scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Dissertation
01 Nov 2018
TL;DR: A hypothesis under examination was that personality traits serve to predict the behaviour of online social networks users, and have the potential to identify those users at risk of either carelessly or unknowingly compromising their personal privacy, to inform the design of training materials that attempt to encourage those users to protect their personal information more carefully.
Abstract: In this thesis the behaviour of online social network users is examined, with a particular focus on user activities that preserve or compromise personal privacy. A two-fold approach to data collection was used, with a large-scale online survey (n=90 respondents) that measured user's online social network use (using Facebook as a case study) and their personality traits (via Cattel's 16 Personality Factors questionnaire), followed by a smaller number of semi-structured interviews (n=14 participants). A hypothesis under examination was that personality traits serve to predict the behaviour of online social networks users, and have the potential to identify those users at risk of either carelessly or unknowingly compromising their personal privacy (and thereby placing themselves at risk of identity theft and other malice), and to inform the design of training materials that attempt to encourage those users to protect their personal information more carefully. Survey data were subject to correlational analysis to examine the association between the 16 Personality Factors, and the Big Five personality traits derived thereof, and the information visibility settings of the respondents (viz., in the online social network selected as a case study, the settings of "public", "friends only", "custom", "only me" or "not supplied" for each information type). To identify at-risk participant groups (i.e., those making sensitive personal information publically available), cluster analyses were performed by partitioning respondents into their dominant Big Five traits grouping. For survey respondents with the least cautious settings, it was found that the most highly correlated Big Five traits were Independence (Agreeableness) and Self-control (Conscientiousness), with a smaller effect of Tough-mindedness (Openness). More fine-grained analyses were performed that related user behaviour to facets within each trait. Follow-up interview data indicates that the true settings of at-risk group was indeed similar to those reported in the survey, but also that a significant proportion of participants were not aware of settings available to protect their privacy and so did not make use of them. Finally, a set of recommendations in relation to privacy settings has been constructed, in addition to detailed guidance of how to behave safely on the case study online social network (Facebook). A set of recommended actions for Facebook themselves are also included.

5 citations

Book
06 Sep 2004
TL;DR: High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes and imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted.
Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes.High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run.Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice.Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigationsThis easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself."Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well."-Mike Tarrani, Independent Consultant"Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security."-Michael Nickle, Lead Consultant, VeriSign"Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy."-David Kensiski, Director of Operations, InfiniRoute Networks"The modern high-tech industry brought new things to our lives. Buying a book, selling a car, or robbing a bank has never been so easy. Why is that? You've got to read this book to find out!"-Denis Scherbakov, Systems Administrator, MCSA: Security, MCSA, MCP, Security+Atlant Telecom, ISP"Steven Branigan has been deeply involved with many real incidents of high-tech crimes-some of them I know of are too sensitive to disclose by name. Yet, High-Tech Crimes Revealed gives outsiders an opportunity to find out what actually takes place in this often-misunderstood field. By combining his powerful knowledge of computers and technology with the legal and behavioral considerations that are overlooked by those less experienced, Branigan demonstrates just how much private industry and government need to cooperate in order to find the facts and identify criminals. While his topic is deadly-serious, he conveys his riveting stories with humor and distills observations into clearly understood rules that we all should know as we go about our lives."-Ed Stroz, Former Supervisory Special Agent of the Federal Bureau of Investigation's Computer Crime Squad in New York and President of Stroz Friedberg LLC"Steven brings us behind the scenes of some very exciting hacker investigations and interviews, and tells the stories like few others. This book is an exciting read because he describes the people and their actions, showing us how these new-age crimes can affect all of us."-Steve Jurvetson, Managing Director of Draper Fisher Jurvetson"Finally, real-life credible stories that deliver first-hand accounts of tactical and strategic high-tech operations. This book is a rare look into what goes on behind the scenes. Take a front row seat with the author as he brings you into a world few have seen."-Bob Weaver, Retired Deputy Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service, Washington, D.C."Steve's intellect and real-world experience in criminal investigations, forensic analysis, and security principles is evident on every page. Sprinkle in some sound advice and a bit of humor and you have a book that is interesting, informative, and most of all, useful. I highly recommend it."-Fred Staples, Retired Director of Computer and Network Security Consulting for Telcordia Technologies"This book details story after story of computer crimes and identity theft. The best way to prevent yourself from being a victim is to take these narratives to heart."-Ben Rothke, Senior Security Consultant, ThruPoint Inc.© Copyright Pearson Education. All rights reserved.

