scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2005
TL;DR: The success of such mechanisms relies on effective identity authentication as discussed by the authors, which can be achieved only if trust, privacy and security can be secured and strengthened, and to meet these requirements, mechanisms, which provide secure management of information and facilities without compromising privacy and civil rights, have to be devised.
Abstract: Pervasive services of virtual communities and digital governments are achievable only if trust, privacy and security can be secured and strengthened. To meet these requirements, mechanisms, which provide secure management of information and facilities without compromising privacy and civil rights, have to be devised. The success of such mechanisms relies on effective identity authentication. While traditional security measures such as PINs and passwords may be forgotten, stolen or cracked, biometrics provides authentication mechanisms based on unique human physiological and behavioral characteristics that can be used to identify an individual or authenticate the claimed identity of an individual, but cannot be easily duplicated or forged. Typical characteristics include but are not limited to fingerprint, face, iris, hand geometry, palm, voice pattern, signature, keystroke dynamics and so forth. Moreover, in the light of homeland security, biometrics has become a powerful measure in the government’s fight against identity fraud, illegal immigration, illegal workers and terrorism. Biometrics is also useful in preventing abuses of public health services and other government entitlement.

4 citations

Posted Content
TL;DR: In this article, a large number of credit card fraud cases brought to the United States federal courts in violation of 18 U.S.C. § 1029(a)(1)-(5), press releases from law enforcement organizations, and information security reports are discussed.
Abstract: Credit card fraud presents an impressive array of forms and methods, often involving sophisticated means, organized crime aspects, and very significant criminal proceeds. Based on an extensive inquiry that involved the study of a large number of credit card fraud cases brought to the United States federal courts in violation of 18 U.S.C. § 1029(a)(1)-(5), press releases from law enforcement organizations, and information security reports, this article discusses the legal elements, the essential perpetration aspects, and the most relevant sentencing enhancements for these crimes, and proposes a number of improvements. The contributions of this article can be used for a more effective legal and judicial response in the process of risk identification and mitigation, and for developing awareness and training programs. Although the article focuses on one jurisdiction, the findings, particularly those in the perpetration aspects section, and the conclusion would be useful to a global audience.

4 citations

Journal ArticleDOI
TL;DR: Identity and Privacy Services is an admixture of the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment.
Abstract: Personal identity and privacy are important topics in information systems in general and data analytics in particular. Normally associated with digital security, the scope of identity and privacy is much greater and affects most aspects of everyday life. Related subjects are behavioral tracking, personal-identifiable information (PII), privacy data relevance, data repurposing, identity theft, and homeland security. Identity and Privacy Services is an admixture of the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment. This is a general paper on this important subject, intended to give exposure to the constituent topics.

4 citations

Journal ArticleDOI
TL;DR: Perhaps your organisation has recently suffered a data breach, which would not be uncommon as last year set records for information theft.
Abstract: Perhaps your organisation has recently suffered a data breach, which would not be uncommon as last year set records for information theft. For example, in 2009 the Identity Theft Resource Center reported 498 breaches that exposed over 222 million protected records.^1 The unreported numbers traditionally have been three or more times higher. More still go undetected or ignored.

4 citations

Posted Content
01 Jan 2015
TL;DR: In this paper, the authors carried out the analysis of the identity theft committed through Internet, starting with the presentation of some aspects regarding management of identity in cyberspace, and carried out a systematic approach with a view to incriminating identity theft, existent in the literature.
Abstract: In this study, starting with the presentation of some aspects regarding management of identity in cyberspace, it is carried out the analysis of the offence of identity theft committed through Internet. The term “identity theft” describes the criminal acts through which the offender obtains and uses in a fraudulent manner the identity of other person. These criminal acts may be carried out through the use of information and communication technology, too. The cases of identity theft committed through Internet have a wide spread, being based on sophisticated frauds, creating difficulties for the law enforcement bodies when they investigate such offences. There is no standard definition relating to identity theft. The only element which is found in the definitions regarding identity theft is the fact that it is carried out in several phases, which were extensively analysed in this study. Moreover, in this study are studied the two systematic approaches with a view to incriminating identity theft, existent in the literature: creation of a single provision which incriminates the act of obtaining, possessing and using information regarding identity for criminal purposes; individual incrimination of acts related to obtaining information regarding identity, as well as the acts related to possession and use of such information

4 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112