scispace - formally typeset
Search or ask a question

Showing papers on "Identity theft published in 2000"


Journal ArticleDOI
TL;DR: Issues related to online counseling and online self-help groups include: difficulties in ascertaining the credentials and identity of service providers, accessing inaccurate information, reliance on untested methods, difficulties in online assessment, exposure to disinhibited communication, development of inappropriate online relationships, and lack of standards and regulation regarding online human service practice.
Abstract: This article describes the problems and dangers that may be encountered when women seek health and human services on the Internet. Issues related to online counseling and online self-help groups include: difficulties in ascertaining the credentials and identity of service providers, accessing inaccurate information, reliance on untested methods, difficulties in online assessment, exposure to disinhibited communication, development of inappropriate online relationships, and lack of standards and regulation regarding online human service practice. In addition, the article describes potential victimization of women users of the Internet through loss of privacy, cyberstalking, and identity theft. Guideliness and resources for prevention of online victimization are presented.

87 citations


Journal ArticleDOI
TL;DR: In my effort to explain to sundry administrative folks just how dangerous the practice of using SSNs as primary keys and authenticators in their databases is, how it exposes the employees and citizens to unnecessary risk, the first draft of this column is composed.
Abstract: M A R TI N M A YO When one changes employers, as I have recently, the different institutional and cultural attitudes become obvious. For example, consider salary-benefit packages. From my perspective, as an academic for the past 20plus years, employers seem to consistently bear about the same institutional cost for benefits— about 25% to 30% of one’s salary. This is not to say that everything is equal; different employers emphasize different benefits options—a great group health plan may come at the expense of greater pension contributions, and so forth. But in my world, employer commitment to employee benefits appears to be a constant. What does this have to do with identity theft, social security numbers, and the Web? Well, one of the institutional differences I noticed with my current move was the widespread use of SSNs as primary keys within university administration, municipal and state government, and a good percentage of utility and communication companies. In my effort to explain to sundry administrative folks just how dangerous the practice of using SSNs as primary keys and authenticators in their databases is, how it exposes the employees and citizens to unnecessary risk. I composed what became the first draft of this column. The use of SSNs for purposes other than that for which it was intended is an exceedingly bad idea. This point has been made many times. Add the Web, and we have the makings of a disaster that makes the recent Y2K computer problem pale in comparison.

64 citations


Patent
05 Oct 2000
TL;DR: In this paper, the identity verifier is used to prevent identity theft by using one list for all of a person's transactions, and applications for new credit by identity thieves are also prevented.
Abstract: Registered users including businesses attach a one-time-use identity verifier to as many financial and other transactions as they choose to protect themselves from identity thieves. They may also attach a security message to any identity verifier to ensure that a thief cannot steal a registered user's check from a mailbox and use the unused identity verifier. By using one list for all of a person's transactions, applications for new credit by identity thieves are also prevented. All of this is made possible by allowing the identity verifiers to be approved nonsequentially.

21 citations


Journal Article
TL;DR: In this article, the authors chart the Australian laws regulating privacy, including recent amendments to the Commonwealth Privacy Act that extend privacy provisions to the private sector, and discuss the most important issues in e-business is the protection of privacy.
Abstract: One of the most important issues in e-business is the protection of privacy. Consumers are worried that businesses and other may invade their privacy or cause them harm by such conduct as identity theft. Businesses, too, are worried about unscrupulous parties who seek to defraud them. Citizens fear the spectre of 'big brother' and a powerful government that can use such information to control or restrict the freedom of its citizenry. This paper charts the Australian laws regulating privacy, including recent amendments to the Commonwealth Privacy Act that extend privacy provisions to the private sector.

5 citations



Posted Content
TL;DR: The authors examines the likelihood that displaced war victims, who have essentially lost their identities as well as so much else, can recoup civil compensation for their losses through local Yugoslavian courts and scrutinizes the basic international human rights doctrines and systems of enforcement to determine whether these may offer remedies for the victims of identity elimination.
Abstract: This paper examines the likelihood that displaced war victims, who have essentially lost their identities as well as so much else, can recoup civil compensation for their losses through local Yugoslavian courts It scrutinizes the basic international human rights doctrines and systems of enforcement to determine whether these may offer remedies for the victims of identity elimination Finally, the article explores the likelihood that, through the International Tribunal in the Former Yugoslavia, those responsible for identity elimination may be held criminally liable for their actions in Kosovo

2 citations


Journal ArticleDOI

1 citations