scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
10 Jul 2018
TL;DR: In this paper, a mobile social network user identity falseness identification method based on behavioral modeling to judge user legitimacy by judging consistence of user behaviors is proposed, and the user behaviors are modeled in the three following dimensions with mixed kernel density estimation, LDA text modeling and other methods: (1) geographical location, (2) user-generated text and (3) social relationship, blocking rate, interrupt rate and precision ratio of detection are calculated by simulating a user identity theft test, system performance is evaluated on the basis, problems of the traditional identification system are solved, and
Abstract: The invention provides a mobile social network user identity falseness identification method based on behavioral modeling to judge user legitimacy by judging consistence of user behaviors. The mobilesocial network user identity falseness identification method based on behavioral modeling benefits from rich information data provided by the current mobile social network, and mass user social data including position, moving mode, social relationship, user-generated content, shopping records and the like is acquired. Multivariate data is taken as a study object, and features of the information are extracted. The user behaviors are modeled in the three following dimensions with mixed kernel density estimation, LDA text modeling and other methods: (1) geographical location, (2) user-generated text and (3) social relationship, blocking rate, interrupt rate and precision ratio of detection are calculated by simulating a user identity theft test, system performance is evaluated on the basis, problems of the traditional identification system are solved, and a new idea and a new analytical method are provided for solving security problems in the information age.

1 citations

01 Jan 2015
TL;DR: Dynamically generating the Captcha image by the system is one of the major advantage of the system and can be used as the password.
Abstract: Due to rapid growth of internet, the secure transmission and protection of secret information has become an important issue.Various online attacks has been increased and among them the most popular attack is phishing.Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to the original ones are being hosted to achieve this Cryptography is the study of mathematical techniques related aspects of information security such as confidentiality, data security, authentication. The use of visual cryptography technique((2,2) VCS scheme) is explored to preserve the privacy of image captcha by degenerating the original Part of the image share will be stored in the servers such that the original image captcha can be revealed only when both(client,server) of the shares are simultaneously available.The individual share images do not reveal the identity of the original image captcha. Once the original image captcha is revealed after merging different shares, which can be used as the password. Dynamically generating the Captcha image by the system is one of the major advantage of the system..

1 citations

01 Jan 2015
TL;DR: This paper is presenting a new authentication scheme for secure OTP distribution in phishing website detection through VC and QR codes.
Abstract: Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Here an image based (QR codes) authentication using Visual Cryptography (VC) is used. The use of Visual cryptography is explored to convert the QR code into two shares and both these shares can then be transmitted separately. One Time Passwords (OTP) is passwords which are valid only for a session to validate the user within a specified amount of time. In this paper we are presenting a new authentication scheme for secure OTP distribution in phishing website detection through VC and QR codes.

1 citations

Proceedings ArticleDOI
01 Oct 2016
TL;DR: Personally Identifiable Information (PII) includes any information that can be used to distinguish or trace an individual’s identity such as name, social security number, date and place of birth, mother's maiden name, or biometric records.
Abstract: Personally Identifiable Information (PII) includes any information that can be used to distinguish or trace an individual’s identity such as name, social security number, date and place of birth, mother’s maiden name, or biometric records. It also includes other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information. PII is often the target of attacks, and loss of PII could result in identity theft. According to the U.S. Department of Justice, the average number of U.S. identity fraud victims annually is 11,571,900 [1]. The total financial loss attributed to identity theft in 2013 was $21 billion dollars, compared to $13.2 billion total loss in 2010.

1 citations

Journal ArticleDOI
30 Dec 2018
TL;DR: A reflection that links gender violence in digital environments, mass surveillance, discussions about privacy and the right to privacy on the internet, and current legislation to understand how they affect the human rights of women in cyberspace.
Abstract: In this paper, we present a reflection that links gender violence in digital environments, mass surveillance, discussions about privacy and the right to privacy on the internet. We analyze how the Internet can be the scene of two types of violence: one, located at the level of interactions (doxing, harassment, extortion and threats, identity theft, alteration and publication of photos and videos without consent, among others). The other, more invisible, is implicit in the architecture of the network, because, by promoting a systematic and gigantic system of tracking and analysis of personal data to feed the Internet business model, it has established a potential monitoring system that can affect the rights of women, via digital traces. To support this, we will examine the various notions of surveillance and privacy (Bruno, 2013; Siri, 2015; Sparrow, 2014) and current legislation in order to understand how they affect the human rights of women in cyberspace. Keyword: gender violence, surveillance and privacy, Internet.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112