scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
01 Nov 2017
TL;DR: A framework for participatory detection of identity theft on social networking platforms which would exploit the computing power of the user equipment is proposed and shows that if the initial matching threshold in a decision tree is set properly, compromised accounts can be identified by the mobile platforms of the connections without undergoing heavy central processing.
Abstract: Popularity of smart devices has led to increasing use of social networking services for various purposes. Despite its benefits, the ubiquity of social network services introduces vulnerabilities to malicious behavior such as Sybil attacks or identity theft. As the 5G Era leads to the convergence of social, wireless, and mobile networks by enabling synergistic interplay between these networks, it is possible to take advantage of mobile edge computing in the detection of compromised social profiles in mobile and online social network platforms. In this paper, we propose a framework for participatory detection of identity theft on social networking platforms which would exploit the computing power of the user equipment. The proposed framework empowers the connections of a user in a social platform to cooperate on the verification of a social profile. Through a proof-of-concept study, we show that the proposed framework can detect anomalous behavior in the social profile by having each connection work on a different feature subset without semantic analysis. Our numerical results show that if the initial matching threshold in a decision tree is set properly, compromised accounts can be identified by the mobile platforms of the connections without undergoing heavy central processing.

4 citations

Dissertation
12 Oct 2016
TL;DR: The paper is dedicated to the misuse and abuse of social networks, which could be considered as a deviant behavior, which is not always legally sanctioned as criminal behavior, although it is certainly socially unacceptable and opposite to the social norms of behavior.
Abstract: The paper contains a theoretical and empirical understanding of cyber crime and the misuse and abuse of social networks, especially those forms which violate the right to privacy as one of the basic human rights. Cybercrime is a new kind of crime which appeared as a result of great technological advances in the field of telecommunications. A large number of Internet and social networks users are exposed to daily victimization due to the use of computer technology, if the information transmitted through social networks is misused or abused. Therefore, the paper is dedicated to the misuse and abuse of social networks, which could be considered as a deviant behavior, which is not always legally sanctioned as criminal behavior, although it is certainly socially unacceptable and opposite to the social norms of behavior. Computer criminality and the misuse and abuse of social networks, considered as a deviant behavior and as a part of computer crime, are characterized by the perpetrators’ anonymity, permanent availability of the victim and the high level of victimization, multijuridical nature, difficult prosecuting procedure and gathering of the evidence, as well as the imposition of a legal sanction. Social networks, as the most common and most popular way of communication in the modern world, have led to the fact that the private life has become an integral part of public life. A serious lack due to the use of social networks is the great exposure of the user to various forms of abuse, such as identity theft, fraud, digital violence (sexual violence and harassment, bullying, stalking, cyber bullying, hate speech, terrorism), vandalism, human trafficking and organ trafficking, bootlegging, as well as replacement of the real world with virtual life and creation of pathological dependence on the use of the Internet. Theoretical study and empirical research of computer crime and social networks’ misuse and abuse should contribute to the developement of one better system of protection and security improvement for all users of social networks. Current international and national legislation is mainly related to the abuse of computer hardware and software, which during the commission of crimes can be a means of execution or target of attack (eg, computer theft, fraud, damage of computer data and programs, sabotage, creation of computer viruses), while certain forms of abuse of social networks are still not incriminated, which significantly contributes to increased victimization, particularly in the area of privacy.

4 citations

Proceedings ArticleDOI
21 May 2010
TL;DR: In this paper a new approach to solve the problem of phishing is proposed, named as APIC Approach towards phishing, in which website cross verifies its own identity and proves that it is a genuine website before the end users.
Abstract: Phishing is an attempt by an individual or a group to thieve personal confidential information (Security purpose) such as usernames, passwords, credit card information, etc., from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very much similar to the original ones are being hosted to achieve this. Thus the users assume that they are entering information into a genuine website without realizing that they are giving away their precious information to a stranger who can misuse it for financial gains. Phishing scams have become a problem for online banking and e-commerce users. In this paper we have proposed a new approach to solve the problem of phishing. This approach is named as APIC Approach towards phishing. As the name describes, in this approach website cross verifies its own identity and proves that it is a genuine website (to use bank transaction, E-commerce and online booking system etc.) before the end users.

4 citations

Patent
29 Jun 2007
TL;DR: In this article, a method and system for detecting an anomaly relating to resource access comprising logging in to a website using identity information, storing a current login time in an access time database, accessing a last local login time for the resource from the access-time database, determining a last resource login time from the resource and comparing the last Local Login Time (LTL) to the last Resource login Time (LR) is presented.
Abstract: A method and system for detecting an anomaly relating to resource access comprising logging in to a website using identity information, storing a current login time in an access time database, accessing a last local login time for the resource from the access time database, determining a last resource login time from the resource and comparing the last local login time to the last resource login time, wherein a result of the comparison indicates resource access anomaly.

4 citations

Proceedings ArticleDOI
01 Aug 2019
TL;DR: This study is aimed to understand the evolutionary process of identity theft and provide a framework for evaluating different identity protection strategies and future privacy protection system.
Abstract: In this paper, we leverage previous work in the Identity Ecosystem, a Bayesian network mathematical representation of a person's identity, to create a framework to evaluate identity protection systems. Information dynamic is considered and a protection game is formed given that the owner and the attacker both gain some level of control over the status of other PII within the dynamic Identity Ecosystem. We present a policy iteration algorithm to solve the optimal policy for the game and discuss its convergence. Finally, an evaluation and comparison of identity protection strategies is provided given that an optimal policy is used against different protection policies. This study is aimed to understand the evolutionary process of identity theft and provide a framework for evaluating different identity protection strategies and future privacy protection system.

4 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112