scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
20 Oct 2009
TL;DR: In this paper, a method to reduce the risk of identity theft was proposed, which selectively obscures identification indicia on personal property when the personal property is located on private real property.
Abstract: A method to reduce the risk of identity theft prevents the gathering and correlation of personal information on an individual's private real property. The method selectively obscures identification indicia on personal property when the personal property is located on private real property.

2 citations

Posted Content
TL;DR: The authors examines the likelihood that displaced war victims, who have essentially lost their identities as well as so much else, can recoup civil compensation for their losses through local Yugoslavian courts and scrutinizes the basic international human rights doctrines and systems of enforcement to determine whether these may offer remedies for the victims of identity elimination.
Abstract: This paper examines the likelihood that displaced war victims, who have essentially lost their identities as well as so much else, can recoup civil compensation for their losses through local Yugoslavian courts It scrutinizes the basic international human rights doctrines and systems of enforcement to determine whether these may offer remedies for the victims of identity elimination Finally, the article explores the likelihood that, through the International Tribunal in the Former Yugoslavia, those responsible for identity elimination may be held criminally liable for their actions in Kosovo

2 citations

Journal ArticleDOI
TL;DR: Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers, finding that careless disposal of computers and storage media in the Republic of Ireland is a significant problem.
Abstract: Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers How would you dispose of your old computer, or how would the company you work for dispose of their old computers? The majority of Irish homeowners, would bring their old computers to local civic amenity centres, give it away to a relative or sell it on to another party Some organisations would give their old equipment to a staff member, as a gift gesture, others may simply discard in the local civic amenity site What is wrong with the methods currently being used for discarding of our old PCs? With this question in mind, Rits Information Security embarked on a study to highlight the problems home users, and corporate users face when discarding retired PCs In this paper, Rits Information Security describes research in which a number of hard disks were taken from computers after they had been released for resale on Irish online auction sites The research that was undertaken involved an analysis of the disks to determine if any information remained on these disks, and whether the information could be easily recovered using commonly available tools and techniques From this analysis, a number of disks could be traced to specific organisations, including large financial institutions, various consultancy firms, numerous small trade organisation, auctioneers, and insurance brokers In addition to these, a number of computers were found to have originated from the home environment The results indicate that careless disposal of computers and storage media in the Republic of Ireland is a significant problem Very few of the disks tested had undergone a thorough or efficient cleansing process The level of information that could be recovered from the majority of the disks tested would have proven useful for corporate espionage, identity theft, blackmail, and fraud

2 citations

Journal ArticleDOI
TL;DR: Data and information security has been catapulted into the public's conscience and once more reminded the public and company CEOs of the threats and dangers that come with communicating and holding cardholder data.

2 citations

Book
16 Nov 2011
TL;DR: The authors accurately identifies various forms of identity theft in simple, easy-to-understand terms, exposes exaggerated and erroneous information, and explains how everyone can take action to protect themselves.
Abstract: This book accurately identifies the various forms of identity theft in simple, easy-to-understand terms, exposes exaggerated and erroneous information, and explains how everyone can take action to protect themselves.

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112