scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2011
TL;DR: The NHIN implementers must implement stringent access control measures using a biometric cryptosystem-based solution to intrinsically protect medical records when in use, storage or even in the event they are successfully stolen.
Abstract: The Nationwide Health Information Network (NHIN) promises many benefits, but may be prone to a new phenomenon in healthcare fraud now rapidly drawing attention and commonly referred to as medical identity theft. As the medical industry continues down the path towards overall infrastructure digitization, it is anticipated that associated electronic records will become more portable hence facilitating efficient exchange. Problem however is, the enhanced transferability may also open a new vista of advantages to fraudsters. To address this risk, the NHIN implementers must implement stringent access control measures. One such solution is using a biometric cryptosystem-based solution. For defensein-depth, a security strategy suggesting successive layers of controls, the PKI cryptographic scheme is recommended to intrinsically protect medical records when in use, storage or even in the event they are successfully stolen.

3 citations

Journal Article
TL;DR: In this paper, the authors present an evaluation of the approaches used in identity theft prevention and suggest guidelines to overcome the weaknesses in m-commerce using case study approach, with semi-structured interviews.
Abstract: Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some limitations in the m-commerce. This paper presents an evaluation of the approaches used in identity theft prevention and suggests guidelines to overcome the weaknesses in m-commerce. A case study approach, with semi-structured interviews was used as the data collection method. Thematic analysis method was adopted for the interpretation of the qualitative data. Themes and codes were created in relation to the processes, methods, approaches, activities and tools used for identity theft prevention. The results show that online organisations are using same approaches of identity theft prevention for all online business transactions, while m-commerce has some unique characteristics for which e-commerce arrangements are not effective. On the other hand, these arrangements are not evaluated for their effectiveness in m-commerce. This study suggests for the assessment of identity theft prevention system for effective functionality in m-commerce and forward guidelines for evaluation of the system in m-commerce. This study makes an important contribution by suggesting strategies for identity theft prevention in m-commerce.

3 citations

Book ChapterDOI
06 May 2020
TL;DR: The hybrid encryption technique is combined with an LDPC coder for efficient information between the sender and receiver and improves the hiding capacity by 11.36% than SISO, 48.48% than OFDM, and 68.96% than MIMO.
Abstract: Medical identity theft is more common since it is easy to steal the patient’s record details and sell it for illegal medical trades. It happens in medical track records, personal healthcare accounts, recorded online insurance services, social security numbers, and other personally identifiable information (PII) which are disguised and used in the name of others. In this research, the proposed approach combines data hiding with hybrid encryption algorithms such as Modified Elliptic Curve Cryptography (MECC) encryption based on MIMO-OFDM framework. The hybrid encryption technique is combined with an LDPC coder for efficient information between the sender and receiver. Thereby, it improves the hiding capacity by 11.36% than SISO, 48.48% than OFDM, and 68.96% than MIMO. The sensitivity values are measured through the parameter number of pixels changes rate (NPCR) and unified average changing intensity (UACI) and obtained as 99.70 and 33.48 respectively. Correlation between adjacent pixels (CP) is increased compared to previous works. For SNR (Signal to Noise Ratio) at 30 dB CP is obtained as 0.9985. Simulation is carried out in MATLAB 2019a.

3 citations

Proceedings Article
01 Jan 2008
TL;DR: A risk analysis model based on theoretical variables that have been researched and extensively used in both government and private sector organizations is proposed and findings indicate support for a relationship between risk and both behavioral intentions to perform safe information practices and personal information asset value.
Abstract: Due to the increased global reliance on information technology, and the prominence of information resources value, identity theft is a problem domain effecting millions of computer users annually. The realities of identity theft are highly visible in the global media, although empirical investigations on the topic are limited. The purpose of this study is to identify and analyze perceptions of personal information (e.g., identity) as it relates to perceived threats, mitigation, perceived risks, and intended safe information practice intentions. We propose a risk analysis model based on theoretical variables that have been researched and extensively used in both government and private sector organizations. The model is empirically tested using LISREL to perform structural equation modeling. Findings indicate support for a relationship between risk and both 1) behavioral intentions to perform safe information practices and 2) personal information asset value.

2 citations

Proceedings ArticleDOI
01 Nov 2012
TL;DR: This paper is focused on the major issues of security and it also deals with possible solutions on these issues.
Abstract: Social Networking is widely accepted and used in and outside every organization There are number of Social Networking Websites exist on server eg Orkut, Twitter, Facebook, LinkdIn, hi5, MySpace, Friendster, Flickr etc and users log on to these websites on daily basis and avail various free services such as; Scrapping, Messaging, Text/Audio/Video Chatting, Games etc However, it is observed that there are many users face different security problems while accessing these Social Networking Websites These security problems are Identity Theft, Stealing of Personal, professional data and so on Researchers have discussed various kinds of Security Issues Faced and Security Measures Practiced by Citizens of Pune City while working on Social Networking Websites This paper is focused on the major issues of security and it also deals with possible solutions on these issues

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112