scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
01 Feb 2016
TL;DR: In this paper, countermeasure against the threat of hacking is presented with the methods which is low-cost and with low false detection, which do not infringe privacy and decrease the efficiency of work through detection of identity theft by utilizing the physical information of employees.
Abstract: Accidents of information leakage and system hacking caused by identity theft in the organization/company have happened frequently. Many companies make a lot of efforts to prevent account theft such as access control, multi-factor authentication, encryption, and response to malicious code. It is not easy to apply them to the company because of less efficiency and inconvenience. In this paper, countermeasure against the threat of hacking is presented with the methods which is low-cost and with low false detection. The methods do not infringe privacy and decrease the efficiency of work through detection of identity theft by utilizing the physical information of employees.

9 citations

Journal ArticleDOI
TL;DR: The authors examines the root causes behind the loss in privacy and the rise in identity theft, and considers how the emerging technology of biometrics can be used to ensure privacy in the 21st century.

9 citations

Book
17 Oct 2014
TL;DR: This book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.
Abstract: At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more. Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizations Find out about the legal basis of these attacks and threats - what is legal and what is not - and how to defend against any type of surveillance Learn how to thwart monitoring and surveillance threats with practical tools and techniques Real-world examples teach using key concepts from cases in the news around the world

9 citations

Patent
04 Oct 2009
TL;DR: In this article, the authors propose a locking/unlocking capability for the number owners within a database/website or similar system, to store identification or other sensitive numbers, together with email addresses or other contact data in a linked association, for remote access by an organization to initiate usage notification to the true owner of the number collected.
Abstract: Use of a database/website or similar system, to store identification or other sensitive numbers, together with email addresses or other contact data in a linked association, for remote access by an organization to initiate usage notification to the true owner of the number collected, and to check a Fraud Alert status or similar setting for the number, and to compare the email address or other contact data obtained from a customer, not to include a PIN, to data stored in the database with the number collected, all of which, depending on the data components entered, will achieve deterrence of identity theft, rapid notification of number usage, rapid communication of a fraud alert or similar status, success or failure in obtaining or establishing an acceptable level of certainty that the customer is the true owner of the number, and a locking/unlocking capability for the number owners within the system domain.

9 citations

Proceedings ArticleDOI
01 Oct 2017
TL;DR: In this work, a phishing detection method is proposed by using machine learning and data mining techniques, with success rate of %89 has been achieved against phishing attacks coming from email messages.
Abstract: Social engineering has emerged as a serious threat in virtual communities and is an important means to attack information systems. The services used by today's knowledge workers prepare the base for complicated social engineering attacks. Phishing is a kind of technically generated social engineering attack and is the type of identity theft that uses the social engineering techniques and complex attack vectors to harvest financial information from unsuspecting consumers. It is a kind of attack in which phishers use spoofed emails and fraudulent web sites to trick people into giving personal information. Victims perceive these emails as trusted, while in reality they are the work of phishers interested in identity theft. Therefore, there is an urgent need for anti-phishing solutions and hereabout have been identified, a number of solutions to mitigate phishing attacks have been suggested. In this work, a phishing detection method is proposed by using machine learning and data mining techniques. Success rate of %89 has been achieved against phishing attacks coming from email messages.

9 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112