scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
01 Jan 2014
TL;DR: A system that enables internet users' activities to be monitored in order to curb threats to online social networks in Nigeria is offered and requires redefining the operations of Internet Service Providers that provide access for users on the internet and the National Communication Commission, a government body that oversees the information and communication system in Nigeria.
Abstract: Many internet and Online Social Networks (OSN) users in Nigeria are victims of criminal activities perpetrated by those who take advantage of anonymity of their identities to harm users both in the virtual and in the real world on daily basis. Numerous security risks that exist in these networks include privacy violations, identity theft, and sexual harassment among others. A review of some of the different security and privacy risks which threaten the wellbeing of online social networks users including children is presented. This paper proposes a design that authenticate and uniquely identify every internet user most especially those on social networks. This paper further elicits inability to identify perpetrators as one of the reasons for the growing menace. A system that enables internet users' activities to be monitored in order to curb threats to online social networks in Nigeria is offered. It requires redefining the operations of Internet Service Providers (ISPs) that provide access for users on the internet and the National Communication Commission (NCC), a government body that oversees the information and communication system in Nigeria. A central database (cloud) is proposed to be hosted by the National Communication Commission with users' "activity log" feature. Users can send a request on any suspecting associate (pal) on social networks to get confirmation on genuine identity of the individual.

8 citations

Journal ArticleDOI
TL;DR: In this paper, the authors explore the law related to identity theft, review corresponding rights, and responsibilities of stakeholders involved in identity theft and formulate a system of best practices businesses could engage in to prevent or reduce identity theft threats.
Abstract: The purpose of this article is to explore the law related to identity theft, to review corresponding rights, and responsibilities of stakeholders involved in identity theft and to formulate a system of best practices businesses could engage in to prevent or reduce identity theft threats. Utilizing two ethical frameworks based on deontological approaches, the authors conclude that there should be a well-defined management scheme to prevent identity theft, which is easy to comprehend and comply with for all stakeholders. Our proposed management scheme incorporates both legal and ethical elements such that identity theft will be more difficult. Further, our proposal would also address business entities’ practices that are so careless that identity theft is made possible at all or made easier: ethical business practice can do much to reduce or eliminate identity theft.

8 citations

Journal ArticleDOI
TL;DR: It is argued that the eHealth Exchange needs to be augmented to provide greater patient awareness and control, and an approach is taken that informs the patient when her health data is accessed by a healthcare enterprise that is not already trusted by the patient.
Abstract: The increased use of electronic medical records and online sharing of such records is motivated by improved quality of healthcare delivery. However, this use has raised security and privacy concerns because sensitive medical data could be exposed to a variety of threats that exist in the online world, leading to problems such as medical identity theft and billing fraud. If not addressed, such concerns could become a barrier to the large-scale adoption and sharing of electronic medical records. To ease such concerns, we argue that the eHealth Exchange, which is a federal initiative for online exchange of healthcare information, needs to be augmented to provide greater patient awareness and control. We take an approach that informs the patient when her health data is accessed by a healthcare enterprise that is not already trusted by the patient. Such awareness is ensured even when some systems in the health information sharing environment become compromised. We enhance accountability support within eHealth Exchange by using digitally signed logs of sharing records that cannot be modified or refuted. We implement and evaluate these mechanisms in the open-source CONNECT system that follows the eHealth Exchange specifications.

8 citations

Proceedings ArticleDOI
12 Sep 2011
TL;DR: A Role Based Framework is proposed to help facilitate the prevention of ID theft related crimes and identify the areas for further research.
Abstract: This paper synthesises existing research on the involvement of retail sector employees in identity theft (ID) related crimes. In particular, the literature review considers the conceptualisation of internal identity theft and related crimes within retail industries, prevention methods used to combat internal identity theft related crimes, and to synthesise lessons learnt so far in reducing internal identity theft. We propose a Role Based Framework to help facilitate the prevention of ID theft related crimes and identify the areas for further research. The main findings from this research so far include: a high degree of common purpose and focus is required to develop and implement a comprehensive security strategy, better security tools and all levels of an organisation should be given clear/specific responsibilities regarding internal data security.

8 citations

01 Jan 2012
TL;DR: This study investigates data privacy concerns regarding the use of Facebook and university students’ awareness of privacy control mechanisms, privacy best practices, and possible consequences of unprotected information-sharing in Facebook to offer a set of best practices Facebook users can follow to protect data privacy in Facebook.
Abstract: This study investigates data privacy concerns regarding the use of Facebook and university students’ awareness of privacy control mechanisms, privacy best practices, and possible consequences of unprotected information-sharing in Facebook. Research found that students share a large quantity and variety of personal data in their Facebook profiles that, if compromised, could be used by an attacker to answer personal security questions setup as fallback authentication methods for other online accounts. The consequences of this type of data breach could include unauthorized bank account access, identity theft, or other crimes. Results suggest that students are generally unaware of best practices for data protection within Facebook, and often misuse available privacy control mechanisms. The researchers conclude by offering a set of best practices Facebook users can follow to help protect data privacy in Facebook.

8 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112