Topic
Identity theft
About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper , the authors proposed a method to improve the quality of the information provided by the user by using the information of the user's interaction with the service provider of the service.
Abstract: Следует отметить, что нелегальная добыча древесины растет, и с каждым годом увеличивается количество лиц, совершающих незаконную рубку лесных насаждений. Лица, совершающие ее, — так называемые бригады черных лесорубов — используют всё более изощренные способы совершения и сокрытия преступной деятельности, что требует развития и совершенствования криминалистической методики расследования незаконной рубки лесных насаждений. В представленной статье анализируются сведения о личности вероятного преступника и мотивация его поведения при совершении незаконной рубки лесных насаждений. Представлены точки зрения ряда авторов по данному вопросу, рассмотрены различные классификации категории личности преступника, раскрыты наиболее важные. На основе данных, полученных при исследовании уголовных дел, автором статьи представлена классификация в зависимости от места сбыта (территории) древесины: для дальнейшей реализации в пределах региона, в иные регионы и за пределы Российской Федерации. Обозначена роль каждого участника внутри преступной группы в зависимости от выполняемых функций (лесорубов, заказчиков, лиц, осуществляющих транспортировку леса, организаторов). Раскрыты уровни изучения личности вероятного преступника (обобщенный, групповой, индивидуальный). Представлена классификация личности вероятного преступника на лиц, совершающих незаконную рубку леса в бытовых и корыстных целях, а также раскрыты различия между ними. Предложена классификация лиц, совершивших незаконную рубку, в зависимости от противоправного деяния, на две группы: первая — совершающие преступление с последующей реализацией, вторая — для использования в личных целях. Рассмотрена роль должностных лиц при совершении преступлений данной категории. Проводится анализ факторов, способствующих совершению преступлений, связанных с незаконной рубкой лестных насаждений. Приводятся характеристики преступников, совершающих преступления указанной категории, в зависимости от наличия судимости, сферы занятости, пола, возраста и др. Отмечается роль и значение знаний следователя (дознавателя) о содержании криминалистической характеристики сведений о личности вероятного преступника, совершившего незаконную рубку леса, для эффективного предупреждения преступности в сфере лесных отношений.
It should be noted that illegal timber extraction is growing and the number of persons committing illegal logging of forest plantations is increasing every year. The perpetrators are the so-called “brigades of black loggers” who use increasingly sophisticated methods of committing and concealing criminal activity, which requires the development and improvement of forensic methods of investigating illegal logging of forest plantations. The presented article analyzes information about the identity of a likely criminal and the motivation of his behavior when committing illegal logging of forest plantations. The author presents the authors’ points of view on this issue, considers various classifications of the criminal’s personality category, and reveals the most important ones. Based on the data obtained during the investigation of criminal cases, the author presented a classification depending on the place of sale (territory) of wood: for further sale within the region, to other regions and outside the Russian Federation. The role of each participant within the criminal group is indicated, depending on the functions performed (loggers, customers, persons carrying out the transportation of forests, organizers). The levels of studying the personality of a probable criminal (generalized, group, individual) are revealed. The classification of the personality of a probable criminal into persons committing illegal logging for domestic and mercenary purposes is presented, and the differences between them are revealed. The author proposes a classification of persons who have committed illegal logging, depending on the illegal act, into two groups: the first — committing a crime with subsequent implementation, the second — for use for personal purposes. The article examines the role of officials in the commission of crimes of this category. The analysis of the factors contributing to the commission of crimes related to illegal logging of flattering plantings is carried out. The characteristics of criminals who commit crimes of this category are given, depending on the presence of a criminal record, employment, gender, age, etc. The role and importance of the investigator’s (inquirer’s) knowledge about the content of the forensic characteristics of information about the identity of a likely criminal who committed illegal logging for effective crime prevention in the field of forest relations is noted.
1 citations
••
01 Jan 2022
TL;DR: In this article , NIST would like to acknowledge the significant contributions of the Identity, Credential, and Access Management Subcommittee (ICAMSC) and the Smart Card Interagency Advisory Board (IAB) for providing valuable contributions to the development of technical frameworks on which this Standard is based.
Abstract: Acknowledgements NIST would like to acknowledge the significant contributions of the Identity, Credential, and Access Management Subcommittee (ICAMSC) and the Smart Card Interagency Advisory Board (IAB) for providing valuable contributions to the development of technical frameworks on which this Standard is based. Special thanks to those who have participated in the business requirements meeting and provided valuable comments in shaping this Standard.
1 citations
••
[...]
TL;DR: The Payment Card Industry Data Security Standard has advocated a way for merchants and banks to crack identity theft as discussed by the authors, and the answer is simple - keep the safe empty, says Andrew Valentine.
1 citations
••
29 Feb 2012
TL;DR: This work proposes the intelligent mobile agents instead of human agents to perform the Job search using fuzzy preferences which is been published elsewhere and application operations incorporating the use of agents with a trust authority to establish employer trust and validate applicant identity and accuracy.
Abstract: The Job selection process in today’s globally competitive economy can be a daunting task for prospective employees no matter their experience level. Although many years of research has been devoted to job search and application resulting in good integration with information technology including the internet and intelligent agent-based architectures, there are still many areas that need to be enhanced. Two such areas include the quality of jobs associated with applicants in the job search by profiling the needs of employers against the needs of prospective employees and the security and verifications schemes integrated to reduce the instances of fraud and identity theft. The integration of mobile, intelligent agent, and cryptography technologies provide benefits such as improved accessibility wirelessly, intelligent dynamic profiling, and increased security. With this in mind we propose the intelligent mobile agents instead of human agents to perform the Job search using fuzzy preferences which is been published elsewhere and application operations incorporating the use of agents with a trust authority to establish employer trust and validate applicant identity and accuracy. Our proposed system incorporates design methodologies to use JADELEAP and Android to provide a robust, secure, user friendly solution.
1 citations
01 Jan 2012
TL;DR: This research work describes a middleware called Visual–based challenge response in which the computer presents questions ("challenge") that requires the user to provide a valid answers ("response") using a retrieval process that involves a stimulus or pattern of stimuli to facilitate remembering in order to be authenticated.
Abstract: Biometric authentication has been described to be reliable solution to the problem of identity determination by establishing the identity of a person based on “who he is", but permanent Identity theft has been considered an important issue since biometric samples are not secret and when a biometric feature is compromised, it cannot be changed. This research work describes a middleware called Visual–based challenge response in which the computer presents questions ("challenge") that requires the user to provide a valid answers ("response") using a retrieval process that involves a stimulus or pattern of stimuli to facilitate remembering in order to be authenticated since retrieval of information via Visual recognition is easier it becomes a valuable tool to access stored information, when it cannot otherwise be recalled. This research work conceived and formalized utilizes this visual–based challenge response to compliment this weakness of existing biometric systems (i.e. permanent Identity theft), thus providing security assurance in identity management having brought user- friendliness into place since the ultimate goal of this research work is to come up with a reliable biometrics system complement the Permanent Identity theft management.
1 citations