scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
01 Mar 2017
TL;DR: In this paper, the potential benefits and limitations of identity theft services and factors that affect government and private-sector decision-making about them are examined, among other objectives, including the potential benefit and limitation of these services.
Abstract: : Private-sector and government entities that experience data breaches often provide affected consumers with identity theft services, which typically include credit monitoring, identity monitoring, identity restoration, and identity theft insurance. In response to data breaches in 2015, OPM awarded two contracts obligating about $240 million for identity theft services. GAO was asked to examine issues related to identity theft services and their usefulness. This report examines, among other objectives, (1) the potential benefits and limitations of identity theft services, and (2) factors that affect government and private-sector decision-making about them. GAO reviewed products, studies, laws, regulations, and federal guidance and contracts, and interviewed federal agencies, consumer groups, industry stakeholders, and eight providers selected because they were large market participants. What GAO Recommends: Congress should consider permitting agencies to determine the appropriate coverage level for identity theft insurance they offer after data breaches. OMB should analyze the effectiveness of identity theft services relative to alternatives, and should explore options to address duplication in federal agencies provision of these services. OPM should address in its breach-response policy when to offer these services and should document its decision-making process. OPM agreed with GAOs recommendations to the agency.

2 citations

Journal ArticleDOI
TL;DR: There should still be an outcry to eliminate the brandishing of birthdates to identify patients in the medical encounter and the failure of the rest of the legislation to do much about portability and accountability.
Abstract: I n August of 2015 we presented an editorial entitled ‘‘Medical Insecurity.’’ A gargantuan hack at Anthem had exposed millions of medical records and thus private information of patients. It would be nice to think that since then the susceptibility to loss of privacy would have greatly ameliorated. Well, that is not in evidence. Hacking government sites, elections, international secrets, financial data, and the holding of data for ransom continue to be daily news. Some things are going to get better. The Social Security Number Removal Initiative included in the Medicare Access and Children’s Health Insurance Program (CHIP) Reauthorization Act of 2015 calls for new Medicare number identifiers that are NOT an individual’s Social Security number. The initiative will be rolled out starting in April 2018. Now that is a good idea. Our great faith in electronic data has been somewhat eroded by the ease with which information can be stolen for various purposes including identity theft, ransom, national security, and just plain meanness. We spend countless hours preventing patient data loss in the Health Insurance Portability and Accountability Act (HIPAA) era and electronic data entry has become at least an equal claimant for time in an encounter between patient and caregiver. No one could argue that privacy is a foundation of medical ethics. However, it is always good to remember that in the ‘‘P’’ in HIPAA is not for privacy! That is a hugely important aspect that has become dominant in the failure of the rest of the legislation to do much about portability and accountability. In a giant effort to assure privacy and the massive documentation of data in the electronic health record, we spend so very much time facing a computer screen rather that offering our kind and gentle faces directly to patients! Health and Human Services Secretary, Dr. Tom Price, has called upon the Information Technology (IT) community to do something about the grapple of caregiver and digital record that is done, often in the name of privacy (or billing), but may not serve the best interests of our patients or the caregiver. Perhaps the IT community can do something to restore the quality of caregiver and patient time. There should still be an outcry to eliminate the brandishing of birthdates to identify patients in the medical encounter. After all, if a miscreant can get a name and the person’s birthdate, identity theft is in his grasp. Obviously, the answer is to use biometrics at the check in and throughout encounters dealing with patients. The technology is not all that challenging and continues to get better. The Biometrics Institute lists 17 rather straightforward technologies to uniquely identify someone, and only one of those involves DNA. In the high stakes screening by the Transportation Security Administration, do they ever ask anyone to repeat their birthdate? We do not need the dazzle of a James Bond script to consider simple ways to identify one another. Iris, retina, facial identification, and voice recognition all work and are reproducible. Let us describe the identity requirements of a large medical center at a recent new patient encounter. The patient has traveled some distance and arranged for pertinent medical information to precede them to the appointment. Certainly, demographics, insurance, contacts, and communication feature prominently. Then, the patient was told that the institution does not like to use email. They have a wonderful new patient service: the patient portal. The patient receives a unique medical record number (good) and is asked to create a password. That was reasonable. The portal would provide medical updates, appointment information, and could be used to ask questions. No phone numbers were offered. Well, in creating the patient portal there were just a few identification questions. First, in what states does your oldest daughter own real estate? Then, what was the street address of the house you sold 20 years ago? Hold on. Why has a medical center collected such private information on a new patient? What does this information have to do with patient care? What else has the medical center trolled up? Military service records? Employment records? Political party affiliation? Friends and contacts who might have been on a McCarthy black list? This is ridiculous of

2 citations

Posted Content
TL;DR: This case allows students to analyze the Target security breach and propose ways that the attack could have been prevented or at least detected more quickly by Target management, internal and external auditors.
Abstract: For most people, the word cybercrime invokes getting individuals’ personal information through Internet hacking. For this reason, many people are wary about making online purchases, concerned about the security of their personal data and the rise in identity theft. However, the recent breach of security at Target, when customers made in store holiday purchases, indicates the pervasiveness of this terrible crime. In late December 2013, Target announced that hackers, through point of sale terminals in stores, had successfully stolen data for up to 40 million credit and debit cardholders. Target later revised the estimate to 110 million cardholders, citing that the breach included encrypted pin information as well as purchases made more than a decade ago. This case allows students to analyze the Target security breach and propose ways that the attack could have been prevented or at least detected more quickly by Target management, internal and external auditors. This case is suitable for an undergraduate class or a graduate business class.

2 citations

Journal ArticleDOI
TL;DR: In this article , the authors designed a model to detect the fraud activity in credit card transactions, which can provide most of the important features required to detect illegal and illicit transactions, but it is difficult to track the behavior and pattern of criminal transactions.
Abstract: Abstract: This paper is focused on credit card fraud detection in real world scenarios. Nowadays credit card frauds are increasing in number as compared to earlier times. Criminals are using fake identity and various technologies to trap the users and get the money out of them. Therefore, it is very essential to find a solution to these types of frauds. In this proposed paper we designed a model to detect the fraud activity in credit card transactions. This system can provide most of the important features required to detect illegal and illicit transactions. As technology changes constantly, it is becoming difficult to track the behavior and pattern of criminal transactions.

2 citations

Journal ArticleDOI
TL;DR: This paper is a contribution to the domain of ontological commitment as it applies to a description of subjects, objects, actions, and relationships as they pertain to the National Strategy of Trusted Identity in Cyberspace initiative.
Abstract: The nations digital infrastructure is in jeopardy because of inadequate provisions for privacy, identity, and security. Recent Internet activity has resulted in an onslaught of identity theft, fraud, digital crime, and an increasing burden to responsible citizens. The computer security and Internet communities have been generally responsive but apparently ineffective, so it is time for a third party to step in, take charge, and provide an infrastructure to assist in protecting individuals and non-person entities. This paper is a contribution to the domain of ontological commitment as it applies to a description of subjects, objects, actions, and relationships as they pertain to the National Strategy of Trusted Identity in Cyberspace initiative.

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112