scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Results from this study show that, there are many negative impacts which the society suffer from the cybercrimes and why the computer or networking are tools target for the crimes.
Abstract: The aim of the research is to examine the negative impact cybercrimes pose to the society. The concepts of cybercrimes are introduced and different types of cybercrimes are explored as examples of some of the impacts which caused by cybercrimes activities. Results from this study show that, there are many negative impacts which the society suffer from the cybercrimes and why the computer or networking are tools target for the crimes. The discussions are made from the findings and finally the paper addresses different measures which can be taken to combat these cybercrimes so that people still enjoy using the technology rather than stop them to use it.

3 citations

DOI
15 Nov 2018
TL;DR: Voice biometrics is actually a convenient and secure method of authenticating a speaker's identity using just a few words, which has many advantages over other forms of biometric identification especially in the healthcare sector.
Abstract: Our medical information is perhaps considered the most personal and valuable of all. On the other hand, the rapid increase in the digitization of the healthcare industry nowadays is giving the patient identification and electronic medical record maintenance a key role to improve patient safety, protect against medical identity theft, enhance patient satisfaction, not to mention financial performances. Regulatory pressures and compliance guidelines naturally require health care providers to handle patient information with the highest degree of privacy and care. In this scenario, innovative healthcare organizations are increasingly using biometric technologies to support smoother and safer patient access and information sharing to improve security. Biometric identifiers are measurable unique characteristics of an individual physiological (such as fingerprints, iris, retina, DNA) or behavioural (such as typing rhythm, voice, and gait) traits that can be used to positively identify a person. Among them, voice biometrics is actually a convenient and secure method of authenticating a speaker's identity using just a few words, which has many advantages over other forms of biometric identification especially in the healthcare sector. After briefly discussing the impact of biometric technologies from a general point of view, the present paper focuses on voice biometrics, to give a technical understanding of how it works according to the current state of art and the forthcoming progress, and how it can be successfully integrated in the healthcare systems.

3 citations

Book ChapterDOI
04 Jan 2010
TL;DR: Strong multimodal biometric authentication, which can conclusively link a real person to a digital identity, prevents unauthorized account access and ensures that only the person who created the account can use it.
Abstract: Many people are concerned about engaging in social networks or allowing their children to do so, because the anonymity and perceived lack of security puts them at risk of identity theft and of online contacts who misrepresent themselves, such as sexual predators and stalkers. Current password-based authentication neither adequately protects users' accounts from being compromised, nor helps people to trust that people they contact really are who they say they are. Strong multimodal biometric authentication, which can conclusively link a real person to a digital identity, prevents unauthorized account access and ensures that only the person who created the account can use it. At the same time, it offers an extra level of trust in the identity of other members, and provides a deterrent against potentially criminal abuse of social networks.

3 citations

Book ChapterDOI
23 Oct 2006
TL;DR: With careful scanning, it was found that most of hard disks were not adequately cleaned, and had a plenty of confidential and sensitive personal data, which could be utilized in crimes like identity theft.
Abstract: In this paper, we introduce our own two-year experiments to acquire sensitive personal information from discarded hard disks which we had obtained with no ease in Korean second-hand PC markets. With careful scanning, we found that most of hard disks were not adequately cleaned, and had a plenty of confidential and sensitive personal data, which could be utilized in crimes like identity theft. Collected private data, analyzed based on the concept of identifiable individual, amounted to 4,526 persons worth of data, including 3,584 resident registration numbers. The result also indicated that discovered data items of each person were revealed to display a wide spectrum of sensitivity level.

3 citations

Book
01 Jan 1999
TL;DR: In this article, the authors explore the traditional areas in consumer protection and cover the state and federal laws dealing with electronic transactions, including public and private actions to regulate consumer markets; methods of inducing consumer transaction; the consumer credit market; credit reports; identity theft; credit repair; and equal access to credit.
Abstract: This reliable source explores the traditional areas in consumer protection and covers the state and federal laws dealing with electronic transactions. Expert discussion includes topics on public and private actions to regulate consumer markets; methods of inducing consumer transaction; the consumer credit market; credit reports; identity theft; credit repair; and equal access to credit. Text also addresses disclosure terms in consumer transactions, regulating the cost of credit, and other terms in consumer transactions.

3 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112