scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
01 Mar 2014
TL;DR: A new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer confidence and preventing identity theft is presented.
Abstract: A rapid growth in E-Commerce market is seen in recent time throughout the world. With ever increasing popularity of online shopping, Debit or Credit card fraud and personal information security are major concerns for customers, merchants and banks specifically in the case of CNP (Card Not Present). This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer confidence and preventing identity theft. The method uses combined application of steganography and visual cryptography for this purpose.

72 citations

12 May 2008
TL;DR: The Australian Institute of Criminology as discussed by the authors provided an update to the previous work by estimating the costs of crime for 2005, which were $35.8b, covering a range of crimes against people and property, fraud, and drug-related crimes.
Abstract: Australian Institute of Criminology research in 2003 examined the costs of crime to the Australian community. This current report provides an update to the previous work by estimating the costs of crime for 2005. While relying primarily on data from the United Kingdom and United States, some Australian data provide general estimates of crime-related costs. The total costs of crime cover components of the criminal justice systems: police, courts, corrections, and other criminal justice-related government agencies; and the costs of fraud. The report covers a range of crimes against people and property, fraud, and drug-related crimes. Estimates for each of these cover the general characteristics of incidents, property loss, medical costs, lost output and intangible costs. Notwithstanding the considerable difficulties in estimating costs of crime, which are described in this report, the estimated costs of crime for 2005 are $35.8b. The report highlights the need for improved availability of Australian crime data. Emerging challenges for research that informs government policy include cybercrimes - comprising fraud and identity theft - arson and bushfires, theft from motor vehicles, shop theft, estimates of intangible losses and lost output, estimates of lost business productivity due to criminal activity and national injury estimates.

72 citations

Journal ArticleDOI
TL;DR: Professor Solove argues that protecting privacy must focus not merely on remedies and penalties but on shaping architectures, which create a world where people are vulnerable to significant harm and are helpless to do anything about it.
Abstract: This Article contrasts two models for understanding and protecting against privacy violations. Traditionally, privacy violations have been understood as invasive actions by particular wrongdoers who cause direct injury to victims. Victims experience embarrassment, mental distress, or harm to their reputations. Privacy is not infringed until these mental injuries materialize. Thus, the law responds when a person's deepest secrets are exposed, reputation is tarnished, or home is invaded. Under the traditional view, privacy is an individual right, remedied at the initiative of the individual. In this Article, Professor Solove contends the traditional model does not adequately account for many of the privacy problems arising today. These privacy problems do not consist merely of a series of isolated and discrete invasions or harms, but are systemic in nature. They cannot adequately be remedied by individual rights and remedies alone. In contrast, Professor Solove proposes a different model for understanding and protecting against these privacy problems. Developing the notion of "architecture" as used by Joel Reidenberg and Lawrence Lessig, Solove contends that many privacy problems must be understood as the product of a broader structural system which shapes the collection, dissemination, and use of personal information. Lessig and Reidenberg focus on "architectures of control," structures that function to exercise greater dominion over individuals. Solove argues that in addition to architectures of control, we are seeing the development of "architectures of vulnerability," which create a world where people are vulnerable to significant harm and are helpless to do anything about it. Solove argues that protecting privacy must focus not merely on remedies and penalties but on shaping architectures. Professor Solove illustrates these points with the example of identity theft, one of the most rapidly growing types of criminal activity. Identity theft is often conceptualized under the traditional model as the product of disparate thieves and crafty criminals. The problem, however, has not been adequately conceptualized, and, as a result, enforcement efforts have been misdirected. The problem, as Solove contends, is one created by an architecture, one that creates a series of vulnerabilities. This architecture is not created by identity thieves; rather, it is exploited by them. It is an architecture of vulnerability, one where personal information is not protected with adequate security. The identity thief's ability to so easily access and use our personal data stems from an architecture that does not provide adequate security to our personal information and that does not afford us with a sufficient degree of participation in the collection, dissemination, and use of that information. Understanding identity theft in terms of architecture reveals that it is part of a larger problem that the law has thus far ignored. Solove then discusses solutions to the identity theft problem. He engages in an extensive critique of Lynn LoPucki's solution, which involves the creation of a public identification system. After pointing out the difficulties in LoPucki's proposal, Solove develops an architecture that can more appropriately curtail identity theft, an architecture based on the Fair Information Practices.

71 citations

Patent
01 Nov 2004
TL;DR: In this paper, reports are issued to a person detailing instances in which a person's driver's license, passport, or other government-issued identification documents are presented as a form of ID.
Abstract: To more rapidly redress identity theft, reports are issued to a person detailing instances in which that person's driver's license, passport, or other government-issued identification documents are presented as a form of ID. These reports can be issued periodically (e.g., integrated with monthly reports aggregating bank and brokerage account information, of the sort provided by Yahoo! and Microsoft Money software), or can be issued by email or text messaging, etc., each time an ID presentment is reported. Upon receiving a report of unfamiliar ID usage (e.g., a report that a driver's license was presented as evidence of age to purchase alcohol in a remote state), the person can take early action to redress apparent identity theft.

71 citations

Journal ArticleDOI
TL;DR: In this paper, the authors model identity and its use in credit transactions and show that various types of identity theft occur in equilibrium, including new account fraud, existing account fraud and friendly fraud.

70 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112