scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2015
TL;DR: The main security and privacy issues associated with online social networks are discussed and some attack models used to reveal a user’s private information are investigated to prevent disclosure of private information through OSNs.
Abstract: Online social networks (OSNs) have become extremely popular in recent years, and their widespread adoption has led to the presence of huge volumes of users’ personal information on the Internet. The ever-increasing number of social networks’ users on one hand and the massive amount of information being shared daily on the other hand have encouraged attackers to develop and use different techniques to collect and analyze such information for a number of malicious purposes, including spear-phishing attacks and identity theft. Clearly, this trend represents a significant challenge for both users and administrators. In fact, the widespread adoption of OSNs has raised a wide range of security and privacy concerns, which have not been fully addressed yet. In many cases, users are not even aware of the disclosure of their personal information through their profiles. Leakage of a user’s private information can happen in different ways. In this chapter, we discuss the main security and privacy issues associated with online social networks and investigate some attack models used to reveal a user’s private information. We also discuss different strategies and regulations that can prevent disclosure of private information through OSNs.

15 citations

Proceedings Article
05 Jun 2012
TL;DR: The proposed coercion strategy framework in this paper will necessarily be less than comprehensive, but one important outcome will be that the issue of unequivocal attribution may not be as critical as previously suggested.
Abstract: The question of cyber deterrence, or “What and how do you deter malicious actions in cyberspace?” has been hotly debated over the last few years. Stories of massive intellectual property theft and identity theft cases have surfaced in the Western news spurring several seminars and writings on the subject. Unfortunately, the discussion to date has not moved us effectively toward a comprehensive framework for building a coercion strategy. Most importantly, the debate has failed to accurately characterize the coercion challenge. In most cases confronting developed nations, the more pressing issue is not deterring an actor from choosing to conduct hostile intrusions in cyberspace but compelling the actor to stop conducting intrusions that already have been highly successful. Accurately recognizing the existing dynamic changes coercion calculations in several ways, such as the significance of positive attribution - an important component of coercion theory. Although the proposed coercion strategy framework in this paper will necessarily be less than comprehensive, one important outcome will be that the issue of unequivocal attribution may not be as critical as previously suggested.

15 citations

Proceedings ArticleDOI
08 Oct 2004
TL;DR: Identity theft is becoming one of the most common forms of theft in the United States It has affected millions of Americans in the past few years This type of crime is devastating to the victim as discussed by the authors.
Abstract: Identity theft is becoming one of the most common forms of theft in the United States It has affected millions of Americans in the past few years This type of crime is devastating to the victim This paper will discuss what is identity theft, how does it occur, the types of identity theft, the consequences of identity theft, things victims can do if they discovered that their identity has been stolen and how to minimize the risk of identity theft

15 citations

Proceedings ArticleDOI
11 Mar 2020
TL;DR: The paper incorporates the block chain and the Identity Based Encryption management concept that allows the encryption of the user’s data as well as their identity and thus preventing them from Identity theft and fraud.
Abstract: Using the blockchain technology to store the privatedocuments of individuals will help make data more reliable and secure, preventing the loss of data and unauthorized access. The Consensus algorithm along with the hash algorithms maintains the integrity of data simultaneously providing authentication and authorization. The paper incorporates the block chain and the Identity Based Encryption management concept. The Identity based Management system allows the encryption of the user’s data as well as their identity and thus preventing them from Identity theft and fraud. These two technologies combined will result in a more secure way of storing the data and protecting the privacy of the user.

15 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112