scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings Article
01 Jan 2011
TL;DR: The paper shows that identification and the definition and allocation of identifiers is an institutional and political rather than scientific process, and that since “identity” in itself is a social construct, the process of identification depends on the institutional context in which the objects to identify exist as valid institutional facts.
Abstract: Based on real-world examples of identity theft, and particularly a recent incident in Sweden, this paper explores the nature of identification from a social ontology point of view. This is contrasted with the traditional representational view, which is shown unable to handle critical aspects related to institutional control of identifiers and identity. Specifically, the paper shows that identification and the definition and allocation of identifiers is an institutional and political rather than scientific process, and that since “identity” in itself is a social construct, the process of identification depends on the institutional context in which the objects to identify exist as valid institutional facts. These institutional objects are often originally generated by the use of information systems, which means that genuine real-world institutional objects and their identifiers can be found within these information systems. This implies that the representational view of information systems with a sharp distinction between the real world outside the information system and the system itself (only seen as a model or perceived state of that real world) cannot be maintained.

12 citations

Journal ArticleDOI
TL;DR: The widespread popularity of social networking has resulted in many observations about users' tendencies to share their personal data too freely, sometimes exposing their personal details, photographs and opinions for the world to see without any restriction.

12 citations

Proceedings ArticleDOI
13 Nov 2009
TL;DR: To prove the originality of a user without revealing identifier information, this work focused on linkability, an element of online identity, and assumed that the existence of bi-directional link(s) among two or more entities shows the tight relationship thus there is possibility of being identified as the same users'.
Abstract: Identity poisoning by fake-named account is caused not only by identity theft but also by valid accounts with impersonated screen-names. From users' perspective, screen-name is an identifier of other users without obtaining any credential information. To prove the originality of a user without revealing identifier information, we focused on linkability, an element of online identity. Not only the extent of linkability but also its direction assures the originality. We assumed that the existence of bi-directional link(s) among two or more entities shows the tight relationship thus there is possibility of being identified as the same users'. As a result of our experiment, on Twitter, identified pairs are obviously filtered from suspicious pairs only based on direction of links.

12 citations

Proceedings ArticleDOI
25 Oct 2004
TL;DR: A hybrid system is implemented, which does not only detect active attacks such as identity theft causing denial of service attacks, but also detects the usage of accesspoint discovery tools.
Abstract: Wireless LANs are growing rapidly and security has always been a concern. We have implemented a hybrid system, which does not only detect active attacks such as identity theft causing denial of service attacks, but also detects the usage of accesspoint discovery tools. The system responds in real time by sending out an alert to the network administrator.

12 citations

Journal ArticleDOI
TL;DR: In this article, the authors discuss the changing landscape of US crime, and both describe and evaluate the growth of private security in total security provided, and conclude that the increased penetration of private police is socially beneficial by improving efficiency, delivering client-oriented services and forcing police to improve their performance.
Abstract: This article discusses the changing landscape of US crime, and both describes and evaluates the growth of private security in total security provided. Since the mid-1970s violent and basic property crimes have constantly declined while the number of economic crimes like identity theft, counterfeit goods and cyber misdeeds increased substantially. Monopolistic police have not addressed the changing landscape of crime and continue to deliver their traditional services. As market forces have limited influence on government, private security that is highly competitive and client oriented has been quicker to adopt technology and management innovations and address the new types of crime. Private police are estimated to be three times larger than public law enforcement. The article concludes that the increased penetration of private security is socially beneficial by improving efficiency, delivering client-oriented services and forcing police to improve their performance.

12 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112