scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book
14 May 2019
TL;DR: According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29 as mentioned in this paper and about 74,400 young adults fell victim to identity theft in 2016.
Abstract: Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission’s 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

9 citations

Journal ArticleDOI
TL;DR: In this article, the authors consider law and lawlessness as interpretive practices that seek both to unleash and control the Internet in Brazil, and analyze diverse institutions and actors: the government, lawyers, judges, NGOs, hackers, pirates, and police.
Abstract: In this paper I consider law and lawlessness as interpretive practices that seek both to unleash and control the Internet in Brazil. I analyze diverse institutions and actors: the government, lawyers, judges, NGOs, hackers, pirates, and police. Whereas users of “new” media frequently distance themselves from previous media forms along technological lines, in this Brazilian case, policy makers index their border with Paraguay. They also point to what they take to be a uniquely Brazilian corporate rapaciousness, arguing that that rapaciousness partakes of bordering practices much like those involved in Paraguay. In this sense, mediation is more about the nation and the corporation than it is about reference to previous technologies. I analyze all this through attention to media piracy, identity theft, and hacking. In order to understand the publics that are facilitated and foreclosed by the Internet, we must attend to durable, localized, border policing as well as mainstream understandings of business trans...

9 citations

Journal ArticleDOI
TL;DR: This research looks at the risk of identity theft when ease of service access is provided through a single sign-on (SSO) authorization, asking: What are the optimal behavioral expectations for a cloud service information owner?

9 citations

Proceedings ArticleDOI
19 Jul 2010
TL;DR: In this article, a summary of the identity theft domain with an emphasis on research conducted within Australia and identifying a number of issues regarding research in this area is presented, and an overview of the research project currently being undertaken by the authors in obtaining an understanding of what victims of identity theft experience during the recovery process, particularly their experiences when dealing with organizations.
Abstract: Identity theft is not a new crime, however changes in society and the way that business is conducted have made it an easier, attractive and more lucrative crime. When a victim discovers the misuse of their identity they must then begin the process of recovery, including fixing any issues that may have been created by the misuse. For some victims this may only take a small amount of time and effort, however for others they may continue to experience issues for many years after the initial moment of discovery. To date, little research has been conducted within Australia or internationally regarding what a victim experiences as they work through the recovery process. This paper presents a summary of the identity theft domain with an emphasis on research conducted within Australia, and identifies a number of issues regarding research in this area. The paper also provides an overview of the research project currently being undertaken by the authors in obtaining an understanding of what victims of identity theft experience during the recovery process, particularly their experiences when dealing with organizations. Finally, it reports on some of the preliminary work that has already been conducted for the research project.

9 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112