scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
C. Lasser1
24 Oct 2006
TL;DR: IBM has brought together over 104,000 participants in a marathon 76 hour online session in the hopes of linking ideas and technologies that will lead to new business for IBM, help to solve societal problems and maybe revolutionize industry.
Abstract: Summary form only given. Some have called it the "big blue brain storm" (Business week Aug 8, 2006). Led by its CEO Sam Palmisano, IBM is reaching out to its worldwide workforce, calling on family and friends and business associates and inviting them to participate in a world innovation JAM. IBM has brought together over 104,000 participants in a marathon 76 hour online session in the hopes of linking ideas and technologies that will lead to new business for IBM, help to solve societal problems and maybe revolutionize industry. The technologies that IBM used as its started set were from its worldwide research centers. These included biometric authentication which uses secure identity cards with your biometric information as a way to protect you against identity theft. There's communication pattern analysis with collaborative organizational analysis technology that analyzes communications within a company to both uncover internal patterns and identify potential changes that can be made to improve the organization's efficiency. And the last example is Super Simulations. These are systems like IBM's Blue Gene that are able to handle very sophisticated mathematical models that use real-time streams of real-world data to simulate everything from the weather to biological processes, and allow us to begin making predictions about real-world behaviors. The JAM is the latest in IBM's continuing efforts to create a culture of innovative thinking in its company. But that's only one of the ways IBM thinks about innovation there are others. The Global Innovation Outlook (GIO), has opened up IBM's technical and business forecasting processes to include external leaders from business, academia, the public sector, NGOs and other influential constituents of the world community. The GIO takes a deep look at some of the most pressing issues facing the world and works toward providing solutions to those needs: the future of the enterprise; energy and the environment; and transportation and mobility

3 citations

Journal Article
TL;DR: With patient identity theft on the rise, it's important that practitioners and patients alike know how to prevent a security breach.
Abstract: With patient identity theft on the rise, it's important that practitioners and patients alike know how to prevent a security breach. Because of HIPAA, physicians that are covered entities are required to take action to protect their patients' medical records or protected health information. Physicians and medical centers should be proactive while securing sensitive data. Some of these safeguards are physical security, electronic security, monitoring, and employee training.

3 citations

Journal ArticleDOI
TL;DR: In this article, the authors pointed out that those trained in economics are much less likely to consider privacy protection important than those trained from other disciplines, and that economists have tended to undervalue the harms from unwanted disclosures of information.
Abstract: This Article addresses my observation, based on my experience in government service, that those trained in economics are much less likely to consider privacy protection important than those trained in other disciplines. The core economist intuition comes from the basic model of a competitive market, where a market is considered more efficient the closer it comes to perfect information. Full information allows the efficient matching of buyers and sellers. Limits on information, such as privacy rules, raise the costs of exchange and may even promote fraud by concealing negative information. This Article addresses that economists' intuition in a number of ways. As the Article was prepared for a symposium on the future of financial services, Part I highlights the substantial history of confidentiality in banking. Many economists believe that persistent features of markets are likely adaptive and efficient. The history of confidentiality thus raises a rebuttable presumption that confidentiality has important efficiency characteristics. Part II places the privacy debate into settings where economists are likely to have positive intuitions that confidentiality is efficient. First, consider in the security context whether it is efficient to disclose the combination to a bank safe or other security information. Second, consider whether it is efficient for a bank to disclose confidential business information about a corporate borrower to that company's competitors. Third, consider, given the risk of identity theft, whether it is efficient for a bank to reveal a customer's online password or other information that acts as a key to the customer's account. The likely efficiency of keeping this key security information confidential thus can strengthen the intuition that confidentiality may also be efficient when it comes to sensitive personal information, or the "keys to the heart." The Article next suggests reasons why economists have tended to undervalue the harms from unwanted disclosures of information. Economists, who themselves may on average care little about privacy, may have mis-gauged the tastes of other people. The Article explains significant externalities that may lead to inefficiently high use of telemarketing and other business activities that rely on information sharing. The technique of cost/benefit analysis likely tends to emphasize the costs of privacy protections, which are more easily monetizable, instead of the benefits. Certain sorts of harms, including long-run societal harms from lack of privacy, have also likely not received full weight. Fourth, a Ponemon Institute study provides new evidence about revealed behavior, and not simply about poll responses, when it comes to financial services and privacy. The most significant finding is that customers that trusted their financial institution on privacy were substantially more likely to engage in online banking. Additional research would be helpful, but this data supports the possibility that individuals will participate more in some financial services where confidentiality is provided. The Article also places the economic efficiency analysis into broader debates about the desirability of privacy protection. Many non-economist scholars, and the legal system, have stressed the violations of rights that occur when important data about individuals is disclosed without their agreement. Economic analysis gives no independent weight to the violation of rights. Economists have thus systematically given less weight than those trained in other academic disciplines to many of the strongest arguments for privacy protection.

3 citations

Book ChapterDOI
04 Aug 2007
TL;DR: In this article, the authors briefly introduce identity influences, the categorizations of identity and the concepts of anonymity and pseudonymity in India, and make a study of digital identity, anonymity, the manifestations thereof, applications and concerns.
Abstract: This paper briefly introduces identity influences, the categorizations of identity and the concepts of anonymity and pseudonymity in India. It also makes a study of digital identity, anonymity and pseudonymity, the manifestations thereof, applications and concerns. It examines the regulation of digital identity vis-a-vis the IT Act 2000, case laws and the implementation of the Multi-purpose National Identity Cards (MNIC’s) in India.

3 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112