scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
10 Oct 2003
TL;DR: An identity theft protection system, which combines a person's social security number and mailing address, to stop the issuing of identity theft credit cards, was proposed by as discussed by the authors, where the person's address is used as an active security code on the system.
Abstract: An identity theft protection system, which uses several security features to stop identity theft. The system combines a person's social security number and mailing address, to stop the issuing of identity theft credit cards. The person's address is used as a active security code on the system. The system uses a person's full description, and signature, to stop all identity theft fraud committed in person.

11 citations

Journal ArticleDOI
TL;DR: If E-merchants recognize the threat and implement cost- effective measures to prevent this identity fraud, they can increase both top and bottom line results.
Abstract: Business to consumer E-commerce is expected to be approximately $23 billion among domestic U.S. E-commerce merchants this year. This is the story that everyone talks about. The hidden story is that, based on last year's numbers, losses due to identity fraud are expected to be in excess of $2.3 billion. These are losses that will be suffered by both dot.com and bricks-and-clicks merchants. All but the most well-established are already feeling the asphyxiating effects of extremely tight capital markets demanding clear plans for profitability. With fraud losses of 10 percent it is extremely difficult, if not impossible, to show a profit. If E-merchants recognize the threat and implement cost- effective measures to prevent this identity fraud, they can increase both top and bottom line results.

11 citations

Posted Content
TL;DR: In this article, the authors evaluate the efficiency of fraud liability allocation rules in current card-based payment systems, focusing on the broader category of payments fraud and whether or not it is precipitated by identity theft.
Abstract: Introduction and summary In the absence of a significant (and right now unforeseeable) shift in the retail payments landscape in the United States, consumers will continue to reach consistently (and often) for their debit and credit cards. They will use these cards when paying for goods and services in face-to-face, Internet, mail order, and telephone order transactions. Likewise, criminals will continue to use tried-and-true tactics and will develop innovative methods to perpetrate payment card fraud. At the intersection of consumers conducting legitimate card transactions and fraudsters pursuing their illegal ends is a tangled web of public laws and private card network rules. These laws and rules allocate fraud risk among the consumers, card issuers, and merchants participating in card-based payment systems. In theory, one would hope that these laws and rules for payment card transactions are thoughtfully designed to encourage behavior that minimizes fraud losses to the system as a whole. In reality, systemwide fraud reduction is often not the principal objective behind particular public laws or private rules affecting fraud liability allocation. Consequently, these laws and rules may fail to promote efficient fraud avoidance; indeed, in some instances, they may actually discourage fraud avoidance. Defining the issue The first step in evaluating the efficiency of fraud liability allocation rules in current card-based payment systems is to define the issue. Doing so requires an understanding of the difference between identity theft and common payment card fraud, as well as an understanding of the workings of the card-based payment systems at issue. Identity theft versus fraud News stories abound about identity theft resulting from dumpster divers absconding with old bank statements and criminals rifling through mail and intercepting credit card offers. Further, email accounts are barraged with phishing attempts and other web-based schemes craftily designed to lure consumers into revealing personal identification information that can be used for nefarious purposes. Typically, the fraudsters intend to use the ill-gotten fruits of their snooping to impersonate their victims and access their credit or asset accounts. This is identity theft, and it is an increasingly pervasive problem in the United States and throughout the world. During 2007, Consumer Sentinel, a network that collects information about consumer fraud and identity theft from the Federal Trade Commission and over 125 other organizations, recorded 258,427 identity theft complaints. (1) Identity theft is distinguishable from common financial fraud. Identity theft is generally defined as "the use of personal identifying information to commit some form of fraud." (2) In contrast, fraud is simply "[a] knowing misrepresentation of the truth ... to induce another to act to his or her detriment." (3) As noted in the definition of identity theft, fraud is typically the end goal of identity theft. However, often fraud is committed without antecedent theft of Social Security numbers or other assumption of identity. Along with the cases of identity theft reported in 2007, 555,472 cases of non-identity-theft-related fraud were reported during the same year. (4) Given that card-based payment systems (and other payment systems, for that matter) seek to prevent monetary fraud perpetrated through the system regardless of how the information used to perpetrate the fraud was obtained, here I focus on the broader category of payments fraud--whether or not it is precipitated by identity theft. There is no need to steal another person's identity to perpetrate simple payment card fraud--all the perpetrator needs to do is obtain a person's payment card or payment card information? Distinguishing fraud from identity theft is important to the discussion that follows for two reasons. First, fraud is broader and more pervasive than identity theft. …

11 citations

Journal ArticleDOI
TL;DR: The authors examined the determinants of identity theft, focusing especially on the influence of internet diffusion, and showed that a 10% in increase households with internet access would increase identity theft by about 9%.
Abstract: This paper examines the determinants of identity theft, focusing especially on the influence of internet diffusion. Results, based on panel data across the U.S. states, show that a 10% in increase households with internet access would increase identity theft by about 9%, ceteris paribus. Other noteworthy findings point to states with greater corrupt activity having greater identity theft but greater police employment not having a significant deterrent impact. Dynamic panel regressions results reveal the presence of inertia in identity thefts. Some implications for policy are discussed.

11 citations

Journal Article
TL;DR: Using grounded theory method, a model is developed that explains what and how source characteristics influence Facebook users to judge the attacker as credible and the impact of source characteristics on users' susceptibility to social engineering victimization in SNSs, particularly Facebook.
Abstract: Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

11 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112