scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors argue that identity, rather than privacy, provides a more appropriate lens through which to view the issues arising as a result of identity theft, and examine the consequential right to database identity and its relationship to the broader right to identity as a fundamental human right.
Abstract: This article asserts that identity as an emergent legal concept is now evident in the UK (Identity Cards Act 2006 UK). The composition and legal function of the concept is examined and a framework for conceptualising identity in a transactional context from a legal perspective is presented. The article then examines the consequential right to database identity and its relationship to the broader right to identity as a fundamental human right. The origins and nature of the right to identity under international law, particularly under European Community law, are explored and distinguished from privacy. The author asserts that identity, rather than privacy, provides a more appropriate lens through which to view the issues, particularly those arising as a result of identity theft.

8 citations

Journal ArticleDOI
TL;DR: In this paper, the impact of identity theft in developing countries is discussed, and it is shown that unless the organization takes all the necessary and reasonable steps to educate its clients, it stands a risk of paying hefty damages for the loss of money online.

8 citations

Proceedings ArticleDOI
01 Oct 2018
TL;DR: This paper presents the first empirical study to answer a question whether temporal information obtained via OSN may contain sufficient behavioral biometric properties, and presents a methodology to identify a set of idiosyncratic temporal features and develop a system based on those unique features for identity verification.
Abstract: Social interactions via Online Social Network (OSN) can provide a gamut of information about users that have been recently studied as behavioral patterns for person recognition. Similar to social interactions, the temporal information of persons in OSN is likely to exhibit behavioral characteristic and habitual pattern. This paper presents the first empirical study to answer a question whether temporal information obtained via OSN may contain sufficient behavioral biometric properties. In this paper, we present a methodology to identify a set of idiosyncratic temporal features and develop a system based on those unique features for identity verification. To the best of our knowledge, this is the first study on identity verification based on solely temporal profile obtained from an online social network. Experiments demonstrate that the proposed unique temporal profile in OSN can be utilized for users' identity verification, as it obtained low EER of 12% and high AUC of 95.2% in a closed-set test scenario. Potential applications of the proposed temporal profile include identity verification, anomaly and fraud detection, identity theft, continuous authentication, human behavior analysis, and so on.

8 citations

01 Jan 2020
TL;DR: A thorough survey on how biometrics can be effectively applied to eliminate one of the cloud security issue, identity theft is presented.
Abstract: Biometrics has by far proven to be an effective solution for many of the security challenges that is prevalent in most of the technical fields in this Digital era. It is the measurement of physical or behavioral traits in humans used for unique identification. Biometricsuses the pattern recognition technology of Digital Image Processing for identifying unique features in humans. Most commonly applied or considered biometric modalities comprise fingerprint impression, facial landmarks, iris anatomy, speech recognition, hand writing detection, hand geometry recognition, Finger vein detection and signature identification. Biometric technology is applied in various fields, Security systems being one among them. This paper presents a thorough survey on how biometrics can be effectively applied to eliminate oneof the cloud security issue, identitytheft. Awide range of biometric authentication system protocols and implementations in cloud environment, especially to combat identity theft have been proposed earlier.

8 citations

Journal ArticleDOI
Abstract: Fraud alerts — initial fraud alerts, extended fraud alerts, and credit freezes — help protect consumers from the consequences of identity theft. At the same time, they may impose costs on lenders, credit bureaus, and, in some instances, consumers. We analyze a unique data set of anonymized credit bureau files to understand how consumers use these alerts. We document the frequency and persistence of fraud alerts and credit freezes. Using the experience of the data breach at the South Carolina Department of Revenue, we show that consumers who file initial fraud alerts or credit freezes likely do so out of precaution. Consumers who file extended alerts are more likely to be actual victims of identity theft. We find that consumers are heterogeneous in their choice of alerts and that their choices are correlated with important characteristics found in their credit bureau files. These facts are useful for interpreting consumer responses to data breaches and for policymakers.

8 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112