Commonwealth of Australia 2014


Appendix B—Measurement framework pilot indicators

:)


Download 399.96 Kb.
Page16/17
Date conversion04.09.2017
Size399.96 Kb.
1   ...   9   10   11   12   13   14   15   16   17

Appendix B—Measurement framework pilot indicators

Table B1—Pilot project measurement indicators of identity crime and misuse and data sources

Indicators

Description

Data source

1. Acquisition of fraudulent IDs

1.1
The price of fraudulent identity credentials


The cost to illicitly acquire real Australian credentials or identities.

Data from law enforcement (and other government) agencies on the cost to illicitly acquire the most common identity credentials such as:

driver licences

Australian passport

Medicare card

birth certificate.


1.2
Number of reported data breaches



Acts as a proxy measure of organisational cyber security arrangements for protecting personal information.

Privacy (Information) Commissioners.



2. Use of fraudulent IDs

2.1

Number of identity crime and misuse incidents recorded by government agencies.


Estimates the known (or detected) incidence of identity crime and or misuse, based on incidents recorded in Australian governments administrative and law enforcement datasets.

AFP
ATO
DFAT
DHS
DIBP
ACCC
Births, Death & Marriages
Consumer Affairs / Protection
Police (State & Territory)

Privacy Commissioners


Road & Traffic Authorities

2.2
Number of prosecutions for identity crime and other related offences


The number of prosecutions for identity related offences is used as a proxy for the number of serious incidents of identity crime and misuse that occur in Australia.

CDPP

ABS
Police (State & Territory)



2.3
Number of people who self-report being victims of identity crime or misuse


Estimates the victimisation rate based on self-report data, collected in specialised crime victimisation or consumer surveys.

AIC survey

ABS surveys


AGD surveys

2.4
Number of people who perceive identity crime and misuse as a problem


Estimate the number and proportion of people who perceive identity crime and misuse as a problem based on data collected from attitudinal surveys

ABS
AGD

2.4
The types of personal information most susceptible to identity theft or misuse


Estimates the types of personal information and identity credentials that may be more vulnerable to theft or misuse, based on data collected from attitudinal surveys.

ABS
AGD

3. Consequences of ID crime

3.1
Direct costs of identity crime and misuse to government agencies


Estimates the cost of identity crime and misuse to government agencies.

AFP
ATO
DFAT
DHS
DIBP
ACCC
Births, Death & Marriages
Consumer Affairs / Protection
Police (State & Territory)

Privacy Commissioners


Road & Traffic Authorities

3.2
Direct costs of identity crime and misuse to business


Estimates the cost of identity crime and misuse to businesses.

Unisys

Symantec


KPMG

3.3
Direct financial losses to victims of identity crime and misuse


Estimates the cost of identity crime and misuse to individuals.

ABS
AGD

AIC


3.4

Number of identity crime victims experiencing non-financial consequences


Seeks to quantify the non-monetary harm caused by identity crime victimisation.

Academic literature

4. Remediation of ID crime

4.1
Average time by victims spent in remediation activity (i.e. recovering their identity)


Estimates the time victims (broadly individual, business and government victims) spend trying to resolve the issue of having their identity stolen or misused.


ACCC
ABS
AGD
Police (State & Territory)
Consumer Affairs / Protection

4.2
Number of enquiries to government agencies regarding assistance to recover identity information


Identifies the number of enquiries made to government agencies about identity recovery measures.

OAIC
State Consumer Affairs agencies

4.3
Number of applications for Victims’ Certificates (issued by the courts)


Assesses the application rate for Victims’ Certificates in each applicable Australian jurisdiction.

AGD

ABS


CDPP

5. Prevention of ID Crime


5.1
Number of identity credentials able to be verified using the DVS


The number of identity credentials that can be validated through the Document Verification Service

AGD

5.2
Number of government agencies using the DVS


The number of government agencies using the Document Verification Service to determine the validity of a document

AGD

5.3
Number of private sector organisations using the DVS


The number of private sector organisations using the Document Verification Service to determine the validity of a document

AGD

5.4
Number of DVS transactions each year


The number of validation transactions through the DVS each year

AGD

5.5
The proportion of individuals, business and governments that adopt robust online security practices to protect personal information


Measures the extent to which the Australian population (as individuals or by designated sector) have acted to minimise risk by using computer security protection.

AGD (CERT)

ACMA


Microsoft






1   ...   9   10   11   12   13   14   15   16   17
:)


The database is protected by copyright ©hestories.info 2017
send message

    Main page

:)