scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Posted Content
TL;DR: In this article, the authors examine the privacy threats to research, the aggregation threat to privacy, and the control solution of data aggregation in the U.S. health care system and provide a richer account of the ethics of fragmentation and integration.
Abstract: Current conversations about health information policy often tend to be based on three broad assumptions. First, many perceive a tension between regulation and innovation. We often hear that privacy regulations are keeping researchers, companies, and providers from aggregating the data they need to promote innovation. Second, aggregation of fragmented data is seen as a threat to its proper regulation, creating the risk of breaches and other misuse. Third, a prime directive for technicians and policymakers is to give patients ever more granular methods of control over data. This article questions and complicates those assumptions, which I deem (respectively) the Privacy Threat to Research, the Aggregation Threat to Privacy, and the Control Solution.This article is also intended to enrich our concepts of “fragmentation” and “integration” in health care. There is a good deal of sloganeering around “firewalls” and “vertical integration” as idealized implementations of “fragmentation” and “integration” (respective). The problem, though, is that terms like these (as well as “disruption”) are insufficiently normative to guide large-scale health system change. They describe, but they do not adequately prescribe.By examining those instances where: a) regulation promotes innovation, and b) increasing (some kinds of) availability of data actually enhances security, confidentiality, and privacy protections, this article attempts to give a richer account of the ethics of fragmentation and integration in the U.S. health care system. But, it also has a darker side, highlighting the inevitable conflicts of values created in a “reputation society” driven by stigmatizing social sorting systems. Personal data control may exacerbate social inequalities. Data aggregation may increase both our powers of research and our vulnerability to breach. The health data policymaking landscape of the next decade will feature a series of intractable conflicts between these important social values.

9 citations

Proceedings Article
01 Jan 2007
TL;DR: The major contribution of this paper is the development of an identity fraud perpetrator framework and an understanding of the model’s elements and relationships that will be useful to law enforcement, business and government organisations when fighting identity crime.
Abstract: This paper addresses many important questions Firstly, what are the main identity fraud perpetrator categories? Secondly, what are the current Information Systems (IS) facilitated attack channels and methods used by identity fraud perpetrators? Thirdly, what are the effects sustained by targeted victim organisations? The major contribution of this paper is the development of an identity fraud perpetrator framework and an understanding of the model’s elements and relationships This framework will be useful to law enforcement, business and government organisations when fighting identity crime This research has spawned a larger research agenda into identity fraud

9 citations

Book ChapterDOI
22 Jun 2014
TL;DR: The security and privacy risks associated with storing biometric data are described and the necessity of using biometric template protection as a potential remedy to these risks is highlighted.
Abstract: Although many biometric characteristics are not secrets, biometric reference data (also known as biometric templates) need to be stored securely and to be protected against unauthorized use. For this purpose, biometric template protection techniques have been developed that do not only prevent privacy leakage and provide confidentiality of the stored biometric templates, but address also problems like identity theft and cross-matching of biometric templates stored in different systems. This paper describes the security and privacy risks associated with storing biometric data and highlights the necessity of using biometric template protection as a potential remedy to these risks. Privacy considerations are discussed with respect to using fingerprint verification for access control to a public outdoor swimming pool.

9 citations

Book ChapterDOI
19 Jun 2007
TL;DR: It is shown how management can use these results to focus and improve ICT awareness and how information security is as much a people issue as a technology one.
Abstract: Email communication is growing as a main method for individuals and organizations to communicate. Sadly, this is also an emerging means of conducting crime in the cyber world, e.g. identity theft, virus attacks etc. The need for improving awareness to these threats amongst employees is evident in media reports. Information security is as much a people issue as a technology one. This paper presents a description and results of an email awareness experiment that was performed amongst staff from a South African university. It is shown how management can use these results to focus and improve ICT awareness.

