scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
26 May 2005
TL;DR: In this article, the authors present a system and methods of monitoring financial information of a consumer for fraudulent activity, which can include receiving an account closure event from an event provider, determining if the closed account is associated with financial information, generating a notification, and providing the notification to the consumer.
Abstract: Systems and methods of monitoring financial information of a consumer for fraudulent activity. One method can include receiving an account closure event from an event provider, determining if the account closure event is associated with financial information of the consumer, generating a notification, and providing the notification to the consumer. Another method can include receiving a returned check event from an event provider, determining if the returned check event is associated with financial information of the consumer, generating a notification, and providing the notification to the consumer.

67 citations

Journal ArticleDOI
TL;DR: This paper used data from the National Public Survey on White Collar Crime to determine the degree to which including credit card fraud as a type of identity theft affects victim profiles encompassing demographic characteristics, risky activities, and reporting decisions.

66 citations

Patent
Upendra Mardikar1
11 Dec 2008
TL;DR: In this article, a method of evaluating transaction information in view of potential fraud and/or risk includes receiving transaction information at a remote location and correlating the received transaction information with user data maintained at the remote location.
Abstract: Transactions using, for example, Near Field Communication (NFC), Bluetooth, online, or other applications, may pose a risk of fraud or identity theft. According to an embodiment, a method of evaluating transaction information in view of potential fraud and/or risk includes receiving transaction information at a remote location. The method also includes correlating the received transaction information with user data maintained at the remote location. The method further includes generating a score and/or risk or fraud data based on the correlating. Such transactions may be facilitated by a payment service provider. Related methods, devices, and systems are also disclosed.

65 citations

Patent
07 Mar 2007
TL;DR: In this article, a system and method that anonymously collects and uses consumer purchase data, including radio frequency metrics, linked to individual characteristics, including demographic and attitudinal profiles of each user, while protecting individual user's identities is presented.
Abstract: A system and method that anonymously collects and uses consumer purchase data, including radio frequency metrics, linked to individual characteristics, including demographic and attitudinal profiles of each user, while protecting individual user's identities. Uniquely identifying information about the user is not requested or recorded, keeping individual users anonymous and protected from unrequested solicitations, identity theft, and disclosure of individually identifying information to any third party. This data can then be used for a variety of purposes, including mass marketing, individually targeted marketing, and market research.

65 citations

Patent
28 Feb 2007
TL;DR: In this article, a system, method and computer program product for receiving information relating to a financial account of an individual from at least one first data provider, and preparing a report relating to the individual's identity theft based on the information.
Abstract: A system, method and computer program product for receiving information relating to a financial account of an individual from at least one first data provider; receiving information relating to at least one of an identity theft expense reimbursement insurance policy of the individual, a public information relating to the individual, an identity theft risk score of the individual, a credit card registry of the individual, a backup data relating to the individual, a background information of the individual, and a business report relating to the individual, from at least one second data provider; and preparing a report relating to the individual's identity theft based on the information.

65 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112