scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings Article
11 Oct 2007
TL;DR: This poster reports a preliminary review of medical identity theft, a particular kind of identity theft that has received little attention and is used to commit healthcare fraud.
Abstract: This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud.

2 citations

Journal ArticleDOI
TL;DR: In this article, the authors investigated factors, including fears of cybercrime, that may affect researchers' willingness to share research in institutional repositories in Ghana, and found that researchers are specifically concerned about three areas when sharing research online: fraud, plagiarism and identity theft.
Abstract: INTRODUCTION This paper investigates factors, including fears of cybercrime, that may affect researchers’ willingness to share research in institutional repositories in Ghana. METHODS Qualitative research was conducted to understand more about the experiences of Ghanaian researchers when sharing research in institutional repositories. Interviews were conducted with 25 participants, documents related to policy and infrastructure in Ghana were examined, and observations were held in meetings of information technology committees. FINDINGS The findings indicate that researchers are specifically concerned about three areas when sharing research online: fraud, plagiarism, and identity theft. DISCUSSION This paper adds to research that examines barriers toward using institutional repositories, and highlights the lack of basic preventative strategies in Ghana—such as training, security, and infrastructure that are commonplace in developed countries. CONCLUSION This study draws on findings from Bossaller and Atiso (2015) that identified fears of cybercrime as one of the major barriers to sharing research online for Ghanaian researchers. While several other studies have found that fear of identity theft or plagiarism are barriers toward sharing work in the institutional repository, this is the first study that looks specifically at the experiences researchers have had with cybercrime to understand this barrier more fully.

2 citations

Book
14 Dec 2009
TL;DR: A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions is provided in this paper.
Abstract: A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions * Includes a chronology of key decisions, cases, and government action in the development of identity theft policy * Offers a list of key terms that will help the reader to better understand the sometimes unique language of crimes

2 citations

Journal ArticleDOI
25 Jul 2019
TL;DR: A technique is presented that can still read the erased data from an NFC tag even if the tag has been erased employing conventional techniques, and a set of recommendations is provided for the proper erasure of NFC tags to avoid leaving any traces of the erase data.

2 citations

Book ChapterDOI
01 Jan 2017
TL;DR: Cybercrime can be defined as the leveraging of information systems and technology to commit larceny, extortion, identity theft, fraud and, in some cases, corporate espionage.
Abstract: It is widely accepted that technology is an agent of change in the society. If used properly, it can increase productivity and improve our quality of life. However, the current rate of change in technology leaves room for it to be exploited and be used for things it was not meant to do. This includes criminal activities which are carried using technology on the cyberspace that can be classified as cybercrime. Cybercrime or computer crime can be defined as a criminal activity in which computers or computer networks are a tool, a target or a place of criminal activity. Cybercrime can also be defined as the leveraging of information systems and technology to commit larceny, extortion, identity theft, fraud and, in some cases, corporate espionage.

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112