scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2018
TL;DR: This paper is an extension of the previously generated OHM model, and enhances the parameters and flow of the entire OHM system, to prevent online frauds.
Abstract: With the advent of technology, the business process, worldwide, has shifted from a slow—person-to-person physical interaction to a better and faster service platform—the Internet. The biggest advantage of this platform is that it allows the people to undergo their business transactions without meeting with the other party/parties and still making the benefits out of the agreement between them. Though this approach has a major edge over the conventional methods, still has many drawbacks to be pondered upon. The Internet has also emerged as a platform to commit crimes at a very high rate. Frauds committed online has put a question on this very approach of revolutionized business since no proposed model yet has given a sound and complete way to handle these issues. This paper is an extension of the previously generated OHM model, and enhances the parameters and flow of the entire OHM system, to prevent online frauds. The key frauds where Enhanced Online Hybrid Model (EOHM) can be used would be auction frauds, no-delivery frauds, and identity theft frauds.

1 citations

Posted Content
TL;DR: The gaps in pretexting laws are discussed and the resulting threat to consumer privacy is discussed.
Abstract: Telephone service providers maintain records of telephone numbers called, and the time and date of each call, which the FCC calls Consumer Proprietary Network Information (CPNI). Pretexting is the impersonation of an individual for the purpose of obtaining personal records such as CPNI. Federal law expressly prohibits pretexting for financial data (bank account and credit card numbers) under the Gramm-Leach-Bliley Act, but the law does not cover telephone records, which are protected by a patchwork of state and federal laws governing identity theft, access to personal information in computer databases, and deceptive practices generally. This essay discusses the gaps in pretexting laws and the resulting threat to consumer privacy.

1 citations

Posted ContentDOI
TL;DR: In this paper , the authors look into the current legal landscape and legislation currently in progress around the use of video analytics, specifically in the retail store setting, and look into how to adopt a wait-and-see approach or potentially incur costly legal expenses and risk damage to their brand.
Abstract: Video analytics is the practice of combining digital video data with machine learning models to infer various characteristics from that video. This capability has been used for years to detect objects, movement, and the number of customers in physical retail stores, but more complex machine learning models combined with more powerful computing power has unlocked new levels of possibility. Researchers claim it is now possible to infer a whole host of characteristics about an individual using video analytics, such as specific age, ethnicity, health status and emotional state. Moreover, an individuals visual identity can be augmented with information from other data providers to build out a detailed profile, all with the individual unknowingly contributing their physical presence in front of a retail store camera. Some retailers have begun to experiment with this new technology as a way to better know their customers. However, those same early adopters are caught in an evolving legal landscape around privacy and data ownership. This research looks into the current legal landscape and legislation currently in progress around the use of video analytics, specifically in the retail store setting. Because the ethical and legal norms around individualized video analytics are still heavily in flux, retailers are urged to adopt a wait and see approach or potentially incur costly legal expenses and risk damage to their brand.

1 citations

Book ChapterDOI
29 Mar 2019
TL;DR: Identity theft is when a criminal assumes someone else's identity and the goal is usually to commit fraud and the effects are very personal as discussed by the authors, and the process may take years and a significant financial investment on the part of the victim.
Abstract: Identity theft is when a criminal assumes someone else’s identity. The goal is usually to commit fraud and the effects are very personal. Identity theft is potentially more devastating than other instances of fraud, such as having your credit card stolen. With true identity theft, the thief may open new accounts in your name, withdraw funds from existing accounts, or even change the address on your accounts so that you are unable to see fake charges on your statement. To correct identity theft, the process may take years and a significant financial investment on the part of the victim.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112