scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
Ludek Seda1
TL;DR: In this paper, the authors investigated the relationship between the university students' knowledge of the risk of identity theft and the preventive measures they take, and found that the students demonstrated a significant misunderstanding of who perpetrators typically were targeting when stealing personal information or what perpetrators were looking for.
Abstract: Purpose – This study aims to explain what factors influence the relationship between the university students’ knowledge of the risk of identity theft and the preventive measures they take. Design/methodology/approach – A series of semi-structured interviews was used as the primary data collection tool. The sample for this study comprised 12 undergraduate students (six males and six females) from the Flinders Business School. The interviews were designed as face-to-face interviews. Findings – The current findings indicate that, despite the fact that students were reasonably knowledgeable regarding the general risk of identity theft, many of the students had only limited knowledge about specific issues related to identity theft. It was found that the limited knowledge or misunderstanding of specific issues prevented students from using appropriate measures that could reduce the risk of identity theft. The students demonstrated a significant misunderstanding of who perpetrators typically were targeting when stealing personal information or what perpetrators of identity theft were looking for. Originality/value – The results of the study contribute to a better understanding of the students’ knowledge about the risks associated with identity crime. They may also assist governments and other stakeholders with vested interests, such as financial institutions and educational providers, to educate individuals about the circumstances where they are potentially vulnerable to identity theft.

7 citations

Journal ArticleDOI
TL;DR: A closed set-based learning classifier inspired by classification in concept lattices from positive and negative examples and several works on emerging patterns is introduced, which relies on the tf-idf parameter used in the context of information retrieval.

7 citations

Book ChapterDOI
19 Sep 2017
TL;DR: This work designs a privacy scoring mechanism inspired by privacy risk analysis (PRA) to guide users to understand the various privacy problems they may face and is the first effort in adopting PRA approach for user-centric analysis of OSN privacy risks.
Abstract: The social benefit derived from online social networks (OSNs) can lure users to reveal unprecedented volumes of personal data to a social graph that is much less trustworthy than the offline social circle. Although OSNs provide users privacy configuration settings to protect their data, these settings are not sufficient to prevent all situations of sensitive information disclosure. Indeed, users can become the victims of harms such as identity theft, stalking or discrimination. In this work, we design a privacy scoring mechanism inspired by privacy risk analysis (PRA) to guide users to understand the various privacy problems they may face. Concepts, derived from existing works in PRA, such as privacy harms, risk sources and harm trees are adapted in our mechanism to compute privacy scores. However, unlike existing PRA methodologies, our mechanism is user-centric. More precisely, it analyzes only OSN user profiles taking into account the choices made by the user and his vicinity regarding the visibility of their profile attributes to potential risk sources within their social graphs. To our best knowledge, our work is the first effort in adopting PRA approach for user-centric analysis of OSN privacy risks.

7 citations

Book ChapterDOI
01 Jan 2019
TL;DR: An exploratory analysis of identity trading in the darknet captures the key features of three major markets of fake IDs in Tor networks, and applies attack-defense trees to show how the security of an e-ID infrastructure is affected by this phenomenon.
Abstract: Securing national electronic identification (e-ID) systems requires an in depth understanding of the associated threats. The trade of identity related artefacts in the darknet facilitates illegal activities such as identity theft in both physical and virtual worlds. This paper reports the findings of an exploratory analysis of identity trading in the darknet. We capture the key features of three major markets of fake IDs in Tor networks, and apply attack-defense trees to show how the security of an e-ID infrastructure is affected by this phenomenon.

7 citations

Journal Article
TL;DR: In this paper, the authors argue that the decline of public identities over the past three decades, combined with increasing secrecy in the process of identification, is the root cause of the burgeoning problem of identity theft.
Abstract: This essay argues that the decline of public identities over the past three decades, combined with increasing secrecy in the process of identification, is the root cause of the burgeoning problem of identity theft Identity theft is easy because impersonation increasingly takes place in private transactions that are invisible to the victim The essay compares two proposed solutions: Professor Daniel Soloves' architectural approach and the author's Public Identity System Both would make the identification process transparent to the person identified, put imposters at risk by requiring personal appearances, and ban the use of social security numbers as passwords But the two writers take opposing positions with respect to continued secrecy of the information used to identify consumers Solove would maintain the link between identification information (name and social security number) and personal information (information descriptive of the consumer or the consumer's circumstances) and seek to impose better security to keep all of it from thieves The author would sever the link between the two kinds of information, make identification information - which is harmless - public, and allow consumers to use it to create public, thief-proof identities The essay explains the operation of the Public Identity System the author proposed in Human Identification Theory and the Identity Theft Problem, 80 Texas Law Review 89 (2001) and addresses Solove's objections related to the public display of social security numbers, consumer profiling, stalking, marketing abuse, and other aspects of the proposed System

7 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112