Advanced Search
MyIDEAS: Login

Data breaches and identity theft

Contents:

Author Info

  • William Roberds
  • Stacey L. Schreft

Abstract

This paper presents a monetary-theoretic model to study the implications of networks' collection of personal identifying data and data security on each other's incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data collection and too little security arise in equilibrium with noncooperative networks compared with the efficient allocation. A number of potential remedies are analyzed: mandated limits on the amount of data collected, mandated security levels, reallocations of data-breach costs, and data sharing through a merger of the networks.

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://www.frbatlanta.org/filelegacydocs/wp0822.pdf
Download Restriction: no

Bibliographic Info

Paper provided by Federal Reserve Bank of Atlanta in its series Working Paper with number 2008-22.

as in new window
Length:
Date of creation: 2008
Date of revision:
Handle: RePEc:fip:fedawp:2008-22

Contact details of provider:
Postal: 1000 Peachtree St., N.E., Atlanta, Georgia 30309
Phone: 404-521-8500
Email:
Web page: http://www.frbatlanta.org/
More information through EDIRC

Order Information:
Email:

Related research

Keywords:

Other versions of this item:

This paper has been announced in the following NEP Reports:

References

References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
as in new window
  1. Edward J. Green & Warren Weber, 1996. "Will the New $100 Bill Decrease Counterfeiting?," Macroeconomics 9609003, EconWPA, revised 11 Sep 1996.
  2. Kahn, Charles M. & Roberds, William, 2008. "Credit and identity theft," Journal of Monetary Economics, Elsevier, vol. 55(2), pages 251-264, March.
  3. Klaus Kultti, 1996. "A monetary economy with counterfeiting," Journal of Economics, Springer, vol. 63(2), pages 175-186, June.
  4. Prescott, Edward C & Boyd, John H, 1987. "Dynamic Coalitions: Engines of Growth," American Economic Review, American Economic Association, vol. 77(2), pages 63-67, May.
  5. Charles M. Kahn & James McAndrews & William Roberds, 2005. "Money Is Privacy," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 46(2), pages 377-399, 05.
  6. Gabriele Camera & Yiting Li, 2008. "Another Example of a Credit System that Co-Exists with Money," Journal of Money, Credit and Banking, Blackwell Publishing, vol. 40(6), pages 1295-1308, 09.
  7. Julia S. Cheney, 2004. "Identity theft: where do we go from here?," Payment Cards Center Discussion Paper 04-03, Federal Reserve Bank of Philadelphia.
  8. Antoine Martin & Michael Orlando & David Skeie, 2006. "Payment networks in a search model of money," Staff Reports 263, Federal Reserve Bank of New York.
  9. Ed Nosal & Ricardo Cavalcanti, 2007. "Counterfeiting as Private Money in Mechanism Design," 2007 Meeting Papers 371, Society for Economic Dynamics.
  10. Kiyotaki, Nobuhiro & Wright, Randall, 1989. "On Money as a Medium of Exchange," Journal of Political Economy, University of Chicago Press, vol. 97(4), pages 927-54, August.
  11. Narayana R. Kocherlakota, 1996. "Money is memory," Staff Report 218, Federal Reserve Bank of Minneapolis.
  12. Stacey L. Schreft, 2007. "Risks of identity theft: Can the market protect the payment system?," Economic Review, Federal Reserve Bank of Kansas City, issue Q IV, pages 5-40.
  13. Philip Keitel, 2008. "Legislative responses to data breaches and information security failures," Payment Cards Center Discussion Paper 08-09, Federal Reserve Bank of Philadelphia.
  14. Julia S. Cheney, 2005. "Identity theft: do definitions still matter?," Payment Cards Center Discussion Paper 05-10, Federal Reserve Bank of Philadelphia.
  15. Monnet, Cyril, 2005. "Counterfeiting and inflation," Working Paper Series 0512, European Central Bank.
  16. Keith B. Anderson & Erik Durbin & Michael A. Salinger, 2008. "Identity Theft," Journal of Economic Perspectives, American Economic Association, vol. 22(2), pages 171-192, Spring.
  17. Mark N. Greene, 2009. "Divided we fall: Fighting payments fraud together," Economic Perspectives, Federal Reserve Bank of Chicago, issue Q I, pages 37-42.
Full references (including those not matched with items on IDEAS)

Citations

Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
as in new window

Cited by:
  1. William Roberds & Stacey L. Schreft, 2009. "Data security, privacy, and identity theft: The economics behind the policy debates," Economic Perspectives, Federal Reserve Bank of Chicago, issue Q I, pages 22-30.

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:fip:fedawp:2008-22. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Meredith Rector).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.