scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
30 Dec 2008
TL;DR: Identity theft services, made available as an inherent part of a financial services account with an optional fee structure, are believed to provide economical and attractive option to the market place, and an additional safeguard to the financial organization from the effects of fraud and security breach as mentioned in this paper.
Abstract: Identity theft services, made available as an inherent part of a financial services account with an optional fee structure, are believed to provide economical and attractive option to the market place, and an additional safeguard to the financial organization from the effects of fraud and security breach. By providing notice followed by a period to opt out and then instituting a new identity theft service, a revenue generating stream can be provided for a financial organization as well as a service provider. Furthermore, the customers at the financial organization are provided with identity theft service benefits not previously enjoyed. When utilizing this service with a Covered Group, even those individuals that opt out may be provided at least limited identity theft services.

1 citations

Journal ArticleDOI
TL;DR: The paper shows how to track digital trails in cyberspace using an actual case from an identity theft and online credit card fraud to illustrate the historical, theoretical and application of Footprinting on the Internet.
Abstract: Applied theories from computer science and cognitive psychology are used to develop a method to track criminals online. Using an actual case from an identity theft and online credit card fraud, the paper shows how to track digital trails in cyberspace. The paper's purposes are first to illustrate the historical, theoretical development and application of Footprinting on the Internet, second to introduce Footprinting as a security management tool that businesses can use to track online frauds, third to show how Footprinting can also be used as a research tool to identify patterns and create profiles of behavioral activities involving Internet crimes, and fourth to stimulate discussion on potential improvements for advancing Footprinting investigations.

1 citations

Patent
19 Jul 2005
TL;DR: In this article, the authors proposed a system to increase the transaction volume of a credit sales company and reduce the time required for a member store to close a contract by conducting identity verification in a shorter time than before.
Abstract: PROBLEM TO BE SOLVED: To increase a transaction volume of a credit sales company and reduce the time required for a member store of the credit sales company to close a contract by conducting identity verification in a shorter time than before, which is achieved by the arrangement that the credit sales company and the member store transmit/receive the information such as voices and images simultaneously and interactively through a communication line, and prevent a wrongful contract such as an identity theft by using the images and voice data. SOLUTION: The system connects confirmation terminal devices 4-8 of the member store where a customer is and a confirmation device 6 of the credit sales company by a communication line 2 so that the credit sales company can confirm the customer's intention and verify the customer's identity when the customer who is going to sell/buy a vehicle (a representative person if a corporation) closes an installment contract with the credit sales company. Voices, images, etc., are transmitted/received simultaneously and interactively between the terminals and are provided as the information necessary for the verification of customer's identity and the confirmation of the customer's intention. COPYRIGHT: (C)2007,JPO&INPIT

1 citations

Journal Article
TL;DR: A review of the "Identity Theft" exhibit at the Santa Monica Museum of Art, in California, from May 19 through August 11, 2007 and featuring works by artists Eleanor Antin, Lynn Hershman, and Suzy Lake is given in this paper.
Abstract: The article presents a review of the "Identity Theft" exhibit at the Santa Monica Museum of Art, in California, from May 19 through August 11, 2007 and featuring works by artists Eleanor Antin, Lynn Hershman, and Suzy Lake.

1 citations

Journal Article
TL;DR: This case can be used as a short case illustrating how an organization can become a data breach victim, the type of data criminals are interested in stealing, how they use stolen data to commit fraud and the possible legal consequences of allowing confidential information to be stolen.
Abstract: CASE DESCRIPTION The primary subject matter in this case is an in-depth look at one of the most well known data breach victims of 2008: the Hannaford Brothers grocery chain. This case can be used as a short case illustrating how an organization can become a data breach victim, the type of data criminals are interested in stealing, how they use stolen data to commit fraud and the possible legal consequences of allowing confidential information to be stolen. To facilitate a more in-depth analysis if desired, the case and discussion questions are grouped into the following dimensions: Credit card data and processes, Credit card fraud and Identity Theft, Technical details of how the criminals accomplished the data theft and the legal aspects of the lawsuits that resulted from the data breach. Any or all of these dimensions can be explored in more depth by either the entire class or different student groups. The basic case has a difficulty level of one or two and is suitable for a general undergraduate business course. With a deeper exploration of one or more of the above dimensions the case could be used to better understand criminal data theft and fraud in an upper-level accounting or finance course. More time spent on how the data was stolen would be appropriate for an information security course, particularly with an emphasis on information technology. It could also be used in a business law or issues course to explore the legal environment surrounding data breaches, customer notification and possible legal consequences of a data breach. The basic case is designed to be taught in three class hours and is expected to require three hours of preparation by students. CASE SYNOPSIS Hannaford Brothers Company is a regional grocery company with stores throughout eastern United States. On March 17, 2008 Hannaford Brothers announced that it had been the victim of a malware attack it characterized as "new and sophisticated" which resulted in over 4.2 million credit and debit card numbers being compromised. In every one of its close to 300 grocery stores in Maine, Vermont, New Hampshire, Massachusetts, New York and Florida the malware had intercepted credit and debit card data after the customers swiped their card at the checkout counters. This stolen credit card data was fraudulently used in at least 1,800 cases in the U.S. as well as Mexico, Bulgaria and Italy. On March 19, 2008 an attorney in Maine filed a class-action lawsuit against Hannaford Brothers. Other lawsuits followed shortly. This case explores one of the most notorious data breaches of 2008--a year which according to one report had more records compromised than the preceding four years combined. Students will learn how the data was stolen, how criminals used the stolen data to commit fraud, the security standards in place to protect data and the results of the lawsuits against Hannaford Brothers. INSTRUCTORS' NOTES Recommendations for Teaching Approaches In the case typology suggested by Lynn (Lynn, 1999) this case is an "Illustrative Case". It illustrates how an organization--even when it's IT security meets industry standards--can fail to protect its customer's data when confronted with clever, high-tech criminals. Because it is an illustrative case it was designed to be used to explore a number of quite different dimensions of a data breach. It is recommended to first discuss the timeline of the key events and responses for the data breach. That timeline is shown in the next section. Next the instructor can explore any or all of the following dimensions: the nature of credit card data and the processes and entities involved in making a credit card purchase, how criminals use stolen data to commit fraud, how the criminals engineered the Hannaford Brothers data breach, and the legal issues Hannaford Brothers faced after publicizing its data breach. Although the case is self-contained, it is designed to allow instructors to drill down into any or all of these dimensions. …

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112