scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings Article
01 Jan 2011
TL;DR: In this paper, the authors propose a defense model that uses these experts to fight phishing and use them to classify web-pages on PhishTank as either phish or genuine.
Abstract: Phishing is deceptive collection of personal information leading to embezzlement, identity theft, and so on. Preventive and combative measures have been taken by banking institutions, software vendors, and network authorities to fight phishing. At the forefront of this resilience are consortiums such as APWG (Anti-Phishing Working Group) and PhishTank, the latter being a collaborative platform where everyone can submit potentially phishing web-pages and classify web-pages as either phish or genuine. PhishTank also has an API that the browsers use to notify users when she tries to load a phishing page. There are some organizations and individuals who are very active and highly accurate in classifying web-pages on PhishTank. In this paper, we propose a defense model that uses these experts to fight phishing.

6 citations

Book ChapterDOI
01 May 2008
TL;DR: How personal information leaks from online systems of national importance is determined, proof of concept software is discussed to demonstrate the seriousness of the problem, and how to improve the situation is suggested.
Abstract: Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal information. Leakage of such information can facilitate large-scale identity theft. This paper determines how personal information leaks from online systems of national importance, discusses proof of concept software to demonstrate the seriousness of the problem, and suggests how to improve the situation.

6 citations

Journal ArticleDOI
01 Dec 2014
TL;DR: Investigating the reasons why developed countries adopt any particular system for data protection and evaluating the approaches’ dispute resolution, enforcement and compliance monitoring processes for their applicability in developing nations, using Nigeria as a case study.
Abstract: The emergence of e-commerce has brought about many benefits to a country’s economy and individuals, but the openness of the Internet has given rise misuse of personal data. Several countries have enacted legislation and procedures to protect the information privacy of their citizens and corporations. However, many developing countries, such as Nigeria are yet to enact any procedures, despite the high level of identity theft and online fraud. Different approaches to data privacy and protection are found in different countries. These can be generally categorised as the self-regulation approach, as used in the United States and the government approach, as used in the United Kingdom. This paper investigates the reasons why developed countries adopt any particular system for data protection. The paper evaluates these data protection approaches to determine its applicability in developing nations, using Nigeria as a case study. This is done by identifying the issues affecting data protection in the developing country and then evaluating the approaches’ dispute resolution, enforcement and compliance monitoring processes for their applicability in the case of Nigeria. Benchmarks developed by the Australian government for Industry-Based Customer Dispute Resolution Schemes provide a suitable mechanism for evaluation.

6 citations

Book ChapterDOI
11 Mar 2008
TL;DR: This paper reports a prototype implementation of an identity tool on a mobile phone with a PKI-SIM card, combining an officially recognised national mobile e-ID infrastructure with identification procedures based on controlled identity revelation.
Abstract: An electronic ID scheme must be usable in a wide range of circumstances, especially in ordinary situations, such as proving your right to a concession ticket on a bus. One of the problems to be addressed is privacy. Indeed, when documents are read by electronic means, a lot of information is not only revealed, but can be copied, stored and processed without our consent. Another issue is ubiquity, reliability and acceptance of the involved technology. In this paper we attempt to address these issues by combining an officially recognised national mobile e-ID infrastructure with identification procedures based on controlled identity revelation. We report a prototype implementation of an identity tool on a mobile phone with a PKI-SIM card.

6 citations

Proceedings ArticleDOI
12 Sep 2011
TL;DR: This paper reviews both U.S. and EU cyber legislations and how effective they are in controlling cyber crimes and how the U.s. can benefit from EU Convention approach.
Abstract: The advent of Internet technologies has created global cyber crime problems Cyber crimes affect all of us at the time when online transactions are in billions of dollars per year and cyber criminals are costing e-commerce billions of dollars in damages [1] These are the components of cyber crime through which cyber criminals have perpetrated these areas: hacking, distributed denial-of-service, phishing, spoofing, identity theft and credit card fraud which have increased in frequency over time As e-commerce and online businesses are dominating today's business world and as new technologies emerges cyber crime has a bigger impact on the global economy The US legal systems and law enforcement agencies seem to be lagging behind in their efforts to capture and prosecute cyber criminals This paper reviews both US and EU cyber legislations and how effective they are in controlling cyber crimes The factors affecting US from taking a leadership role in fighting cyber crime is reviewed EU legislations are compared to see if US can benefit from EU Convention approach

6 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112