Topic
Identity theft
About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.
Papers published on a yearly basis
Papers
More filters
•
TL;DR: A web-based architecture which uses a combination of Image Processing and secure transmission of customers’ Iris templates along with credit card details for decreasing credit card frauds over Internet is proposed.
Abstract: E-commerce is an outcome of globalization and technology outbreak of 21st century. Increasingly, more products and services are sold over Internet; hence, there is a growing need for a combination of legislation and technical solutions to globally secure customer privacy. Credit card fraud is one of the crimes especially when it is used for web-based transaction. In this paper, a technical solution using Iris authentication technique is proposed for protecting identity theft in e-commerce transactions because Iris patterns are unique to an individual. Further, this research proposes authentication of e-commerce users by using Iris biometric technique as one of the most secure biometric algorithms. Therefore, this research proposes a web-based architecture which uses a combination of Image Processing and secure transmission of customers‟ Iris templates along with credit card details for decreasing credit card frauds over Internet.
2 citations
31 Aug 2006
TL;DR: A model for phishing is proposed, based on a survey of user detection of phishing, and recommendations for a defense-in-depth strategy to prevent phishing are presented.
Abstract: : Phishing is a form of crime in which identity theft is accomplished by use of deceptive electronic mail and a fake site on the World Wide Web. Phishing threatens financial institutions, retail companies, and consumers daily and phishers remain successful by researching anti-phishing countermeasures and adapting their attack methods to the countermeasures, either to exploit them, or completely circumvent them. An effective solution to phishing requires a multi-faceted defense strategy. We propose a model for phishing. We report on a survey we conducted of user detection of phishing. We also report on experiments to assess the success of automated methods for assessing clues to phishing email. We present recommendations for a defense-in-depth strategy to prevent phishing.
2 citations
••
TL;DR: In this article, the authors discuss the increasing levels of phishing attacks and identity theft through to the fight back, legislation, regulation, guidance to reduce the risk of identity theft and software offerings.
2 citations