scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Posted Content
TL;DR: The identity theft forum sponsored by the Payment Cards Center of the Federal Reserve Bank of Philadelphia and the Gartner Fellows Program brought together a broad range of stakeholders to discuss the important issue of identity theft.
Abstract: The identity theft forum sponsored by the Payment Cards Center of the Federal Reserve Bank of Philadelphia and the Gartner Fellows Program brought together a broad range of stakeholders to discuss the important issue of identity theft. Participants from the financial services and merchant industries, Internet service and technology providers, and regulatory and law enforcement agencies examined issues faced by consumers, merchants, and banks in fighting this financial crime. Discussants shared methodologies used to combat this crime and explored opportunities for coordination in searching for solutions.

4 citations

Patent
07 Jun 2018
TL;DR: In this paper, an intermediary service provider is established to automatically request a corresponding security freeze at each of many redundant credit bureaus upon the enrollment of a particular consumer with the service provider.
Abstract: An intermediary service provider is established to automatically request a corresponding security freeze at each of many redundant credit bureaus upon the enrollment of a particular consumer with the service provider. Each request of a security freeze to each credit bureau prompts that respective credit bureau to generate a unique identification code. Only the return of the correct respective unique identification code will enable the respective security freeze to be released. Accordingly, with the automated support of the service provider, the particular consumer seizes control of their security freeze credentials from each credit bureau before an identity thief can wreck havoc.

4 citations

Journal ArticleDOI
TL;DR: In this paper, the authors combine the fields of legal history and criminal justice with the approaches of emerging research in both identification and paperwork studies to explain the ongoing policy problems of identity theft.
Abstract: Impersonation and then identity theft in America emerged in the legal space between a civil system with a high tolerance for market risk and losses incurred by impostors, and a later-developing criminal system preoccupied with fraud or forgery against the government. Negotiable instruments, generally paper checks, borrowed from seventeenth-century England, enabled a geographically far-flung commercial system of paper-based but impersonal exchanges at a time before widespread availability of centrally-issued currency or regulated banks. By assigning loss rather than catching criminals, the “impostor rule” made and continues to make transactions with negotiable instruments valid even if fraudulent. This large body of commercial law has stood essentially unchanged for three hundred years and has facilitated a system rife with impersonation which criminal and federal laws did not address until the late 20th century. English common law, American legal treatises, court cases, law review articles, and internal debates behind the Uniform Commercial Code tell the story of a legal system at the service of commerce through the unimpeded transfer of paper payments. Combining the fields of legal history and criminal justice with the approaches of emerging research in both identification and paperwork studies, this article explains the ongoing policy problems of identity theft.

4 citations

01 Jan 2018
TL;DR: Medical Identity Theft and Palm Vein Authentication: The Healthcare Manager’s Perspective by
Abstract: Medical Identity Theft and Palm Vein Authentication: The Healthcare Manager’s Perspective by

4 citations

Book ChapterDOI
01 Jan 2014
TL;DR: This chapter answers the questions from a strategic and tactical perspective, explaining the people involved, the methods and tools they use, trends in cyber war, and what lies ahead.
Abstract: World War II ; Cold War ; War on Drugs ; War on Terrorism —these terms are undoubtedly familiar to most people today. One war-related term that may not be so familiar, though, is cyber war . People everywhere are bombarded with news regarding such Internet events as identity theft via phishing attacks, computer infections due to viruses, patches designed to protect operating systems from hackers, zero-day attacks against smartphones, and privacy compromises on Facebook. Each of these events, among many others, is a form of cyber crime, and all of them must be understood if cybersecurity professionals are to win the cyber war. So, what is cyber warfare, and how can it impact people’s lives and businesses on a personal and national level? This chapter answers these questions from a strategic and tactical perspective, explaining the people involved, the methods and tools they use, trends in cyber war, and what lies ahead.

4 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112