scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
26 Mar 2013
TL;DR: This study highlights the importance of information security management in organizations and identifies various critical security challenges that often lead to information leakage within the organizations.
Abstract: Information is one of the most crucial assets of current day organizations. However, managing this information has become a never ending challenge. Adequate security and privacy are of great essence for information systems containing valuable data and information. Leakage of such information can facilitate large-scale identity theft and successful impersonation of a victim lets the identity thief commit fraud. Identity theft occurs when someone uses another individual's personal information to pose as that individual. This study highlights the importance of information security management in organizations and identifies various critical security challenges that often lead to information leakage within the organizations. Qualitative method of research has been employed for data collection and analysis. The results obtained are categorized into eleven critical security challenges in order of the number of cases reported for each of them.

2 citations

Book ChapterDOI
01 Jan 2020
TL;DR: There seems to be a connection between the usages of such media with identity theft, cyberbullying, online sexual predators mainly affected youths because of lack of security consciousness and privacy about personal information.
Abstract: In this 21st century and beyond, many can attest to the role of ICT in the development of communication in the world. According to Adaja and Ayodele (2013 p. 65), ‘one of the developments in Information and Communication Technology in the 21st century was the finding and advent of the new media which have enabled the formation of several channels of social communication.’ As a result of the fast-growing technology, in social communication, there has been dependence on the internet by a large percentage of individuals around the world. Consequently, personal information is shared when creating profiles on social media platforms thereby making it easy for online crimes to take place. Security attacks such as hacking, identity theft, phishing scams, viruses are now common online as users share their names, date of birth, the name of schools, family information, and others on social media sites. While activities online increase, there are concerns about the ways personal information shared by social media users may be collected and analysed (Hinduja and Patchin, 2009). According to Walker (2016) the state of the net poses, that more than half of the people using social media applications share private information about themselves online, exposing themselves to online dangers. The findings reveal that: 25% of persons with a Facebook account do not use the site’s privacy control or are not aware of them, 40% of social media users post their personal identity information online, exposing them to identity theft and 9% of social media users dealt with a form of abuse within the past year (e.g., malware, online scams, identity theft or harassment) (Finch, 2003). Due to this increase, there seems to be a connection between the usages of such media with identity theft, cyberbullying, online sexual predators mainly affected youths because of lack of security consciousness and privacy about personal information (Jegede, et, al; (2016) McGillivray, 2015). Also, Social Media and Identity Theft Implications on Nigerian Victims and International Economy

2 citations

Posted Content
TL;DR: In this article, the authors outline some of the behavioural factors affecting people's online behaviour and analyze real-world reactions to online fraud using evidence from the British Crime Survey 2009-10.
Abstract: Psychological and sociological factors constrain economic decision-making in many contexts including the online world. Behavioural economics and economic psychology emphasise that people will make mistakes in processing information and in planning for the future; these mistakes will also distort learning processes. Emotions and visceral factors will play a key role - not only a ecting people's actions but also distorting the interactions between information, learning and choices. This will have wide-ranging implications for online behavior and information security management, making people more vulnerable to security/privacy abuses including hacking, spam attacks, phishing, identity theft and online financial exploitation. These vulnerabilities raise crucial policy questions - recently made more pressing in the light of recent phone-hacking scandals in the UK. This paper outlines some of the behavioural factors affecting people's online behaviour and analyses real-world reactions to online fraud using evidence from the British Crime Survey 2009-10.

2 citations

Book
16 Apr 2012
TL;DR: In this paper, how did you get naked? Peekers and Gawkers: Who Is Looking at Your Online Persona? 3: Behavioral Targeting 4: Self-Examination 5: Time to Get Dressed 6: Protecting Identity in a Crisis: Identity Theft and Defamation 7: Branding Your Public Persona 8: Dress for Career Success 9: Don't Forget the Kids 10: Turning Off the Lights: Choosing to Be Invisible Online Notes Index Index about the Authors
Abstract: Foreword 1: How Did You Get Naked? 2: Peekers and Gawkers: Who Is Looking at Your Online Persona? 3: Behavioral Targeting 4: Self-Examination 5: Time to Get Dressed 6: Protecting Identity in a Crisis: Identity Theft and Defamation 7: Branding Your Public Persona 8: Dress for Career Success 9: Don't Forget the Kids 10: Turning Off the Lights: Choosing to Be Invisible Online Notes Index About the Authors

2 citations

01 Jan 2005
TL;DR: The objective of this effort is to demonstrate the viability of a secured run-time reconfigurable processor for streaming-data communication applications, and to develop structured methods for assembling and reconfiguring this type of processor.
Abstract: Digital communication has become prevalent over the last few decades. The increasing popularity of the Internet and the proliferation of wireless networks have allowed people to conduct business and to communicate "online." Naturally, as the popularity of the medium increases, so do the concerns. Businesses and individuals alike are demanding security guarantees from the applications and services that they use. The most basic of these requirements are privacy and authenticity of data in transmission. Portable devices, including cell phones, Personal Digital Assistants (PDAs), and laptop computers are playing an increasing role in the lives of consumers. As these devices become more integrated with the daily routines of the end- users, they are more likely to contain more personal information, including telephone numbers, birthdates, contact lists, and perhaps even credit card, bank account, or other billing information. Loss of a device containing this type of information is not only inconvenient; it can easily lead to identity theft. As the theft of devices like cellular phones becomes more common, end-users would like to see products that not only contain the latest features, but also provide some assurance of security. For example, a cellular telephone that allows a user to change providers and technologies without buying new hardware would certainly find a place in the pockets of consumers. The objective of this effort is to demonstrate the viability of a secured run-time reconfigurable processor for streaming-data communication applications, and to develop structured methods for assembling and reconfiguring this type of processor.

2 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112