html.
  2. Johann Bizer. Sieben goldene Regeln des Datenschutzes (in German). Datenschutz und Datensicherheit, 31(5):350–356, 2007.CrossRefGoogle Scholar
  3. Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, and Frank Leymann. Insider Threats in Cybersecurity – And Beyond, chapter Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. Advances in Information Security. Springer, New York, 2010. To appear.Google Scholar
  4. Ulrich Flegel. Privacy-Respecting Intrusion Detection, volume 35 of Advances in Information Security. Springer, New York, 2007.Google Scholar
  5. Ulrich Flegel, Oliver Raabe, and Richard Wacker. Technischer Datenschutz für IDS und FDS durch Pseudonymisierung (in German). Datenschutz und Datensicherheit (DuD), 33(12):735–741, December 2009.CrossRefGoogle Scholar
  6. Ulrich Flegel, Julien Vayssière, and Gunter Bitz. Insider Threats in Cybersecurity – And Beyond, chapter A State of the Art Survey of Fraud Detection Technology. Advances in Information Security. Springer, New York, 2010. To appear.Google Scholar
  7. Alexander Grosskopf, Gero Decker, and Mathias Weske. The Process: Business Process Modeling Using BPMN. Meghan Kiffer, 2009.Google Scholar
  8. Peter Gemmel. An introduction to threshold cryptography. Cryptobytes, 2(3):7, 1997.Google Scholar
  9. Andreas Knöpfel, Bernhard Gröne, and Peter Tabeling. Fundamental modeling concepts: Effective communication of IT systems. Wiley, 2006.Google Scholar
  10. Association of Certified Fraud Examiners. Report to the nation on occupational fraud and abuse, 2006.Google Scholar
  11. Reuters. German snooping scandal engulfs Airbus, April 2009.Google Scholar
  12. Adi Shamir. How to share a secret. Communications of the ACM, 22:612–613, 1979.zbMATHCrossRefGoogle Scholar
  13. Deutsche Welle. Spy scandal widens at German rail Deutsche Bahn, February 2009.Google Scholar

Copyright information

© Vieweg+Teubner Verlag | Springer Fachmedien Wiesbaden GmbH 2011

Authors and Affiliations

  • Ulrich Flegel
    • 1
  1. 1.SAP AGSAP Research CEC KarlsruheKarlsruheGermany

Personalised recommendations