scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal Article
TL;DR: In this paper, the authors provide a general review of the research literature found on identity theory, social identity, organizational identity, and other related concepts in order to develop an integrative model that integrates diverse disciplinary perspectives and levels of analysis into a coherent set of constructs related to identities in complex social systems.
Abstract: Identity constructs in the behavioral science literature are generally not defined or examined in a consistent and systematic manner across academic disciplines. Consequently a disparate and fragmented body of knowledge has emerged with few integrative frameworks that can help us to integrate the existing research and develop a unified body of knowledge related to identity constructs in social and organizational contexts. This paper provides a general review of the research literature found on identity theory, social identity theory, organizational identity theory, and other related concepts in order to develop an integrative model that integrates diverse disciplinary perspectives and levels of analysis into a coherent set of constructs related to identities in complex social systems. Introduction In our increasingly complex world, where approximately 6.78 billion people coexist, it is important to know who we are. The news media routinely deal with issues related to human identity, whether in the context of documentaries on worldwide diasporas of immigrant workers, the emergence of global and corporate identities, or other relevant contexts. Presently, knowledge concerning personal, social, and institutional identities is as much a topic of interest to scholars and management consultants as it is to marketing professionals and identity theft insurance agents. Through the evidence and reasoning presented in this paper, the author aims to substantiate the notion that an accurate understanding of personal and social identities in human organizations ought to be an ongoing concern of conscientious individuals as well. In brief, this paper integrates the prevalent currents in the research literature on human identities and proposes a critical re-conceptualization of identity constructs in studies of complex social systems. The design of an integrative framework based on the accumulating body of literature focusing on concepts that concern personal, relational, social, organizational, and cultural identities presents a formidable challenge, particularly if the underlying interest of the task is to extract general principles from scholarly publications that may have relevant implications and practical use in real life. In the last few years, several integrative reviews of research within specific academic fields have synthesized key developments and emerging trends within narrowly defined disciplines or theoretical perspectives; such as the integration of existing research on individual, personal, or selfidentities (Cote, 2006; Lachmann, 2004; Stets & Burke, 2000; Stryker & Burke, 2000). A second set of integrative studies focus on the emerging patterns of scholarly research on the formation of social identities (Brekhus, 2008; Brown, Hitlin & Elder, 2006; Davis, 2003; Harris & Sim, 2002; Hornsey, 2008). Other studies integrate the emerging body of research on organizational identities (Alvesson, Ashcraft & Thomas, 2008; Haslam, 2004; Ingram & Qingyuan Yue, 2008; Leidner, 2006; Pratt a Foreman, 2000; Rattansi & Phoenix, 2005; Sluss & Ashforth, 2007), and cultural identities (Brewer & Yuki, 2007; Hong, Wan, No & Chiu, 2007). In spite of these integrative developments within specific domains, scholars tend to agree that a systematic framework which links the research streams into a coherent body of related knowledge does not exist and theoretical fragmentation and disciplinary barriers continue to impede progress towards a unified theory of identity constructs in the behavioral sciences. Different proponents of identity theory, social identity theory, and organizational identity theory commonly acknowledged that substantial similarities and overlaps exist between some of the conceptual terms found in the literature (Brekhus, 2008; Cote, 2006; Hornsey, 2008). The perspectives represented in these theories, however, differ significantly and the use of terms across theories should not be confused or considered synonymous. …

6 citations

Patent
15 Oct 2019
TL;DR: In this article, metadata is received for different log events from a plurality of regional controller nodes, implemented at least partially in hardware and geographically-dispersed around the data communication network for proximity to network devices.
Abstract: Metadata is received for different log events, from a plurality of regional controller nodes, implemented at least partially in hardware and geographically-dispersed around the data communication network for proximity to network devices. Each of the log events is reported by the network devices to a regional collector node of the plurality of regional controller nodes. Log events concerning a user authenticating to a network device that is geographically proximate to the user and comprising at least user identity aspect and a location aspect for specific users of stations serviced by the network devices, are detected. Feasibility of location changes can be determined to identify possible identity theft.

