scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors argue that the complaints and consent orders in these cases have provided no real guidance as to what a company should do (or not do) to avoid being the target of an unfairness action if it is the victim of a security breach.
Abstract: The Federal Trade Commission has taken the lead in the online privacy arena. It initially promoted self-regulation, but eventually realized that self-regulation was not working. Thereafter it began taking legal action against entities that violated the terms of their own privacy policies as deceptive trade practices. More recently, the Commission began filing complaints under its unfairness doctrine against companies that experienced data security breaches. This article analyzes these latest cases under the carefully developed requirements of the unfairness doctrine, and argues that these actions were improperly filed. It further argues that the complaints and consent orders in these cases have provided no real guidance as to what a company should do (or not do) to avoid being the target of an unfairness action if it is the victim of a security breach. The article proposes specific legislation that would give the Commission express authority to take action against companies that experience data security breaches, but only under well-defined regulations developed by the Commission in collaboration with the affected industries and with input from all interested parties. Data security and the prevention of identity theft are too important to be left to the whim of the FTC or any other government agency. Companies need to know what is expected of them, so that they can implement appropriate technologies and put in place proper procedures to provide an adequate level of protection for sensitive consumer data. Enacting specific legislation, as proposed in this article, would go a long way toward achieving that goal.

6 citations

Journal ArticleDOI
TL;DR: Until the authors can solve the failures associated with authenticating people, cybercrime will not only persist, it will become systemically worse and the associated costs greater.

6 citations

Book ChapterDOI
01 Jan 2017
TL;DR: This chapter classifies the security requirements and vulnerabilities in the Internet of Things, and provides an analysis of the types of attacks facing IoT infrastructure and services, including physical attacks and local attacks over WiFi, upon both institutions and individuals through various smart home devices.
Abstract: This chapter classifies the security requirements and vulnerabilities in the Internet of Things (IoT), and provides an analysis of the types of attacks facing IoT infrastructure and services, including physical attacks and local attacks over WiFi, upon both institutions and individuals, through various smart home devices. Some hazards including unauthorized surveillance, identity theft, monetary theft, vandalism, etc. are addressed. This chapter focuses on the technical implementation of IoT security architecture, and addresses aspects of security including confidentiality, integrity, availability, nonrepudiation, authenticity, and privacy. Some challenges to securing the IoT are discussed, including poor design and implementation, limited guidance, poor security in legacy equipment, infrequent rebooting of devices, infrequent security updates, insufficient authentication or authorization, etc.

6 citations

Journal ArticleDOI
TL;DR: Attempts to fix the password problem are not being implemented, mainly because they do not solve key issues, and neither do these solutions address the need to encompass all entities in a single digital identity ecosystem that can work globally, says Paul Simmonds of the Global Identity Foundation.

6 citations

Journal ArticleDOI
TL;DR: In a world where smartphones are becoming ubiquitous and more powerful than ever, securing these devices has become a key issue and it becomes increasingly important that the authors can authenticate ourselves reliably.
Abstract: In a world where smartphones are becoming ubiquitous and more powerful than ever, securing these devices has become a key issue. We are so invested in our smartphones that once they are compromised, our personal lives are also laid bare to a cybercriminal. Digital forgery and identity theft can be achieved in the blink of an eye, and for this reason it becomes increasingly important that we can authenticate ourselves reliably.

6 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112