scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The study presented finds that there are many cyber threats existing within the social media platform, such as loss of productivity, cyber bullying, cyber stalking, identity theft, social information overload, inconsistent personal branding, personal reputation damage, data breach, malicious software, service interruptions, hacks, and unauthorized access to social media accounts.
Abstract: In this paper, we present secondary research on recommended cybersecurity practices for social media users from the user’s point of view. Through following a structured methodological approach of the systematic literature review presented, aspects related to cyber threats, cyber awareness, and cyber behavior in internet and social media use are considered in the study. The study presented finds that there are many cyber threats existing within the social media platform, such as loss of productivity, cyber bullying, cyber stalking, identity theft, social information overload, inconsistent personal branding, personal reputation damage, data breach, malicious software, service interruptions, hacks, and unauthorized access to social media accounts. Among other findings, the study also reveals that demographic factors, for example age, gender, and education level, may not necessarily be influential factors affecting the cyber awareness of the internet users.

8 citations

Book
01 Jan 1973
TL;DR: In this article, the U.S. Supreme Court discusses the criminal law's impact on women, as reflected in the ''battered person'' aspect of self-defense and contents of the crime of rape or sexual assault.
Abstract: Selected cases and materials are likely to evoke the interest of students. The book contains factual situations that are likely to spark emotional responses--and students must then filter through the requirements of the law and its underlying rationales. Authors have given preference to recent cases and have taken account of the development of new crimes such as identity theft, carjacking, and home invasion. The new edition includes relevant significant discussions of substantive criminal law issues by the U.S. Supreme Court. Selected material reflects the criminal law's impact on women, as reflected in the """"battered person"""" aspect of self-defense and contents of the crime of rape or sexual assault.

8 citations

Proceedings ArticleDOI
01 Oct 2014
TL;DR: This paper proposes an integrated system that filters message destinations based on message header and sender's registered platform mapping, and customer preference and message type/header mapping to mitigate identity theft and spamming through bulk messaging respectively.
Abstract: The introduction of mobile technology has brought dramatic, albeit positive, change to the communication landscape all over the world. Over the years, the effects of its growth have permeated virtually every space and sector; its pervasiveness, offering voice, data, SMS capabilities, as essential driver of effective communication, corporate goals, and economic growth, cannot be overemphasized. Unfortunately, attackers have been leveraging on this technology to perpetrate different infringements, and even crimes, including identity theft and spamming. While several techniques for mitigating spamming have been proposed, much research has not been focused on preventing identity theft through bulk messaging. In this paper we propose an integrated system that filters message destinations based on message header and sender's registered platform mapping, and customer preference and message type/header mapping to mitigate identity theft and spamming through bulk messaging respectively.

8 citations

Proceedings ArticleDOI
08 Jun 2006
TL;DR: This paper will look at the Internet crime of identity theft from both an internet and non-internet perspective and will include the fraudulent acts of Phishing and Pharming as examples of metaphor dispersion.
Abstract: The language we use to talk about a thing or phenomenon influences how we perceive of it as a social entity or construction and, in turn, how we use it. In order to make sense of the Internet environment as well as diverse Internet crimes (such as social engineering, phishing, pharming, etc.), metaphors are used as a means to describe the unfamiliar in terms of the familiar. In that capacity, they are ever-present, offering structure and powerful images of that thing or phenomenon. Davidson (cited in Coyne 1995 p. 262)[1] refers to metaphor groupings as untrue statements that are not lies, and Cooper (1997)[2] states that metaphors, by their power of extension, have the ability to trap the unwary by promoting faulty logic. This paper will look at the Internet crime of identity theft from both an internet and non-internet perspective and will include the fraudulent acts of Phishing and Pharming as examples of metaphor dispersion. It will explore these Internet phenomena in terms of their appropriateness or in- appropriateness as metaphors.

8 citations

Book ChapterDOI
03 Sep 2007
TL;DR: An overview of the major issues resulting form the introduction of new systems, mainly those based on RFID and ubiquitous/pervasive computing technology and the consequences of increased efficiency and improved security in relation to privacy protection are given.
Abstract: This paper investigates the effect of new technologies and new systems on data protection and privacy. It attempts to give an overview of the major issues resulting form the introduction of new systems, mainly those based on RFID and ubiquitous/pervasive computing technology and discusses the consequences of increased efficiency and improved security in relation to privacy protection. Most of the legally-oriented analysis carried out in this paper is primarily grounded in the current European data and privacy protection legislation.

8 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112