scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
01 Oct 2014
TL;DR: In this article, the authors proposed the use of a 7-digit identification code issued to customers solely for the purpose of remote communication with the bank, where the customer will only need to supply the digits occupying two or three randomly selected positions out of the seven.
Abstract: Customers' trust has been identified as a factor that must exist for customers to embrace c-commerce. An effective, reachable and responsive coil center is one key to gaining this trust for organizations or banks that rely on e- commerce. However, an issue with call centers is the proper identification of the caller so that sensitive information is not divulged to wrong persons. Thus, a second level security check is needed before resolving any issue or divulging any account or transaction related information to the caller. This is seen as a necessary step to guard against privacy intrusion, scam or identity theft. Therefore, this paper proposes the use of a 7-digit identification code issued to customers solely for the purpose of remote communication with the bank. At the point of service rendering, the customer will only need to supply the digits occupying two or three randomly selected positions out of the seven. We believe this will further strengthen the privacy of customers in the banks through the call centers.

1 citations

Journal ArticleDOI
TL;DR: This paper analyzes the European legal framework on cybercrime with a mainly European perspective, based in the new modern challenges that have emerged in the form of cyber-crime as criminal groups have taken effectively advantage of technologies.
Abstract: This paper analyzes the European legal framework on cybercrime. It focuses on the criminal law framework on cybercrime with a mainly European perspective, based in the new modern challenges that have emerged in the form of cyber-crime as criminal groups have taken effectively advantage of technologies. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries of the European Union, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from cyber- crime, with the introduction of new investigative powers and the facilitation of international cooperation.Cybercrime is a term that is used to refer to a broad range of different activities relating to the misuse of data, computer and information systems, and cyberspace for economic, personal or psychological gain. Policy-makers at the EU and at national levels, academics and law enforcement practitioners have put forward different definitions and systems classifying cybercrime as attacks against information systems, online fraud and scam schemes, identity theft, illicit trading or dissemination of illegal content such as child sexual abuse material. The Union should therefore promote policies and legislation that ensure a very high level of network security and allow faster reactions in the event of cyber disruptions or cyber- attacks. DOI: 10.5901/mjss.2013.v4n9p327

1 citations

Journal Article
TL;DR: The first federated identity management framework is the one proposed by the Liberty Alliance as mentioned in this paper, which allows service providers to identify each of their users by an arbitrary pseudonym (e.g., a "band of brothers" who know each other).
Abstract: The current identity crisis has the potential to afflict all "netizens." Identity theft can lead to identity fraud and financial losses not to mention endless hassles about whether you--when requesting a new credit card online, or engaging in e-commerce--are really you or a fraudster simply out to spend money in your name. For business managers looking to web services for efficiencies in managing supply chains or linking employees to outsourced pension plans, the stakes in identity management are even higher. Given that, technology gurus have been brewing a new approach to authenticating online identities for use in B2B. It's called federated identity management. In brief, that means distributing user identities among a circle of trust--a "band of brothers" who know and trust each other. The circle of trust could be an enterprise headquarters and employees on the road or at "away" locations. It could be an extranet linking an enterprise with its suppliers and customers. It could be a bank linking its customers to its deposit account, its credit card issuer, and its 401(k) manager. It could be a circle of no more than a dozen. Or a cast of thousands, as it is with General Motors--or with France Telecom's 50 million cellphone users. Liberty Alliance was not the first to offer federated identity. Nor does it have the most products at work in the most installations today, although General Motors and France Telecom are two of them. However, Liberty is interesting for several reasons. It's an alliance of (now) more than 150 end-user companies, government organizations, system integrators, and software and hardware vendors around the world. It provides an open-source, standards-based software platform that allows entities within circles of trust to interact with one another using a single signon--and signoff. Circles of trust are spontaneously organized as supply chains, affinity groups, intranets, extranets, or whatever makes business sense. There is no central repository of user IDs and personal profiles. Each circle of trust is an autonomous network--a federation. Each organization keeps its own identity rules, along with its own identity software and its own security system, and, when Liberty-enabled, specifies what attributes from its user profiles it will allow other members of the circle to access. Liberty provides a standards-based platform for interoperating the various identity programs. Each of Liberty's federated circles of trust is made up of a designated identity provider (IDP), usually the principal member, and service providers (SP) who together constitute, say, the supply chain. The IDP manages identities for the circle. An enterprise can play different roles--e.g., a computer parts supplier could be an IDP for its payroll outsource and an SP in a relationship with a large PC retailer. To foil would-be identity thieves and to protect individual privacy, the Liberty framework allows service providers to identify each of its users by an arbitrary pseudonym--e. …

1 citations

01 Jan 2015
TL;DR: This report outlines various methods and solutions targeting security of Bitcoin or other decentralised digital currency systems and to decrease frequency of attacks on either communication channels or system storage and aims to understand their effectiveness.
Abstract: Virtual currencies and mobile banking are technology advancements that are receiving increased attention in the global community because of their accessibility, convenience and speed. However, this popularity comes with growing security concerns, like increasing frequency of identity theft, leading to bigger problems which put user anonymity at risk. One possible solution for these problems is using cryptography to enhance security of Bitcoin or other decentralised digital currency systems and to decrease frequency of attacks on either communication channels or system storage. This report outlines various methods and solutions targeting these issues and aims to understand their effectiveness. It also describes Secure Bitcoin Wallet, standard Bitcoin transactions client, enhanced with various security features and services.

1 citations

Proceedings ArticleDOI
28 Apr 2018
TL;DR: The proposed Mobile Identity Verification Application (MIVA) that consists of two-factor login verification, order verification and fingerprint scanning with risk analysis would contribute a secure and robust application which would assist in verifying user identity while transacting in mobile commerce.
Abstract: The usage of handheld smart devices with Internet services has provided greater sense of convenience, mobility, efficiency and enjoyment to the user. Despite that, inexistence of user identity verification system has made mobile commerce platform vulnerable to malicious attacks such as identity theft. In order to provide an additional layer of security, this paper had proposed and developed Mobile Identity Verification Application (MIVA) that consists of two-factor login verification, order verification and fingerprint scanning with risk analysis. A comparison study was conducted with 6 different scenarios assigned with 7 rule IDs, success and fail score to evaluate the effectiveness of MIVA in classifying fraudulent users. The results had revealed that Scenario C using success score of ‘1’ and fail score ‘2’ is significant to the proposed risk analysis specification. The findings of this study would contribute a secure and robust application which would assist in verifying user identity while transacting in mobile commerce.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112