Topic
Identity theft
About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.
Papers published on a yearly basis
Papers
More filters
••
01 Jan 2015TL;DR: The main security and privacy issues associated with online social networks are discussed and some attack models used to reveal a user’s private information are investigated to prevent disclosure of private information through OSNs.
Abstract: Online social networks (OSNs) have become extremely popular in recent years, and their widespread adoption has led to the presence of huge volumes of users’ personal information on the Internet. The ever-increasing number of social networks’ users on one hand and the massive amount of information being shared daily on the other hand have encouraged attackers to develop and use different techniques to collect and analyze such information for a number of malicious purposes, including spear-phishing attacks and identity theft. Clearly, this trend represents a significant challenge for both users and administrators. In fact, the widespread adoption of OSNs has raised a wide range of security and privacy concerns, which have not been fully addressed yet. In many cases, users are not even aware of the disclosure of their personal information through their profiles. Leakage of a user’s private information can happen in different ways. In this chapter, we discuss the main security and privacy issues associated with online social networks and investigate some attack models used to reveal a user’s private information. We also discuss different strategies and regulations that can prevent disclosure of private information through OSNs.
15 citations
•
05 Jun 2012TL;DR: The proposed coercion strategy framework in this paper will necessarily be less than comprehensive, but one important outcome will be that the issue of unequivocal attribution may not be as critical as previously suggested.
Abstract: The question of cyber deterrence, or “What and how do you deter malicious actions in cyberspace?” has been hotly debated over the last few years. Stories of massive intellectual property theft and identity theft cases have surfaced in the Western news spurring several seminars and writings on the subject. Unfortunately, the discussion to date has not moved us effectively toward a comprehensive framework for building a coercion strategy. Most importantly, the debate has failed to accurately characterize the coercion challenge. In most cases confronting developed nations, the more pressing issue is not deterring an actor from choosing to conduct hostile intrusions in cyberspace but compelling the actor to stop conducting intrusions that already have been highly successful. Accurately recognizing the existing dynamic changes coercion calculations in several ways, such as the significance of positive attribution - an important component of coercion theory. Although the proposed coercion strategy framework in this paper will necessarily be less than comprehensive, one important outcome will be that the issue of unequivocal attribution may not be as critical as previously suggested.
15 citations
••
08 Oct 2004TL;DR: Identity theft is becoming one of the most common forms of theft in the United States It has affected millions of Americans in the past few years This type of crime is devastating to the victim as discussed by the authors.
Abstract: Identity theft is becoming one of the most common forms of theft in the United States It has affected millions of Americans in the past few years This type of crime is devastating to the victim This paper will discuss what is identity theft, how does it occur, the types of identity theft, the consequences of identity theft, things victims can do if they discovered that their identity has been stolen and how to minimize the risk of identity theft
15 citations
••
11 Mar 2020TL;DR: The paper incorporates the block chain and the Identity Based Encryption management concept that allows the encryption of the user’s data as well as their identity and thus preventing them from Identity theft and fraud.
Abstract: Using the blockchain technology to store the privatedocuments of individuals will help make data more reliable and secure, preventing the loss of data and unauthorized access. The Consensus algorithm along with the hash algorithms maintains the integrity of data simultaneously providing authentication and authorization. The paper incorporates the block chain and the Identity Based Encryption management concept. The Identity based Management system allows the encryption of the user’s data as well as their identity and thus preventing them from Identity theft and fraud. These two technologies combined will result in a more secure way of storing the data and protecting the privacy of the user.
15 citations