scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This work proposes a scheme to protect users from Identity Theft Attack, and in this work, users' personal information can be still kept public, which means that this scheme does not violate the nature of the social networks.
Abstract: Recently, on-line social networking sites become more and more popular. People like to share their personal information such as their name, birthday and photos on these public sites. However, personal information could be misused by attackers. One kind of attacks called Identity Theft Attack is addressed in on-line social networking sites. After collecting the personal information of a victim, the attacker can create a fake identity to impersonate this victim and cheat the victim's friends in order to destroy the trust relationships on the on-line social networking sites. In this paper, we propose a scheme to protect users from Identity Theft Attacks. In our work, users' personal information can be still kept public. It means that this scheme does not violate the nature of the social networks. Compared with previous works, the proposed scheme incurs less overhead for users. Experimental results also demonstrate the practicality of the proposed scheme.

52 citations

01 Jan 2012
TL;DR: The study identified some of the causes of cyber crimes to include urbanization, unemployment and weak implementation of cyber crime laws, to include cyber terrorism, identity theft and spam.
Abstract: Cybercrime involves using computers and Internet by individuals to commit crime. Cyber terrorism, identity theft and spam are identified as types of cybercrimes. The study identified some of the causes of cyber crimes to include urbanization, unemployment and weak implementation of cyber crime laws. The effects of cybercrimes on organizations, the society and the country in general include reducing the competitive edge of organizations, waste of production time and damage to the image of the country. With Nigeria venturing into cashless society, there is a need for cybercrimes menace to be minimized if not completely eradicated. Some of the ways of combating such crimes include taking reasonable steps to protect ones property by ensuring that firms protect their IT infrastructure like Networks and computer systems; government should assure that cyber crime laws are formulated and strictly adhered to and individuals should observe simple rules by ensuring antivirus protection on their computer systems.

52 citations

Patent
16 Aug 2005
TL;DR: In this article, a web-based application method that allows victims of identity theft to rectify and prevent further fraudulent activity is comprised of communicating with a central system and receiving a series of actions and prompts by the system.
Abstract: A web-based application method that allows victims of identity theft to rectify and prevent further fraudulent activity is comprised of communicating with a central system and receiving a series of actions and prompts by the system. The invention also allows the user to obtain general information relating to the various types of fraud and gives the user the ability to store and be able to archive all information relating to the fraud in one convenient place. Once the user has been guided through all of these actions, all necessary action will have been taken to rectify the present fraud, and also to prevent further fraudulent activity from occurring.

52 citations

Journal ArticleDOI
TL;DR: In this article, the authors used survey data from telephone interviews conducted in Florida and Arizona with individuals aged 60 and over to test whether this theoretical framework partially explains risky remote purchasing and identity theft victimization among older Internet users.
Abstract: The low self-control/risky lifestyles perspective posits that people deficient in self-control engage in certain risky behaviors that increase their exposure to motivated offenders in the absence of capable guardianship, which in turn elevates their risk of victimization. Using survey data from telephone interviews conducted in Florida and Arizona with individuals aged 60 and over, the current study tests whether this theoretical framework partially explains risky remote purchasing and identity theft victimization among older Internet users. Results from the two-stage probit models conform to expectations: Individuals with lower levels of self-control have a significantly higher probability of making a purchase after receiving an unsolicited email from a vendor with whom they have not previously done business. What is more, making a risky remote purchase significantly increases the probability of identity theft victimization. The findings not only speak to the generality of the low self-control/risky life...

51 citations

Proceedings ArticleDOI
28 Jan 2012
TL;DR: This paper introduces the notion of accountable use and update of electronic health records and designs a patient-centric monitoring system based on it, and develops a system architecture and associated protocols that enable either explicit or implicit patient control over when and how health information is accessed.
Abstract: Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and efficiency of their healthcare. Unfortunately, misuse of information stored in EHR and PHR systems will create new risks for patients, and we need to empower them to safeguard their health information to avoid problems such as medical identity theft. In this paper, we introduce the notion of accountable use and update of electronic health records and design a patient-centric monitoring system based on it. We develop a system architecture and associated protocols that enable either explicit or implicit patient control over when and how health information is accessed. Our approach provides a reasonable solution rather than addressing the more general information flow control problem in distributed systems. We also implement and evaluate a prototype system motivated by a health record sharing scenario based on NHIN Direct to demonstrate that enhanced accountability can be supported with acceptable performance and integration overheads.

51 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112