9 citations

Book
13 Dec 2001
TL;DR: This book discusses Protecting Your Privacy in the 21st Century with a focus on how perceptions of Privacy have changed since the Rise of the Internet and how to Secure Your Internet Transactions.
Abstract: Introduction. I. SETTING THE STAGE: PRIVACY IN THE INFORMATION AGE. 1. Protecting Your Privacy in the 21st Century. How Perceptions of Privacy Have Changed Since the Rise of the Internet. Why Do Other People Care About Your Privacy? Why Are People Collecting This Information Anyway? Profiling. We Need Healthy Skepticism and Informed Consent. 2. What Is Privacy in a Digital World? The Right to Be Left Alone... Information About Us Is Not Acquired by Others. The Protection Given to Information. The Ability to Protect Ourselves from Being Judged Out of Context. The Right Not to Be Surprised. Finally, It Comes Down to Control. Fair Information Practices Protect Your Rights. Understanding What Privacy Means to You. II. BECOMING AWARE: PRIVACY AND THE INDIVIDUAL. 3. Who Wants to Know What about Whom? We All Want to Know about Other People. Celebrities Can Educate, Too. Freedom of or Freedom from the Press. Learning to Like New Things. It's All About Trust. 4. Threats to Your Children's Privacy. Are Your Kids in Danger on the Net? What Are the Risks? Your Tone Sets the Stage. What More Can You Do? Discover Your Resources and Options. What Help do Parents Have in Protecting Their Kids? What Companies Must Do. Now You Have All the Tools. 5. Online Disclosures and That Barn Door. Defensive Internet Travels. Information You Share on Purpose. E-mail and Chat Can be Information Collectors, Too. Love Online: A Special Case for Privacy. Urban Legends and "Hi, I'm from Nigeria and..." Safety Tips for Giving Out information About Yourself. Information You Might Not Know You Are Sharing. Polly Wants a Cookie. This Site Brought to You By... Tracking Your Invisibly. What If I Don't Understand the Privacy Policies? Watching You at Home and Work. So, You Always Wanted to Live in a Spy Novel. What If the Police and Courts Get Involved? 6. Broadband: Always on, Always Connected, Always Exposed. Once Connected, Always Connected. What is Broadband? Broadband: Connecting the World. The Big Question Is Not "What Do I Have to Hide?"- It's "Who's in Control?" Some Questions to Ask Your (Potential) Broadband Provider. Keep Your Eyes Open Keep Your Guard Up. 7. Privacy over the Airwaves. Understanding Cellular Technology. The Wireless Spectrum. There's Gold in Those Profiles. Technology to the Rescue? 8. Do the Walls Have Ears? Other Devices That Can Affect Privacy. We Can Pick You Out in a Crowd of Strangers. By Air, by Land, or by Sea-GPS Isn't Just for Planes and Fish Anymore. No More Waiting in Line-We'll Bill You. Just Wave Your Fob at the Register. Check Yourself Out. Stop or We'll Shoot (Your Picture, That Is). Glitches Mean Tickets Tossed Out. What Happens When You Add It All Up? III. TAKING CONTROL. 9. Taking an Inventory of Your Personal Information. Where Are Youuuu? Whooo Are Youuu? Finding You at Home. What's the Point? Where Am I From? Uncle Sam (and His Younger Cousins) Lists You! Our Conclusions? 10. The Least You Should Do to Guard Your Privacy When Online. Keeping Your Data Private. Some Key Concepts. Files. Getting Rid of Files and Data. Summary for the Most Privacy Conscious. Online Session Privacy. Protecting Against Malicious Attacks. E-mail Privacy. What About Macs? Putting It All Together. Some General Security Resources. 11. How to Secure Your Internet Transactions. Can You Let Your Fingers Do the Shopping? Look For and Read the Privacy and Security Policies. Seal Organizations. Practice Safe Shopping. Don't Let Anyone Steal Your Good Name. Safe Surfing. Using E-mail and Chatting Online Safely. Remember: You Can Stay in Control. 12. What Can I Do If My Privacy Is Compromised? Telephone and Similar Listings. Toss the Spam. But Don't Toss the Privacy Notices. Buying Items that Don't Exist and Similar Mistakes. I Am Not Me: Identity Theft. Invasions Can Be Harmful to Your Health. IV. WHAT YOU NEED TO KNOW ABOUT LEGAL PROTECTIONS FOR PRIVACY. 13. Privacy and the Law: 2001. What Is the Law? Is Privacy a Right? What U.S. Federal Law Applies. What Is the Law within the Several States? If We've Got All These Laws, Why Would We Need More?(The Regulatory Climate: 2001). Laws Around the World. What About Laws that Don't Exist Yet? Be Your Own Advocate. Privacy and Security Legislation in Congress. Do I Need to Go to the Capitol Myself? Other Influences on Legislation. 14. Canaries in the Coal Mine. The ACLU: The Granddaddy of Canaries. CDT: Washington-based Songs. CPSR: Folk Songs of Freedom. EFF: Western Songs. EPIC: Strong Songs. Privacy International: Songs from the Old Country. Privacy.org: A Duet. Global Internet Liberty Campaign: Songs Around the World. Global Internet Policy Initiative: International Songs of Liberty. Junkbusters: Catchy Jingles. Privacy Rights Clearinghouse: Teaching Songs. Singing Along Together. 15. Self-Regulation and Privacy. What Self-Regulation Is and How It Works. Privacy Policies. Today's Self-Regulatory Leaders. Seal Organizations. Wrapping It Up and Sealing It for You. V. PRIVACY AND THE FUTURE. 16. Internet Voting: Don't Try This at Home Yet... How We Do It Now. Should We Change? Where We Might Go. How Might We Get There? Toward Improved Elections for All. 17. Where Are We Going? Your Behavior Can Make a Big Difference. Corporate and Marketing Practices. Technology Helps and Hurts. Legislation and Regulation. Taking the Single Step. Eternal Vigilance Is the Price of Liberty. 18. Can You Really Be Anonymous? Work Qualifications Need Records, Too. Can You Avoid A Paper Trail? The Urge to Make Lists. Does the Pattern Add Up Correctly? The Urge to Not Be Noticed. VI. APPENDIXES. Appendix A: Glossary. Appendix B: Expanded Privacy Checklist. Personally Identifiable Information. Notice. Choice. Access. Security. What Am I Revealing about Myself? Appendix C: List of Privacy Bills in the States in 2001. Appendix D: Our Co-Conspirators. Appendix E: Privacy-Related Web sites. Personal Web Sites. Organizational Sites. Technology Sites. Index.

9 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112