scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Research investigating why users of social networking websites willingly disclose personal information and what sorts of information they provide (or not) shows that users are often simply not aware of the issues or feel that the risk to them personally is very low.
Abstract: The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This paper presents research investigating why users of social networking websites willingly disclose personal information and what sorts of information they provide (or not). The study employed an ethnographic approach of participation in the online community and interviews of community members, combined with a quantitative survey. The findings show that users are often simply not aware of the issues or feel that the risk to them personally is very low. The paper develops a preliminary theoretical model to explain the information disclosure phenomenon. It further recommends that government agencies or social networking websites themselves conduct campaigns to inform the public of these issues and that social networking websites consider removing some facilities. The study was conducted in an Australian context and focussed on the popular Facebook website.

94 citations

Patent
04 Jan 2002
TL;DR: In this paper, a method for protecting against identity theft by monitoring a consumer's credit information is proposed, where the initial credit information of a consumer is verified and then monitored for changes in personal information or open credit, and if changes are made, the consumer is notified.
Abstract: A method for protecting against identity theft by monitoring a consumer's credit information. The consumer's initial credit information is verified. The credit information is then monitored for changes in personal information or open credit. If changes are made, the consumer is notified. Unauthorized or invalid changes are corrected. In this manner, unauthorized attempts to open credit in the consumer's name are quickly identified and corrected, thus protecting against theft of the consumer's identity by a third party.

93 citations

Journal ArticleDOI
TL;DR: This paper examines four popular SN applications: Facebook, Twitter, LinkedIn and Google+, on Android and iOS platforms, to detect remnants of users’ activities that are of forensic interest and detects a variety of artefacts that could facilitate a criminal investigation.
Abstract: The rapid growth in usage and application of Social Networking (SN) platforms make them a potential target by cyber criminals to conduct malicious activities such as identity theft, piracy, illegal trading, sexual harassment, cyber stalking and cyber terrorism. Many SN platforms are extending their services to mobile platforms, making them an important source of evidence in cyber investigation cases. Therefore, understanding the types of potential evidence of users’ SN activities available on mobile devices is crucial to forensic investigation and research. In this paper, we examine four popular SN applications: Facebook, Twitter, LinkedIn and Google+, on Android and iOS platforms, to detect remnants of users’ activities that are of forensic interest. We detect a variety of artefacts (e.g. usernames, passwords, login information, personal information, uploaded posts, exchanged messages and uploaded comments from SN applications) that could facilitate a criminal investigation.

93 citations

Proceedings ArticleDOI
01 Aug 2019
TL;DR: A framework named as BloHosT (Blockchain Enabled Smart Tourism and Hospitality Management), which allows tourists to interact with various stakeholders through a single wallet identifier linked with a cryptocurrency server to initiate payments and achieves a high Return of Investment (ROI) in tourism sector as compared to traditional frameworks.
Abstract: In the era of Industry 4.0, e-tourism uses bulk of digital payments through applications supported by heterogeneous payment gateways. These heterogeneous payment gateways open the doors for the attackers to perform malicious activities such as-hacking of wallet accounts, identity theft, attacks on payment clearance cycles. In e-tourism, financial data is maintained in a centralized cloud server, which can lead to payment failures during peak traffic. The aforementioned issues can be addressed by the usage of a decentralized mechanism such as-blockchain, which enables trust and reputation management among various stakeholders such as-banks, travel agencies, airports, railways, cruises, hotels, restaurants, and local taxis. Motivated by the above discussion, we propose a framework named as BloHosT (Blockchain Enabled Smart Tourism and Hospitality Management), which allows tourists to interact with various stakeholders through a single wallet identifier linked with a cryptocurrency server to initiate payments. BloHosT uses an immutable ledger, where no proofs are required during travel that provides a hassle-free experience to tourists. Also, a Tourism enabled Deep-Learning (TeDL) framework is presented as a part of BloHosT framework, which is trained on experience of previous visited travelers. It provides rating scores to prospective travelers about the recently visited locations by previous travelers. Finally, through case studies, we demonstrate that BloHosT achieves a high Return of Investment (ROI) in tourism sector as compared to traditional frameworks.

93 citations

30 Jun 2005
TL;DR: To provide better customer service, NCJRS has made this Federally-funded grant final report available online in addition to traditional paper copies as mentioned in this paper, which is the first time that NC JRS has done so.
Abstract: To provide better customer service, NCJRS has made this Federally-funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.

93 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112