scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Three key concepts that are vital to any future security solutions involve a commitment to the continued legitimate flow of information that drives today's commerce, an enhanced respect for individual privacy and acommitment to protect sensitive information, and effective means to minimize vulnerabilities to this vital part of the authors' critical national infrastructure and security.
Abstract: Growing consumer concern regarding the perceived inadequate privacy and security of personal information in light of 2005 data breaches can depress consumer spending, but given the tremendous personal and economic benefits that flow from private markets, government officials must resist the urge to 'do something' to quickly satisfy political needs with ineffective or even harmful legislation that can also stifle economic growth. An effective role for the federal government is to work closely with the private sector to educate businesses and consumers and to create a legal framework to override conflicting laws. In addition, the private sector should implement aggressive self regulation and modify management processes to make respect for privacy and protection of personal information a daily part of the corporate culture and way of doing business. Consumers should take responsibility for their role in securing the internet by using available security tools, safe practices and information that can substantially reduce vulnerabilities. In addition to these observations, three key concepts that are vital to any future security solutions involve a commitment to the continued legitimate flow of information that drives today's commerce, an enhanced respect for individual privacy and a commitment to protect sensitive information, and effective means to minimize vulnerabilities to this vital part of our critical national infrastructure and security.

3 citations

Book
01 Jan 2007
TL;DR: In 2006, the Fraud Act 2006 as mentioned in this paper was introduced and defined a number of common elements of the Fraud Offence, including false representation, false accounting, fraud by Failing to Disclose Information Section 4: Fraud by Abuse of Position Section 11: Obtaining Services Dishonestly Other Fraud Act Provisions 4.5.
Abstract: 1. Introduction The Theft Acts The Fraud Act 2006 Conclusion 2. Stealing under the Theft Act Actus Reus of Theft The Mens Rea of Theft 3. The Fraud Act 2006 Introduction Common Elements of the Fraud Offence Section 2: Fraud by False Representation Section 3: Fraud by Failing to Disclose Information Section 4: Fraud by Abuse of Position Section 11: Obtaining Services Dishonestly Other Fraud Act Provisions 4. Other Offences Involving Fraud False Accounting False Statements by Company Directors, etc Suppression, etc, of Documents 5. Conspiracy to Defraud Conspiract to Defraud Defined 6. Making off without Payment 7. Robbery 8. Burglary and Related Offences Burglary Burglary in Respect of a Dwelling Aggravated Burglary Trespass with Intent to Commit a Sexual Offence 9. Going Equipped and Possession of Articles to Commit Fraud Going Equipped Possession of Articles for Fraud Making or Supplying Articles for use in Frauds 10. Offences of Temporary Deprivation of Property Removal of Articles for Places Open to the Public Taking a Motor Vehicle or Other Conveyance Without Authority Taking a Conveyance Driving or Allowing Oneself to be Carried by a 'Taken' Conveyance Aggravated Vehicle-taking 11. Abstracting Electricity and Related Offences Abstracting Electricity Dishonest Telephone Use 12. Blackmail 13. Handling Stolen Goods and Related Offences Handling Stolen Goods Dishonestly Retaining a Wrongful Credit Advertising Rewards for Return of Goods Stolen or Lost Money Laundering Charging Money Laundering or Handling? 14. Procedure and Enforcement Case Management Search for Stolen Goods Restitution Deprivation Husband and Wife Privilege APPENDICES Appendix 1: Theft Act 1968 Appendix 2: Theft Act 1978 Appendix 3: Theft (Amendment) Act 1996 Appendix 4: Fraud Act 2006 Appendix 5: Criminal Law Act 1977 ss 1 and 5 Appendix 6: Proceeds of Crime Act 2002 ss 327-40 Appendix 7: Fraud Protocol: Control and Management of Heavy Fraud and Other Complex Criminal Cases Appendix 8: Guidance on the Use of the Common Law Offence of Conspiracy to Defraud Appendix 9: Criminal Procedure Rules on Case Management (Parts 1 and 3)

3 citations

01 Jan 2006
TL;DR: This paper follows the structure of the earlier one, maintaining the same headings for consistency purposes, and discusses what has occurred since 2003, what gaps remain, and what the research agenda should be to close those gaps.
Abstract: Much has happened since the 2003 publication of Identity Fraud: A Critical National and Global Threat and yet much is still the same. There is a greater awareness of the problem, as indicated by the number of conferences focused on identity theft, the amount of press on the topic, and the increase in legislative activity. However, we continue to struggle with the ramifications of the use and risks of data in an information society and its potential implications for identity fraud. The possibility that there is a correlation between data misuse and identity fraud has been exacerbated by the heavily publicized recent corporate and governmental security breaches that have involved the loss or theft of personal data. As a result, the debate on the responsible use of personal identifier information for making decisions in the areas of commerce, law enforcement, and national security has intensified. The challenges of privacy and security in this new era remain the same. This paper follows the structure of the earlier one, maintaining the same headings for consistency purposes. In each section, there is discussion of what has occurred since 2003, what gaps remain, and what the research agenda should be to close those gaps. Examples of this research are suggested.

3 citations

Journal Article
TL;DR: In this article, the adverse effects of cyber crimes on e-retail and financial transactions in e-banking sector, the present need to formulate policy framework, national legislation and independent investigation authority to penalize such criminals.
Abstract: The Information and Communication Technology (ICT) has revolutionized almost every aspect of human endeavor. Increased use of ICT such as computers, cellular phones, internet and other associated technologies are the routes which gave emergence to a lot of constructive as well as destructive work. The constructive work includes simplicity in business transactions provided convenient, effective, speedy and smooth processes. The destructive activities are considered as “electronic or cyber crimes” such as Identity theft, credit card and ATM frauds, criminal activities, spamming, phishing and other web-based crimes. This study will identify the adverse effects of the cyber crimes on e-retailing, effects of cyber crimes on financial transactions in e-banking sector, the present need to formulate policy framework, national legislation and independent investigation authority to penalize such criminals. Keywords: ATM, E-Banking, E-Commerce, EFT, E-Payment, ICT, M-Banking, PECO

3 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112