6 citations

01 Jan 2009
TL;DR: In this article, the authors present data from a small sample of identity theft victims to explore a different dimension of the crime, one that suggests alternative interventions, such as compliance-oriented approaches and reification.
Abstract: Why has identity theft remained so prevalent, in light of the development of ever more sophisticated fraud detection tools? Identity theft remains at 2003 levels – 9.9 million Americans fell victim to the crime in 2009.One faction explains the identity theft as a problem of a lack of control over personal information. Another argues conversely that identity theft may be caused by a lack of access to personal information by credit grantors. This article presents data from a small sample of identity theft victims to explore a different dimension of the crime, one that suggests alternative interventions.Drawing upon victim and impostor data now accessible because of updates to the Fair Credit Reporting Act, the data show that identity theft impostors supply obviously erroneous information on applications that is accepted as valid by credit grantors. Thus, the problem does not necessarily lie in control nor in more availability of personal information, but rather in the risk tolerances of credit grantors. An analysis of incentives in credit granting elucidates the problem: identity theft remains so prevalent because it is less costly to tolerate fraud. Adopting more aggressive and expensive anti-fraud measures is extremely costly and jeopardizes customer acquisition efforts.These business decisions leave individuals and merchants with some of the externalities of identity theft. Victims sometimes spend their own money, and more often, valuable personal time dealing with identity theft externalities. This article concludes by reviewing several approaches to internalizing these costs. Popular approaches specify prescriptive rules to address particularly problematic practices in credit granting, such as using the Social Security number as a password for authentication. These approaches may lead to compliance-oriented approaches and reification. Several commentators have suggested negligence actions as a cure to identity theft, but uncertainty surrounding the duty of care would probably leave many consumers unremunerated. A strict liability regime is suggested because credit grantors are the least cost avoiders in the identity theft context, and because consumers cannot control the credit granting process nor insure against identity theft losses efficiently.

6 citations

Book
04 Dec 2008
TL;DR: Cyber Crime Fighters: Tales from the Trenches as mentioned in this paper provides a good primer on how personal information can be easily obtained by some of the folks you least want to have it.
Abstract: Cyber Crime Fighters: Tales from the Trenches offers one of the most insightful views of the latest criminal threats to the public: cyber crime. This book provides a good primer on how your personal information can be easily obtained by some of the folks you least want to have it. Maureen Boyle, crime reporter, The Enterprise of Brockton, MA Experts Felicia Donovan and Kristyn Bernier pull no punches in explaining the dangers lurking on the Web, from identity appropriation and theft to using new technology and the Internet to facilitate real-life stalking. Parents especially will be shocked at how easy it is for predators to target and solicit children online. By clearly explaining the dangers that lurk online and highlighting practical tips to minimize your risk, the authors have created a book that not only educates but empowers readers to protect themselves. Jennifer Hemmingsen, columnist and former public safety reporter, The (Cedar Rapids, Iowa) Gazette Written by leading cyber crime investigators, Cyber Crime Fighters: Tales from the Trenches takes you behind the scenes to reveal the truth behind Internet crime, telling shocking stories that arent covered by the media, and showing you exactly how to protect yourself and your children. This is the Internet crime wave as it really looks to law enforcement insiders: the truth about crime on social networks and YouTube, cyber stalking and criminal cyber bullying, online child predators, identity theft, even the latest cell phone crimes. Here are actual cases and actual criminals, presented by investigators who have been recognized by the FBI and the N.H. Department of Justice. These stories are trueand if you want to stay safe, you need to know about them. Learn how todays criminals can track your whereabouts, read your emails, and steal your identity Find out how much of your personal information is already onlineand how to keep the rest private Learn how cyber stalkers really thinkand how to protect yourself from them Protect your laptop, your iPod, and your precious data from getting stolen Encounter the dark side of Internet dating Discover the hidden crime wave on todays specialized social networks Uncover the cell phone upskirters and downblousers and the technicalities that keep them out of jail Follow cyber crime specialists as they investigate and catch online sexual predators Get the real truth about phishing, pharming, criminal spam, and online scams See how investigations really workand why TV crime shows often get it wrong! Walk through your own personal, step-by-step, online safety checkup

6 citations

Journal ArticleDOI
TL;DR: In this article, the differences between familial and non-familial identity theft were explored through the January-July 2012 Identity Theft Supplement collected with the National Crime Victimization Survey, which showed that family member victims were likely to have experienced one type of identity theft more often than non-family victims were, personal information used for other fraudulent purposes, which included government benefits and driver's licenses.
Abstract: Reports of identity theft in the U.S. have risen since the 2000s, which has resulted in financial losses into the billions. Along with this rise is the increased likelihood of familial identity theft. In this study, the differences between familial and non-familial identity theft were explored through the January–July 2012 Identity Theft Supplement collected with the National Crime Victimization Survey. Results showed that family member victims were likely to have experienced one type of identity theft more often than non-family victims were, personal information used for other fraudulent purposes, which included government benefits and driver’s licenses. Factors that allowed for a respondent’s personal information used for other fraudulent purposes included family membership, young persons in the household, and repeat victimization. Findings suggest that few factors can predict the likelihood to experience the misuse of personal information and that familial identity theft may be difficult to detect.

6 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112