scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
01 Apr 2018
TL;DR: Five major categories of identity attributes that are discoverable online are discussed which relate to data that is biographic, behavioral, relationship, biometric, and physiological data which are all part of a holistic representational model for identity analytics.
Abstract: The Internet has become a major source of data that many regard as personally identifiable, and the ease of accessibility may be considered as an invasion of privacy. While there are certainly benign uses of this data, it has also facilitated increases in identity theft and identity fraud. This paper presents classes of cyber identity attributes that can aid in analysis and protection of a person's sensitive data in a complex, changing environment. Our research is motivated by the need to understand and organize identity attributes in such a way as to inform the general public of what Personally Identifiable Information (PII) is available and how it may be better protected. In this paper, we outline and discuss five major categories of identity attributes that are discoverable online. The categories discussed relate to data that is biographic, behavioral, relationship, biometric, and physiological data which are all part of a holistic representational model for identity analytics.

2 citations

01 Nov 2011
TL;DR: It is identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy, and it is shown that Facebook lists are a superset of Google+ circles, both functionally and logically, even though Google+ provides a better user interface.
Abstract: In this paper we provide a preliminary analysis of Google+ privacy. We identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy. We also identified that Google+ encourages the provision of other names including maiden name, which may help criminals performing identity theft. We show that Facebook lists are a superset of Google+ circles, both functionally and logically, even though Google+ provides a better user interface. Finally we compare the use of encryption and depth of privacy control in Google+ versus in Facebook.

2 citations

01 Sep 2004
TL;DR: In this article, a theoretical framework is proposed to identify key stakeholders and their interactive relationships that play a role in combating identity theft, and the identification and clarification of the responsibilities of the relevant stakeholders, along with related activities will help to understand how to defend against identity theft in an efficient and effective manner.
Abstract: Identity theft is not a new phenomenon, but due to the widening applications of the Internet that increases exposure of users to this threat, it is beginning to cause more and more damage to the economy and society in general. Therefore, research on identifying and combating ID theft is both imperative and urgent. In this paper, a theoretical framework is proposed to identify key stakeholders and their interactive relationships that play a role in combating identity theft. The identification and clarification of the responsibilities of the relevant stakeholders, along with related activities, will help to understand how to defend against identity theft in an efficient and effective manner. We also note the potential and urgency for future research on particular aspects of identity theft.

2 citations

Journal ArticleDOI
TL;DR: The identity question raises its head in the context of the origin of mass-mailing viruses and worms; the relentless avalanche of spam; electronic identity theft; Internet fraud and cybersquatters.

2 citations

01 Jan 2017
TL;DR: The Eduroam Device Management was implemented at RWTH Aachen University and considers the creation of device specific credentials and supporting processes for other universities within a federation.
Abstract: To reduce the impact of security vulnerabilities of Eduroam the Eduroam Device Management was implemented at RWTH Aachen University. The service allows to create device specific credentials to be used as credentials when connecting to the Eduroam network. Users can create credentials, get an overview of their credentials already created and can disable network access for each device individually via a web interface. A first device manager was developed for users of RWTH Aachen, the current implementation considers the creation of device specific credentials and supporting processes for other universities within a federation.

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112