scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book Chapter
TL;DR: In this article, a general framework of financial crimes and a literature review on the subject are presented, and different types of financial crime (such as money laundering, insider dealing, fraud, market abuse, bribery, corruption, terrorist financing, white-collar crimes, tax evasion, embezzlement, forgery, counterfeiting, identity theft, etc.) and their impact are discussed.
Abstract: Financial crimes involve several offenses without violence with some people obtaining financial benefit and causing financial loss to some others. The globalization of financial systems, the growing volume of trading transactions, and the acceleration of information technologies have brought many conveniences to the financial world; but unfortunately, financial crime has spread and diversified. Therefore, the fight against financial crimes, which are often complex and organized in a way which is nonviolent but causes significant financial damage to people and organizations, is gaining importance. In this sense, the struggle against this type of crime, which has become a serious threat, must be resolved by applying a comprehensive policy that should include all segments of the society.In this chapter, we aim to give a general framework of financial crimes and carry out a literature review on the subject. Moreover, we outline the different types of financial crime (such as money laundering, insider dealing, fraud, market abuse, bribery, corruption, terrorist financing, white collar crimes, tax evasion, embezzlement, forgery, counterfeiting, identity theft, etc.) and their impact. As a result, this study has the purpose of providing awareness by drawing attention to the concept of financial crime, which is an important threat nowadays that an ordinary person may suffer at any time in daily life.

5 citations

Posted Content
TL;DR: In this article, the authors discuss how to tackle identity theft in social media such as Twitter and Facebook and compare developments in the Netherlands, the United Kingdom and the United States discussing recent legislation in California (article 5285 of the Californian Penal Code) which prohibits credibly impersonating another person on the internet.
Abstract: Brief article on how to tackle identity theft in social media such as Twitter and Facebook General comparative analysis on developments in the Netherlands, the United Kingdom and the United States Discusses recent legislation in California (article 5285 of the Californian Penal Code) which prohibits "knowingly and without consent credibly impersonating another person on the internet" Contains a brief practical outline of various options for taking legal action against such forms of ID theft in social media and the distinction with parody or clearly fake user accounts Also critizes Twitter and Facebook for failing to ensure proper verification of users before opening social media accounts and suggests fiduciary duty to do so Note: At the publisher's request, this article was also published in World Communications Regulation Report 2012 Vol 7, Issue 4, p 1-3

5 citations

Patent
23 Mar 2018
TL;DR: In this article, an eID-based network identity authentication method and platform is presented, where identity operator providers (IDSOs) and identity service providers (IDSPs) provide eID identity authentication and electronic signature/authentication service for online application systems.
Abstract: The invention discloses an eID-based network identity authentication method and platform. Under the support of an eID authentication system, identity operator providers (IDSOs) and identity service providers (IDSPs) provide eID identity authentication and electronic signature/authentication service for online application systems. Multiple IDSOs can be built nationwide, the IDSOs and the eID authentication system carry out direct data interaction; the IDSPs directly interact data with the online application systems, accept eID service requests and forward the requests to the corresponding IDSOs. Each IDSO can serve multiple IDSPs, each IDSP can provide service for multiple application systems. Encryption channels for data interaction are established between the IDSOs and the IDSPs throughencryption switches. The method and platform have the following advantages: by means of the strict interview process of an eID registration issuing mechanism, based on three security authentication systems of the Ministry of Public Security, eIDs are audited and issued in a unified manner, one-to-one correspondence between the eIDs and the identity of holders is realized, identity theft and fraudulent use of identity are effectively prevented, and foreground anonymity and background real names are realized; and an effective solution is provided for internet applications with strong identity authentication needs.

5 citations

Journal ArticleDOI
TL;DR: The historical, international and regional background to the law relating to cyberspace identity theft is reviewed, including the national, regional, and international approaches to combating the problem, with a particular focus on the United Kingdom, Malaysia and Iran.
Abstract: The present age of technological advances have boosted the crime of cyberspace identity theft. Although this crime is not new, the Internet has expanded its scope and created innovative ways of committing it, leading to a new variant called cyberspace identity theft. The identity thief uses information relating to the identity of another person’s such as name, address, telephone number, mother’s maiden name, social security number, social insurance number, health card number, bank account information, driver’s license number and date of birth. It is stealing someone’s identity information to commit theft, fraud or other crimes. This paper aims to reviews the historical, international and regional background to the law relating to cyberspace identity theft. Also addressed, are the national, regional, and international approaches to combating the problem, with a particular focus on the United Kingdom, Malaysia and Iran.Given the above premise, one of the objectives of this chapter is to examine the meaning of cyberspace identity theft from a global perspective. It aims to advance an acceptable definition of cyberspace identity theft (in addition to other related concepts) such that it would be easy to identify the crime, facilitate its investigation, as well as prosecution. DOI: 10.5901/mjss.2015.v6n4s3p290

5 citations

Journal ArticleDOI
TL;DR: In this paper, the authors consider potential criminal law responses to the global challenge of identity theft, focusing on a specific offence of "identity theft" in the context of modern transactions.
Abstract: Purpose – The purpose of this paper is to consider potential criminal law responses to the global challenge of “identity crime”. In particular, it focuses on a specific offence of “identity theft”. It begins with a discussion of the meaning of “identity” in the context of modern transactions, before defining “identity crime” and related terms. Legal responses are then considered before turning to the importance of harmonisation. The transnational nature of modern identity crimes makes it essential that law enforcement agencies not only have suitable offences at their disposal but also the frameworks to facilitate international cooperation. Design/methodology/approach – Given the increasingly transnational and organized nature of modern identity crime, this paper adopts a comparative approach. It draws upon provisions from Australia, Canada, the UK and the USA. It also looks at responses to identity crime at the regional and international level. Findings – Although there is currently no international instr...

5 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112