scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
01 Jan 2008
TL;DR: There to be consensus among stakeholders for the meaning of identity fraud and identity theft but less agreement for identity deception, which is essential to enable further research.
Abstract: The objective of this paper is to report on the definitions of the terms used and in use across different regions for identity crime, namely, identity fraud, identity theft, and identity deception. The purpose is to clarify the meaning of the terms used with a view to gaining a consensus amongst the various stakeholders. This consensus is essential to enable further research. Without consensus measurement and comparisons are meaningless. Our study of identity fraud has an industry-driven research agenda. A grounded theory research methodology is used when interviewing government agencies and private organisation participants. Interviews sought to better understand current information and communications technology (ICT) practitioners’ security and privacy issues with respect to identity fraud perpetrator attacks. We found there to be consensus among stakeholders for the meaning of identity fraud and identity theft but less agreement for identity deception.

3 citations

01 Jan 2008
TL;DR: This paper proposes an approach to the development of context-based information security policies for Caribbean Financial Institutions aimed at mitigating insider risks.
Abstract: Governments of English-speaking Caribbean countries have begun to place greater emphasis on e-government to reduce bureaucratic inefficiencies and are encouraging, through legislation and other inducements, the expansion of e-commerce operations in order to enhance global competitiveness. This has expectedly led to a greater movement of data and with it information security risks. Information security managers continue to grapple with the difficulty of reengineering policies and standards to meet this new reality. Hence many Caribbean organizations have become more vulnerable to security risks that are initiated internally. This is of grave concern to the Financial Institutions of the Caribbean as they prepare to offer extended services in order to exploit the opportunities expected from the introduction of the Caribbean Single Market and Economy. In addition, these institutions attempt to increase their share of both remittances from the Caribbean Diaspora and foreign direct investments which also serve to exacerbate these issues. These organizations are less capable of stemming the tide of fraud through identity theft and by other means, which are on the rise globally. In most cases these acts are facilitated (inadvertently or deliberately) by the actions of insiders. This paper proposes an approach to the development of context-based information security policies for Caribbean Financial Institutions aimed at mitigating insider risks.

3 citations

Patent
09 Jul 2019
TL;DR: Wang et al. as discussed by the authors proposed an identity theft detection method based on a probability graph model, which comprises the following steps: S1, collecting, acquiring and preprocessing network payment transaction data to obtain a network payment transactional feature set; S 2, establishing and obtaining a probabilistic graph model by utilizing the network payment transactions feature set, S 3, inputting a training set and training parameters of the probability graph models, and S 4, predicting an input prediction set by using the conditional probability parameter and the Bayesian theorem to get a prediction result.
Abstract: The invention provides an identity theft detection method based on a probability graph model, which comprises the following steps: S1, collecting, acquiring and preprocessing network payment transaction data to obtain a network payment transaction feature set; S 2, establishing and obtaining a probability graph model by utilizing the network payment transaction feature set; S 3, inputting a training set and training parameters of the probability graph model, and obtaining conditional probability parameters of the probability graph model by utilizing a Bayesian theorem; and S4, predicting an input prediction set by using the conditional probability parameter and the Bayesian theorem to obtain a prediction result. According to the identity theft detection method based on the probability graph model, network payment fraud detection is achieved on the basis of the probability graph model through user synthesis behaviors and attribute modeling, dynamic online adjustment can be conducted onthe detection model, and the accuracy of fraud transaction interception and the robustness of the model are improved.

3 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112