Topic
Identity theft
About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.
Papers published on a yearly basis
Papers
More filters
•
26 May 2005
TL;DR: In this article, the authors present a system and methods of monitoring financial information of a consumer for fraudulent activity, which can include receiving an account closure event from an event provider, determining if the closed account is associated with financial information, generating a notification, and providing the notification to the consumer.
Abstract: Systems and methods of monitoring financial information of a consumer for fraudulent activity. One method can include receiving an account closure event from an event provider, determining if the account closure event is associated with financial information of the consumer, generating a notification, and providing the notification to the consumer. Another method can include receiving a returned check event from an event provider, determining if the returned check event is associated with financial information of the consumer, generating a notification, and providing the notification to the consumer.
67 citations
••
TL;DR: This paper used data from the National Public Survey on White Collar Crime to determine the degree to which including credit card fraud as a type of identity theft affects victim profiles encompassing demographic characteristics, risky activities, and reporting decisions.
66 citations
•
eBay1
TL;DR: In this article, a method of evaluating transaction information in view of potential fraud and/or risk includes receiving transaction information at a remote location and correlating the received transaction information with user data maintained at the remote location.
Abstract: Transactions using, for example, Near Field Communication (NFC), Bluetooth, online, or other applications, may pose a risk of fraud or identity theft. According to an embodiment, a method of evaluating transaction information in view of potential fraud and/or risk includes receiving transaction information at a remote location. The method also includes correlating the received transaction information with user data maintained at the remote location. The method further includes generating a score and/or risk or fraud data based on the correlating. Such transactions may be facilitated by a payment service provider. Related methods, devices, and systems are also disclosed.
65 citations
•
07 Mar 2007
TL;DR: In this article, a system and method that anonymously collects and uses consumer purchase data, including radio frequency metrics, linked to individual characteristics, including demographic and attitudinal profiles of each user, while protecting individual user's identities is presented.
Abstract: A system and method that anonymously collects and uses consumer purchase data, including radio frequency metrics, linked to individual characteristics, including demographic and attitudinal profiles of each user, while protecting individual user's identities. Uniquely identifying information about the user is not requested or recorded, keeping individual users anonymous and protected from unrequested solicitations, identity theft, and disclosure of individually identifying information to any third party. This data can then be used for a variety of purposes, including mass marketing, individually targeted marketing, and market research.
65 citations
•
28 Feb 2007
TL;DR: In this article, a system, method and computer program product for receiving information relating to a financial account of an individual from at least one first data provider, and preparing a report relating to the individual's identity theft based on the information.
Abstract: A system, method and computer program product for receiving information relating to a financial account of an individual from at least one first data provider; receiving information relating to at least one of an identity theft expense reimbursement insurance policy of the individual, a public information relating to the individual, an identity theft risk score of the individual, a credit card registry of the individual, a backup data relating to the individual, a background information of the individual, and a business report relating to the individual, from at least one second data provider; and preparing a report relating to the individual's identity theft based on the information.
65 citations