Book ChapterDOI
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
André N. Klingsheim,Kjell Hole +1 more
- pp 192-196
TLDR
How personal information leaks from online systems of national importance is determined, proof of concept software is discussed to demonstrate the seriousness of the problem, and how to improve the situation is suggested.Abstract:
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal information. Leakage of such information can facilitate large-scale identity theft. This paper determines how personal information leaks from online systems of national importance, discusses proof of concept software to demonstrate the seriousness of the problem, and suggests how to improve the situation.read more
Citations
More filters
Journal ArticleDOI
Mining social network data for personalisation and privacy concerns: a case study of Facebook's Beacon
TL;DR: A qualitative investigation of 95 blogs containing 568 comments was collected during the failed launch of Beacon, a third party marketing initiative by Facebook and thematic analysis resulted in the development of taxonomy of privacy concerns which offers a concrete means for online businesses to better understand SNS business landscape.
Dissertation
Risks in Networked Computer Systems
TL;DR: In this paper, the authors propose a method to solve the problem of "uniformity" and "uncertainty" in the context of education.iii.iiiiii.
Dissertation
Towards cross-border interoperable digital identity in electronic banking
TL;DR: In this article, the authors identified the fundamental factors influencing identity management system acceptance and adoption rates, including socioeconomics, success factors, explicit and implicit requirements of previously mentioned solutions, and designed cross-border and multi-party accepted identity management systems for e-banking with the goal of saving costs and simplifying market.
References
More filters
Journal ArticleDOI
Password security: a case history
Robert Morris,Ken Thompson +1 more
TL;DR: The present design of the password security scheme was the result of countering observed attempts to penetrate the system and is a compromise between extreme security and ease of use.
Journal ArticleDOI
Telling humans and computers apart automatically
TL;DR: In this paper, lazy cryptographers do AI and show how lazy they can be, and how they do it well, and why they do so poorly, and they are lazy.
Journal ArticleDOI
Two-factor authentication: too little, too late
TL;DR: Two-factor authentication has been around for at least two decades, but it is only recently that they have received mass-market attention and some banks are issuing them to customers, and even more are talking about doing it.
Journal ArticleDOI
Case study: online banking security
Kjell Hole,V. Moen,T. Tjostheim +2 more
TL;DR: A description of attack scenarios over a two-year period illustrates several key security issues with Internet banking systems in Norway.
Journal ArticleDOI
Vulnerabilities in e-governments
TL;DR: It is shown that more than 80% of the e-governments in the world are vulnerable to common web-application attacks such as Cross Site Scripting and Structured Query Language (SQL) injection.