scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
19 Apr 2018
TL;DR: It is found that while participants act to address offline threats, this vigilance does not translate to their online activities, and their technology use is shaped by needs and benefits rather than risk perceptions.
Abstract: Undocumented immigrants in the United States face risks of discrimination, surveillance, and deportation. We investigate their technology use, risk perceptions, and protective strategies relating to their vulnerability. Through semi-structured interviews with Latinx undocumented immigrants, we find that while participants act to address offline threats, this vigilance does not translate to their online activities. Their technology use is shaped by needs and benefits rather than risk perceptions. While our participants are concerned about identity theft and privacy generally, and some raise concerns about online harassment, their understanding of government surveillance risks is vague and met with resignation. We identify tensions among self-expression, group privacy, and self-censorship related to their immigration status, as well as strong trust in service providers. Our findings have implications for digital literacy education, privacy and security interfaces, and technology design in general. Even minor design decisions can substantially affect exposure risks and well-being for such vulnerable communities.

81 citations

Book ChapterDOI
20 Jun 2011
TL;DR: Biometric recognition was introduced as a more secure means of identity establishment because it is difficult to steal or counterfeit when compared to PIN numbers or passwords, however, biometric recognition has a drawback that rises from the nature of the authenticating modality.
Abstract: Automatic and accurate identity validation is becoming increasingly critical in several aspects of our every day lives such as in financial transactions, access control, traveling, healthcare and other. Traditional strategies to automatic identity recognition include items such as PIN numbers, tokens, passwords and ID cards. Despite the wide deployment of such tactics, the authenticating means is either entity or knowledge-based which rises concerns with regard to their ease of acquisition and use from unauthorized third parties. According to the latest The US Federal Commission Report, Frebruary 2010 (n.d.), in 2009 identity theft was the number one complaint category ( a total of 721,418 cases of consumer complaints). As identity theft can take different forms, credit card fraud was the most prominent (17%), followed by falsification of government documents (16%), utilities fraud (15%), employment fraud (13%) and other. Among these cases, true-identity theft constitutes only a small portion of the complaints, while ID falsification appears to be the greatest threat. Unfortunately, the technology for forgery advances without analogous counterfeit improvements. Biometric recognition was introduced as a more secure means of identity establishment. Biometric features are characteristics of the human body that are unique for every individual and that can be used to establish his/her identity in a population. These characteristics can be either physiological or behavioral. For instance, the face, the iris and the fingerprints are physiological features of the body with identifying information. Examples of behavioral features include the keystroke dynamics, the gait and the voice. The fact that biometric features are directly linked with the users presents an extraordinary opportunity to bridge the security gaps caused by traditional recognition strategies. Biometric features are difficult to steal or counterfeit when compared to PIN numbers or passwords. In addition, the convenience by which a biometric feature can be presentedmakes the respective systemsmore accessible and easy to use. However, biometric recognition has a drawback that rises from the nature of the authenticating modality. As opposed to static PIN numbers or passwords, biometric recognition may present false rejection since usually no two readings of the same biometric feature are identical. Anatomical, psychological or even environmental factors affect the appearance of the biometric feature at a particular instance. For instance, faces may be presented to the recognizers under various expressions, different lighting settings or with 10

80 citations

Journal ArticleDOI
TL;DR: The history of fraud detection at AT&T is reviewed, one of the first companies to address fraud in a systematic way to protect its revenue stream and the use of simple, understandable models, heavy use of visualization, and a flexible environment are advocated.
Abstract: Fraud detection is an increasingly important and difficult task in today’s technological environment. As consumers are putting more of their personal information online and transacting much more business over computers, the potential for losses from fraud is in the billions of dollars, not to mention the damage done by identity theft. This paper reviews the history of fraud detection at AT&T, one of the first companies to address fraud in a systematic way to protect its revenue stream. We discuss some of the major fraud schemes and the techniques used to address them, leading to generic conclusions about fraud detection. Specifically, we advocate the use of simple, understandable models, heavy use of visualization, and a flexible environment and emphasize the importance of data management and the need to keep humans in the loop.

79 citations

Patent
10 Dec 2001
TL;DR: In this article, the authors proposed an identity security system that reduces the likelihood of identity theft and fraud by using a central system and a portable wireless device, where the central system stores personal data of a party including information regarding one or more payment cards of the party.
Abstract: An identity security system ( 10 ) that reduces the likelihood of identity theft and fraud includes a central system ( 12 ) and a portable wireless device ( 15 ). The central system ( 12 ) stores personal data of a party including information regarding one or more payment cards of the party, one or more bank accounts of the party, driver license data of the party, and/or other identification data of the party. The wireless device ( 15 ) electronically connects to the central system ( 12 ). With the present system, using the wireless device ( 15 ), the party can pay for a transaction using the one or more of the payment cards, cause funds to be transferred to or from the bank accounts and/or provide identifying data if necessary.

79 citations

Proceedings ArticleDOI
25 Mar 2010
TL;DR: This paper highlights some privacy issues raised by the growing development of SNS and identifies clearly three privacy risks, and introduces the concept of a Privacy-enhanced Social Networking Site (PSNS), and describes Privacy Watch, the first implementation of a PSNS.
Abstract: Social Networking Sites (SNS), such as Facebook and LinkedIn, have become the established place for keeping contact with old friends and meeting new acquaintances. As a result, a user leaves a big trail of personal information about him and his friends on the SNS, sometimes even without being aware of it. This information can lead to privacy drifts such as damaging his reputation and credibility, security risks (for instance identity theft) and profiling risks. In this paper, we first highlight some privacy issues raised by the growing development of SNS and identify clearly three privacy risks. While it may seem a priori that privacy and SNS are two antagonist concepts, we also identified some privacy criteria that SNS could fulfill in order to be more respectful of the privacy of their users. Finally, we introduce the concept of a Privacy-enhanced Social Networking Site (PSNS) and we describe Privacy Watch, our first implementation of a PSNS.

78 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112