scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
01 Apr 2010
TL;DR: This chapter shows security leakages in common biometric systems and gives a detailed introduction on template protection techniques, and the latest results of template Protection techniques in 3D face recognition systems are presented.
Abstract: The human face is one of the most important biometric modalities for automatic authentication Three-dimensional face recognition exploits facial surface information In comparison to illumination based 2D face recognition, it has good robustness and high fake resistance, so that it can be used in high security areas Nevertheless, as in other common biometric systems, potential risks of identity theft, cross matching and exposure of privacy information threaten the security of the authentication system as well as the user’s privacy As a crucial supplementary of biometrics, the template protection technique can prevent security leakages and protect privacy In this chapter, we show security leakages in common biometric systems and give a detailed introduction on template protection techniques Then the latest results of template protection techniques in 3D face recognition systems are presented The recognition performances as well as the security gains are analyzed

4 citations

Proceedings Article
01 Jan 2009
TL;DR: It is advocated that healthcare organizations should adopt biometrics for authentication purposes, allow for multiple connections by each healthcare provider, and use single sign-on systems when implementing EHR systems.
Abstract: While the adoption of computer systems is pervasive in most industries, few healthcare organizations have implemented electronic health record systems. Security is a major issue for these healthcare organizations. Security concerns include breaches of privacy and medical identity theft. This article uses a hybrid technology acceptance model (TAM) to explore why healthcare organizations are slow to adopt an EHR and slower to adopt biometric technology and single sign-on functionality despite the benefits of these systems. This paper advocates that healthcare organizations should adopt biometrics for authentication purposes, allow for multiple connections by each healthcare provider, and use single sign-on systems when implementing EHR systems. This research will also determine how costs, compliance issues, and security issues impact an individual’s attitude when asked to use EHR systems.

4 citations

Journal Article
TL;DR: In this article, the Shari'ah has its own formula and perspectives on matter such as identity theft, and the applicability of Shari’ah rules related to the crime in general and discuss their applicability to this insurmountable problem.
Abstract: Identity theft is one of the crimes that threaten both society and individuals. Millions of people have been badly affected by identity theft following misuse of their identities by criminals. The term ‘identity theft’ is used to include all illicit activities (gathering, utilising, buying selling, etc.) that target personal information (including natural and legal persons). Identity theft is not a new crime, and it has grown and become a major concern in the era of information. Around the globe, laws and regulations have been enacted and revised to accommodate the phenomenon. Based on the divine rules of Islam, the Shari’ah has its own formula and perspectives on matter such as identity theft. This paper attempts to define the term ‘identity theft’ and then recollect and examine some of the Shari’ah rules related to the crime in general and discuss their applicability to this insurmountable matter of identity theft so as to demonstrate solutions that can be offered to Muslim-populated jurisdiction. It is a doctrinal rather than empirical study, therefore, it attempts to explore the Shari’ah rules based on the primary sources of Islam, i.e. the Qur’an and the prophetic traditions (hadith), as well as the juristic opinions of prominent Muslim scholars. The study finds that the Shari’ah law is very resourceful with principles and theories on which laws on identity theft can be established. This paper demonstrates another area where the Shari’ah should be further explored to answer to the challenges of contemporary society. It is argued that a study such as this will positively contribute to the field of justice as it looks at identity crime from another approach and also suggests further research to help alleviate identity theft especially in the Muslim communities.

4 citations

Journal ArticleDOI
TL;DR: In this paper , a system is suggested that employs machine learning techniques to categorize domain names into malicious or legitimate domain names based on assessing the linguistic qualities of domain names requested from various hosts.

4 citations

Patent
01 Sep 2015
TL;DR: In this article, a method and system to verify identity while protecting private data is proposed, without requiring communication with an external database or passing personal/identity information over network connections.
Abstract: A method and system to verify identity while protecting private data. To locally verify identity without requiring communication with an external database or passing personal/identity information over network connections. To create a database and/or statistical model for later use to verify identify, private information from a first media is input to a device. Private information subsequently presented via a second media is then verified locally by comparing to the private information previously captured from the first media. If the resultant correlation score is sufficiently high the private information from the first media and from the second media are determined to belong to the same individual, and the user is authenticated or a desired action is approved. In case of a low correlation score, a notification may be sent to one or more entities alerting authorities of a security breach or identity theft.

4 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112