scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper , the authors proposed a method to improve the quality of the information provided by the user by using the information of the user's interaction with the service provider of the service.
Abstract: Следует отметить, что нелегальная добыча древесины растет, и с каж­дым годом увеличивается количество лиц, совершающих незаконную рубку лесных на­саж­дений. Лица, совершающие ее, — так называемые бригады черных лесорубов — ис­пользуют всё более изощренные способы совершения и сокрытия преступной деятель­ности, что требует развития и совершенствования кримина­листической методики рассле­дования незаконной рубки лесных насаждений. В представленной статье анализируются сведения о личности вероятного преступ­ника и мотивация его поведения при соверше­нии незаконной рубки лесных насаж­дений. Представлены точки зрения ряда авторов по данному вопросу, рассмотрены различные классификации категории личности прес­тупника, раскрыты наиболее важные. На основе данных, полученных при исследовании уголовных дел, автором статьи представлена классификация в зависимости от места сбыта (терри­тории) древесины: для дальнейшей реализации в пределах региона, в иные регионы и за пределы Российской Федерации. Обозначена роль каждого участника внутри прес­тупной группы в зависимости от выполняемых функций (лесорубов, заказчиков, лиц, осу­ществляющих транспортировку леса, организаторов). Раскрыты уровни изучения лич­ности вероятного преступника (обобщенный, групповой, индиви­дуальный). Представ­лена классификация личности вероятного преступника на лиц, совершающих незаконную рубку леса в бытовых и корыстных целях, а также раскрыты различия между ними. Предложена классификация лиц, совершивших незаконную рубку, в зависимости от про­ти­воправного деяния, на две группы: пер­вая — совершающие преступление с пос­ле­ду­ющей реализацией, вторая — для использования в личных целях. Рас­смот­рена роль дол­жностных лиц при совершении преступлений данной категории. Прово­дится анализ факторов, способствующих совершению преступлений, связанных с незакон­ной рубкой лестных насаждений. Приводятся характеристики преступников, соверша­ющих преступ­ления указанной категории, в зависимости от наличия судимости, сферы за­нятости, пола, возраста и др. Отмечается роль и значение знаний следователя (дозна­вателя) о содер­жании криминалистической характеристики сведений о личности вероят­ного преступ­ни­ка, совершившего незаконную рубку леса, для эффективного предупреж­дения преступ­ности в сфере лесных отношений. It should be noted that illegal timber extraction is growing and the number of persons committing illegal logging of forest plantations is increasing every year. The perpetrators are the so-called “brigades of black loggers” who use increasingly sophisticated methods of committing and concealing criminal activity, which requires the development and improvement of forensic methods of investigating illegal logging of forest plantations. The presented article analyzes information about the identity of a likely criminal and the motivation of his behavior when committing illegal logging of forest plantations. The author presents the authors’ points of view on this issue, considers various classifications of the criminal’s personality category, and reveals the most important ones. Based on the data obtained during the investigation of criminal cases, the author presented a classification depending on the place of sale (territory) of wood: for further sale within the region, to other regions and outside the Russian Federation. The role of each participant within the criminal group is indicated, depending on the functions performed (loggers, customers, persons carrying out the transportation of forests, organizers). The levels of studying the personality of a probable criminal (generalized, group, individual) are revealed. The classification of the personality of a probable criminal into persons committing illegal logging for domestic and mercenary purposes is presented, and the differences between them are revealed. The author proposes a classification of persons who have committed illegal logging, depending on the illegal act, into two groups: the first — committing a crime with subsequent implementation, the second — for use for personal purposes. The article examines the role of officials in the commission of crimes of this category. The analysis of the factors contributing to the commission of crimes related to illegal logging of flattering plantings is carried out. The characteristics of criminals who commit crimes of this category are given, depending on the presence of a criminal record, employment, gender, age, etc. The role and importance of the investigator’s (inquirer’s) knowledge about the content of the forensic characteristics of information about the identity of a likely criminal who committed illegal logging for effective crime prevention in the field of forest relations is noted.

1 citations

ReportDOI
01 Jan 2022
TL;DR: In this article , NIST would like to acknowledge the significant contributions of the Identity, Credential, and Access Management Subcommittee (ICAMSC) and the Smart Card Interagency Advisory Board (IAB) for providing valuable contributions to the development of technical frameworks on which this Standard is based.
Abstract: Acknowledgements NIST would like to acknowledge the significant contributions of the Identity, Credential, and Access Management Subcommittee (ICAMSC) and the Smart Card Interagency Advisory Board (IAB) for providing valuable contributions to the development of technical frameworks on which this Standard is based. Special thanks to those who have participated in the business requirements meeting and provided valuable comments in shaping this Standard.

1 citations

Journal ArticleDOI
TL;DR: The Payment Card Industry Data Security Standard has advocated a way for merchants and banks to crack identity theft as discussed by the authors, and the answer is simple - keep the safe empty, says Andrew Valentine.

1 citations

Journal ArticleDOI
29 Feb 2012
TL;DR: This work proposes the intelligent mobile agents instead of human agents to perform the Job search using fuzzy preferences which is been published elsewhere and application operations incorporating the use of agents with a trust authority to establish employer trust and validate applicant identity and accuracy.
Abstract: The Job selection process in today’s globally competitive economy can be a daunting task for prospective employees no matter their experience level. Although many years of research has been devoted to job search and application resulting in good integration with information technology including the internet and intelligent agent-based architectures, there are still many areas that need to be enhanced. Two such areas include the quality of jobs associated with applicants in the job search by profiling the needs of employers against the needs of prospective employees and the security and verifications schemes integrated to reduce the instances of fraud and identity theft. The integration of mobile, intelligent agent, and cryptography technologies provide benefits such as improved accessibility wirelessly, intelligent dynamic profiling, and increased security. With this in mind we propose the intelligent mobile agents instead of human agents to perform the Job search using fuzzy preferences which is been published elsewhere and application operations incorporating the use of agents with a trust authority to establish employer trust and validate applicant identity and accuracy. Our proposed system incorporates design methodologies to use JADELEAP and Android to provide a robust, secure, user friendly solution.

1 citations

01 Jan 2012
TL;DR: This research work describes a middleware called Visual–based challenge response in which the computer presents questions ("challenge") that requires the user to provide a valid answers ("response") using a retrieval process that involves a stimulus or pattern of stimuli to facilitate remembering in order to be authenticated.
Abstract: Biometric authentication has been described to be reliable solution to the problem of identity determination by establishing the identity of a person based on “who he is", but permanent Identity theft has been considered an important issue since biometric samples are not secret and when a biometric feature is compromised, it cannot be changed. This research work describes a middleware called Visual–based challenge response in which the computer presents questions ("challenge") that requires the user to provide a valid answers ("response") using a retrieval process that involves a stimulus or pattern of stimuli to facilitate remembering in order to be authenticated since retrieval of information via Visual recognition is easier it becomes a valuable tool to access stored information, when it cannot otherwise be recalled. This research work conceived and formalized utilizes this visual–based challenge response to compliment this weakness of existing biometric systems (i.e. permanent Identity theft), thus providing security assurance in identity management having brought user- friendliness into place since the ultimate goal of this research work is to come up with a reliable biometrics system complement the Permanent Identity theft management.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112