Topic
Identity theft
About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.
Papers published on a yearly basis
Papers
More filters
•
20 Oct 2009
TL;DR: In this paper, a method to reduce the risk of identity theft was proposed, which selectively obscures identification indicia on personal property when the personal property is located on private real property.
Abstract: A method to reduce the risk of identity theft prevents the gathering and correlation of personal information on an individual's private real property. The method selectively obscures identification indicia on personal property when the personal property is located on private real property.
2 citations
•
TL;DR: The authors examines the likelihood that displaced war victims, who have essentially lost their identities as well as so much else, can recoup civil compensation for their losses through local Yugoslavian courts and scrutinizes the basic international human rights doctrines and systems of enforcement to determine whether these may offer remedies for the victims of identity elimination.
Abstract: This paper examines the likelihood that displaced war victims, who have essentially lost their identities as well as so much else, can recoup civil compensation for their losses through local Yugoslavian courts It scrutinizes the basic international human rights doctrines and systems of enforcement to determine whether these may offer remedies for the victims of identity elimination Finally, the article explores the likelihood that, through the International Tribunal in the Former Yugoslavia, those responsible for identity elimination may be held criminally liable for their actions in Kosovo
2 citations
••
TL;DR: Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers, finding that careless disposal of computers and storage media in the Republic of Ireland is a significant problem.
Abstract: Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers How would you dispose of your old computer, or how would the company you work for dispose of their old computers? The majority of Irish homeowners, would bring their old computers to local civic amenity centres, give it away to a relative or sell it on to another party Some organisations would give their old equipment to a staff member, as a gift gesture, others may simply discard in the local civic amenity site What is wrong with the methods currently being used for discarding of our old PCs? With this question in mind, Rits Information Security embarked on a study to highlight the problems home users, and corporate users face when discarding retired PCs In this paper, Rits Information Security describes research in which a number of hard disks were taken from computers after they had been released for resale on Irish online auction sites The research that was undertaken involved an analysis of the disks to determine if any information remained on these disks, and whether the information could be easily recovered using commonly available tools and techniques From this analysis, a number of disks could be traced to specific organisations, including large financial institutions, various consultancy firms, numerous small trade organisation, auctioneers, and insurance brokers In addition to these, a number of computers were found to have originated from the home environment The results indicate that careless disposal of computers and storage media in the Republic of Ireland is a significant problem Very few of the disks tested had undergone a thorough or efficient cleansing process The level of information that could be recovered from the majority of the disks tested would have proven useful for corporate espionage, identity theft, blackmail, and fraud
2 citations
••
TL;DR: Data and information security has been catapulted into the public's conscience and once more reminded the public and company CEOs of the threats and dangers that come with communicating and holding cardholder data.
2 citations
•
16 Nov 2011
TL;DR: The authors accurately identifies various forms of identity theft in simple, easy-to-understand terms, exposes exaggerated and erroneous information, and explains how everyone can take action to protect themselves.
Abstract: This book accurately identifies the various forms of identity theft in simple, easy-to-understand terms, exposes exaggerated and erroneous information, and explains how everyone can take action to protect themselves.
2 citations