scispace - formally typeset
Book ChapterDOI

Identity Theft: Much Too Easy? A Study of Online Systems in Norway

TLDR
How personal information leaks from online systems of national importance is determined, proof of concept software is discussed to demonstrate the seriousness of the problem, and how to improve the situation is suggested.
Abstract
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal information. Leakage of such information can facilitate large-scale identity theft. This paper determines how personal information leaks from online systems of national importance, discusses proof of concept software to demonstrate the seriousness of the problem, and suggests how to improve the situation.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Mining social network data for personalisation and privacy concerns: a case study of Facebook's Beacon

TL;DR: A qualitative investigation of 95 blogs containing 568 comments was collected during the failed launch of Beacon, a third party marketing initiative by Facebook and thematic analysis resulted in the development of taxonomy of privacy concerns which offers a concrete means for online businesses to better understand SNS business landscape.
Dissertation

Risks in Networked Computer Systems

TL;DR: In this paper, the authors propose a method to solve the problem of "uniformity" and "uncertainty" in the context of education.iii.iiiiii.
Dissertation

Towards cross-border interoperable digital identity in electronic banking

TL;DR: In this article, the authors identified the fundamental factors influencing identity management system acceptance and adoption rates, including socioeconomics, success factors, explicit and implicit requirements of previously mentioned solutions, and designed cross-border and multi-party accepted identity management systems for e-banking with the goal of saving costs and simplifying market.
References
More filters
Journal ArticleDOI

Password security: a case history

TL;DR: The present design of the password security scheme was the result of countering observed attempts to penetrate the system and is a compromise between extreme security and ease of use.
Journal ArticleDOI

Telling humans and computers apart automatically

TL;DR: In this paper, lazy cryptographers do AI and show how lazy they can be, and how they do it well, and why they do so poorly, and they are lazy.
Journal ArticleDOI

Two-factor authentication: too little, too late

TL;DR: Two-factor authentication has been around for at least two decades, but it is only recently that they have received mass-market attention and some banks are issuing them to customers, and even more are talking about doing it.
Journal ArticleDOI

Case study: online banking security

TL;DR: A description of attack scenarios over a two-year period illustrates several key security issues with Internet banking systems in Norway.
Journal ArticleDOI

Vulnerabilities in e-governments

TL;DR: It is shown that more than 80% of the e-governments in the world are vulnerable to common web-application attacks such as Cross Site Scripting and Structured Query Language (SQL) injection.