5 citations

01 Jan 2013
TL;DR: This review paper introduces the concepts of multimodal biometrics that integrates two or more biometric identifiers and takes advantage of the capabilities of each biometric to provide greater performance and higher reliability.
Abstract: This review paper introduces the concepts of multimodal biometrics that integrates two or more biometric identifiers and takes advantage of the capabilities of each biometric to provide greater performance and higher reliability. It also discusses various levels of fusion, the importance of fusion at the feature level and a comparative study using different algorithms for performance analysis. As more and more technologies emerge, the impact of secure database systems on these technologies will be significant. An aid to control the suspicious login of the database and suspicious session is a must. Authentication is required when it is necessary to know if a person is who they claim to be. In relation to biometrics, incorporating multiple sources of data for authentication purposes is known as multi-modal biometric authentication. Traditionally, user authentication was performed based on passwords (something you know) or tokens such as smartcards (something you have). These techniques are, however, less secure since passwords can be forgotten or guessed and the tokens can be lost or stolen. In contrast, Biometrics provides a convenient means of authentication as it is based on something you are that cannot be lost or forgotten (9). A reliable authentication system is required in order to combat the epidemic growth in identity theft and to meet the increased security requirements in a variety of applications ranging from international border crossings to securing information in databases (1). Biometric recognition is the study of establishing the identity of a person using his/her anatomical and behavioral traits. Various biometric traits are used in biometric recognition such as fingerprint, face, iris, hand geometry, voice, palm-print, handwritten signatures and gait (8). A multimodal biometric system is one that utilizes information from multiple cues (multiple modalities or multiple processing techniques or both) to authenticate a user. Thus, a multi-biometric system integrates two or more biometric identifiers and takes advantage of the capabilities of each biometric to provide even greater performance and higher reliability. Ross and Jain stated that the unimodal biometric systems suffers from a variety of problems like noisy sensor data, non-universality, restricted degree of freedom, intra-class variations, spoof attacks and unacceptable error rates. Some of these problems of single trait biometric systems can be overcome by designing multimodal biometric systems which provides multiple evidence of the same feature (2).

5 citations

Journal ArticleDOI
TL;DR: Concerns about the security of electronic data collected in electronic transactions such as cellular telephone calls and credit card purchases and the matching of disparate sources of data in order to find patterns that indicate security issues are discussed.
Abstract: This article discusses concerns about the security of electronic data collected in electronic transactions such as cellular telephone calls and credit card purchases. The combination of this information, referred to as data fusion, entails the matching of disparate sources of data in order to find patterns that indicate security issues. The problem of poor data quality in data fusion systems is described. INSETS: FUSION AND CONFUSION;Games People Play;How It Works;IDENTITY THEFT

5 citations

Book ChapterDOI
01 Jan 2006
TL;DR: In this paper, the authors focus on the benefit of legislation such as the California Notice of Security Breach Law that protects citizens by forcing organizations that have incidents to expose them to the victims.
Abstract: Activities of financial sector insiders include sabotage, stealing of proprietary information, embezzlement of money, and so on. Insiders cause damage by taking undue risks and covering them up. Repeatedly, the lessons learned call for auditing and outside accountability. This is true in all cases but is especially necessary for employees whose jobs require high levels of risk. The chapter also highlights the threat of identity theft and what institutions can do to help prevent insiders from participating in fraud rings. The chapter focuses on the benefit of legislation, such as the California Notice of Security Breach Law that protects citizens by forcing organizations that have incidents to expose them to the victims. Theft involving banking and finance is complex. Insiders can steal, embezzle, make poor decisions with money, and compromise intellectual property. There are several types of threats and one of them is financial threat. Financial theft is fairly straightforward. An insider who knows the system and knows how to exploit it is likely to do so. The insider either helps to arrange a robbery at a large institution or transfers money to secret accounts. Some cases are even more intriguing.

5 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112