scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The findings demonstrate that multiple writing techniques are used to generate responses and information from victims and enable identity theft in advance fee fraud e-mail messages.
Abstract: Criminals utilize the Internet to perpetrate all manner of fraud, with the largest dollar losses attributed to advance fee fraud e-mail messages. These messages come from individuals who claim to need assistance moving a large sum of money out of their country. Individuals who respond to the messages often become victims of fraud and identity theft. Few criminologists have examined this type of fraud, thus this study explores the mechanisms employed by scammers through a qualitative analysis of 412 fraudulent e-mail messages. The findings demonstrate that multiple writing techniques are used to generate responses and information from victims. Half of all the messages also request that the recipient forward their personal information to the sender, thereby enabling identity theft. The implications of this study for law enforcement and computer security are also discussed.

60 citations

Journal ArticleDOI
TL;DR: An empirical study of 75 managerial employees and/or knowledge workers in five large organizations in Pittsburgh, Pennsylvania, revealed a number of interesting facts about how much information they share with others, what the likelihood is that they will conduct business online, and whether or not they take steps to protect their personal identity and credit.
Abstract: Fraud and identity theft have been increasing with the use of e-commerce. In the U.S. alone, it has been estimated that victims may spend on average $1,500 in out-of-pocket expenses and an average of 175 hours in order to resolve the many problems caused by such identity thieves. Organizations that engage in e-commerce as a large part of their business need to protect their customers against these crimes. An empirical study of 75 managerial employees and/or knowledge workers in five large organizations in Pittsburgh, Pennsylvania, revealed a number of interesting facts about how much information they share with others, what the likelihood is that they will conduct business online, and whether or not they take steps to protect their personal identity and credit. Model construction and implications were generated concerning steps that employees and customers may take to avoid identity theft.

60 citations

Journal Article
TL;DR: Now that organized crime has become involved, the money available to help thieves carry out the crimes is immense and the potential reward for criminals who succeed in these malicious acts is huge.
Abstract: Identity theft is the fastest growing crime in America, occurring when the criminal obtains confidential information from an individual or business and uses it to access private financial accounts. In today’s world of information technology, many thieves prey on their victims via the Internet. The level of disclosure of personal information in many of today’s information age transactions is what leaves so many individuals and businesses open to identity theft. Two of the most common ways that thieves acquire personal information to aid them in identity theft are phishing and pharming. Phishing utilizes bulk e-mail messages to entice recipients into revealing personal information. Pharmers, on the other hand, cast a wide net for the unwary. There is a huge potential reward for criminals who succeed in these malicious acts. In addition, now that organized crime has become involved, the money available to help thieves carry out the crimes is immense.

60 citations

01 Jan 2005
TL;DR: To give a sense of how important it is to look beyond authentication, consider some of today’s most serious security problems, which would be better described as failures of computers to behave as their users expect.
Abstract: To give you a sense of how important it is to look beyond authentication, consider some of today’s most serious security problems. Viruses are a leading contender, with email viruses making up a large part. Spyware is growing into a nightmare for home users and IT staff. Identity theft is becoming widespread, perpetrated in part through “phishing” scams in which forged email messages entice people to give away private information. None of these problems is caused by defeating a login mechanism. They would be better described as failures of computers to behave as their users expect.

59 citations

Journal ArticleDOI
TL;DR: In this paper, the authors investigate the effects that protective factors possess on fostering resiliency against on-line identity theft and suggest that protective software programs increase individual resiliencies to victimization.
Abstract: Identity-based crimes are considered to be one of the most significant and growing problems of the last 20 years due to the significant economic harm these offenses pose for victims. The increased use and availability of personal information through on-line outlets has significantly increased the risk of identity-based fraud, although few have considered the factors that affect the likelihood of this type of victimization. This study utilizes a sample of students, faculty, and staff at a southeastern university to investigate the effects that protective factors possess on fostering resiliency against on-line identity theft. The findings suggest that protective software programs increase individual resiliency to victimization. The implications of this study for both resiliency models and cybercrime victimization are considered in detail.

59 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112