scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This is the first study that compares associations between victim characteristics and crime reporting behavior for traditional crimes versus cybercrimes, using data from four waves of a Dutch cross-sectional population survey.
Abstract: Although the prevalence of cybercrime has increased rapidly, most victims do not report these offenses to the police. This is the first study that compares associations between victim characteristics and crime reporting behavior for traditional crimes versus cybercrimes. Data from four waves of a Dutch cross-sectional population survey are used (N = 97,186 victims). Results show that cybercrimes are among the least reported types of crime. Moreover, the determinants of crime reporting differ between traditional crimes and cybercrimes, between different types of cybercrime (that is, identity theft, consumer fraud, hacking), and between reporting cybercrimes to the police and to other organizations. Implications for future research and practice are discussed.

57 citations

01 Dec 2013
TL;DR: In 2016, an estimated 26 million persons, or about 10% of all U.S. residents age 16 or older, reported that they had been victims of identity theft during the prior 12 months as mentioned in this paper.
Abstract: In 2016, an estimated 26 million persons, or about 10% of all U.S. residents age 16 or older, reported that they had been victims of identity theft during the prior 12 months (figure 1). Five percent of residents age 16 or older had experienced at least one incident involving the misuse of an existing credit card, and 5% had experienced the misuse of an existing bank account. One percent of persons had experienced the misuse of an existing account other than a credit card or bank account.

57 citations

Patent
15 May 2012
TL;DR: In this paper, a server computer accesses and retrieves credit information relating to a consumer and provides a user interface with active links associated with credit items, allowing the consumer to communicate directly with a credit service.
Abstract: Systems and methods of on-line credit information monitoring and control. In one embodiment, a server computer accesses and retrieves credit information relating to a consumer. The server computer may also provide a user interface with active links associated with credit items. The links may allow the consumer to communicate directly with a credit service. The server computer may offer additional credit-related services such as credit report retrieval, credit monitoring, notifications, identity theft management, interest rate calculations, historical archives, and account management.

57 citations

Book
01 Jan 1984
TL;DR: Management Principles for Health Professionals is a practical guide for new or future practicing healthcare managers that covers many current topics such as emerging implications of the Patient Protection and Affordable Care Act of 2010 and much more.
Abstract: Management Principles for Health Professionals is a practical guide for new or future practicing healthcare managers. The customary activities of the manager-planning, organizing, decision making, staffing, motivating, and budgeting-are succinctly defined, explained, and presented with detailed examples drawn from a variety of health care settings. Students will learn proven management concepts, techniques, models, and tools for managing individuals or teams with skill and ease. The Sixth Edition is loaded with all-new examples from real-world healthcare settings and covers many current topics such as: ? Emerging implications of the Patient Protection and Affordable Care Act of 2010. ? A template to track the areas of impact of this major law is presented; this enables a manager to identify the topics to monitor and to prepare responses to changes as they unfold. ? Developments concerning electronic health record initiatives ? Adapting and revitalizing one's career; ? Information concerning various staffing alternatives such as outsourcing and telecommuting, and updates the material concerning job descriptions and their application. New material has been added in the section on consultant's contracts and reports. ? Patient privacy and the detection and prevention of medical identity theft, and much more.

57 citations

Posted Content
TL;DR: In this article, the authors discuss the growing identity theft problem in cyberspace, focusing specifically on phishing attacks, and conclude that no single crime control method alone will be enough to combat phishing.
Abstract: This article discusses the growing identity theft problem in cyberspace, focusing specifically on phishing attacks. Victims of identity theft and phishing attacks suffer direct financial losses, though the real price these crimes exact is in the time and money spent trying to rebuild a victim’s credit and good name. Society also suffers through business losses, generally passed on to consumers through higher costs for goods and credit, and, more importantly, through loss of consumer confidence in conducting business online.Section II presents an overview of identity theft through a discussion of associated costs, laws, and stakeholders. Section III presents facts and statistics on the phishing problem. Section IV sets up a structure for analyzing identity theft crime control methods based on primary, secondary, and tertiary responses to crime. The primary level includes victim self-help measures, the secondary level involves private-party architecture solutions, and the tertiary level includes public law enforcement efforts. The article then discusses recent developments in fighting identity theft at each level, focusing on new laws and services that help consumers secure their identity, advances in private-party methods to detect and prevent fraud, and new and proposed changes to criminal laws used in the battle against identity theft. It will discuss the effectiveness of these new developments on phishing attacks and critically examine who is best equipped to combat the phishing problem. The article concludes that no single crime control method alone will be enough to combat phishing. Only a combined approach, incorporating strategies from each level, will diminish the phishing problem.

56 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112