scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book
16 Jun 2009
TL;DR: John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue.
Abstract: If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you: Why it's easier for bad guys to "own" your computer than you think Why anti-virus software doesn't work well -- and one simple way to fix it Whether Apple OS X is more secure than Windows What Windows needs to do better How to make strong authentication pervasive Why patch management is so bad Whether there's anything you can do about identity theft Five easy steps for fixing application security, and more Provocative, insightful, and always controversial, The Myths of Security not only addresses IT professionals who deal with security issues, but also speaks to Mac and PC users who spend time online.

12 citations

01 Jul 2009
TL;DR: Financial cybercrime has increased dramatically in recent years and looks set to increase further as the proliferation of communications technology proceeds apace and reaches regions of the world with many underemployed poor people with information technology skills who can take advantage of cybercrime opportunities.
Abstract: With the growing sophistication and use of information technology, the past decade has seen a major growth in cybercrime. Broadly described, cybercrime refers to all types of crime that exploit modern telecommunications networks, in which computers or computer networks are used for criminal activity. This report focuses exclusively on financial cybercrime, specifically credit card fraud and identity theft. Financial cybercrime has increased dramatically in recent years and looks set to increase further as the proliferation of communications technology proceeds apace and reaches regions of the world with many underemployed poor people with information technology skills who can take advantage of cybercrime opportunities. The current global recession will likely increase this trend still further.

12 citations

Journal ArticleDOI
TL;DR: This systematic review attempts to understand how people keep secrets online, and in particular how people use the internet when engaging in covert behaviours and activities regarding the procurement and supply of illicit drugs.

12 citations

Patent
03 Jan 2013
TL;DR: In this paper, a universal loyalty program is proposed, which includes participation of multiple separately-owned large retail companies as well as users who are customers of each of the companies, in order to encourage wide and large scale participation and data sharing among companies or other entities.
Abstract: The present invention includes providing a universal loyalty program, such as, for example, a loyalty program that includes participation of multiple separately-owned large retail companies as well as users who are customers of each of the companies Wide and large scale participation and data sharing, among companies or other entities as well as users, may be encouraged, incentivized, obtained and rewarded, such as through programs provided by the universal loyalty program Such programs may include, among others, a food recall related program, a medicine recall related program, an anti-counterfeiting program, a credit card fraud prevention program, and an anti-identity theft program Moreover, the universal loyalty program, as well as the other programs, may themselves benefit and be strengthened by the wide and large scale participation, including the resulting wide and large scale data sharing, collection, mining and uses afforded in part thereby

12 citations

Patent
22 Aug 2007
TL;DR: In this paper, a website uses stored account identification details to process a payment from one party to the other, where each party is provided with a unique code that can be entered, for example, at a website, in place of their actual account details.
Abstract: As an alternative to paper check processing, the methods and systems now introduced include processing transactions from bank account to bank account while providing the parties involved with greater privacy and protections against identity theft, check fraud, and other types of potential fraud. Each party is provided with a unique code that can be entered, for example, at a website, in place of their actual account details. The website uses stored account identification details to process a payment from one party to the other.

12 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112