scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
26 Feb 2010
TL;DR: A tamper-proof secure card comprises biometric data of an individual for identifying or confirming authority of the individual as discussed by the authors, which can be used to prevent duplication or alteration of a credit card and confirm identity of a individual and prevent identity theft or misuse.
Abstract: PROBLEM TO BE SOLVED: To prevent duplication or alteration of a credit card and confirm identity of an individual and prevent identity theft or misuse. SOLUTION: A tamper-proof secure card comprises biometric data of an individual for identifying or confirming authority of the individual. Prior to issuing the secure card a cardholder's biometric data is stored in a transparent biometric data section of the secure card. Also, a unique card number is created using a cardholder's biometric data and stored in the card. When the secure card is used and the cardholder inputs biometric data, the input biometric data is then compared to the biometric data stored in the card. If the input biometric data matches the stored biometric data, the identity of the cardholder is confirmed. The unique card number can be accessed. Without confirmation, the unique card number cannot be accessed. COPYRIGHT: (C)2011,JPO&INPIT

1 citations

Proceedings ArticleDOI
10 Dec 2015
TL;DR: The work done here focuses on developing an effective anti-tabnabbing extension for the Google Chrome browser to protect Internet users from been victims as well as raise their awareness.
Abstract: Electronic transactions rank the top on our daily transactions. Internet became invaluable for government, business, and personal use. This occurred in synchronization with the great increase in online attacks, particularly the development of newest forms from known attacks such as Tabnabbing. Thus, users' confidentiality and personal information must be protected using information security. Tabnabbing is a new form of phishing. The attacker needs nothing to steal credentials except users' preoccupation with other work and exploitation of human memory weakness. The impact of this malicious attempt begins with identity theft and ends with financial loss. That has encouraged some security specialists and researchers to tackle tabnabbing attack, but their studies are still in their infancy and not sufficient. The work done here focuses on developing an effective anti-tabnabbing extension for the Google Chrome browser to protect Internet users from been victims as well as raise their awareness. The system developed has a novel significance due to its effectiveness in detecting a tabnabbing attack and the combination of two famous approaches used to combat online attacks. The success of the system was examined by performance measurements such as confusion matrix and ROC. The system produces promising results.

1 citations

Book ChapterDOI
21 Sep 2016
TL;DR: A biometric based authentication system consisting of encryption and decryption processes is developed and an attacker-centric threat mode is created to show the practicality of the proposed scheme.
Abstract: This paper investigates the identity theft and how to effectively use the biometric technology in order to prevent it from happening. Over the past few years, identity theft has become one of the most serious financial threats to corporations in the United States. Identity theft is when a thief steals sensitive information in order to engage in large financial transactions. When a thief successfully steals an identity, he or she may take out large amounts of loans and make purchases in the victim’s name. Identity theft allows thieves to pose as the victim so that all of the thief’s actions will be projected as actions from the victims. Thieves can damage corporations by compromising corporate credit cards as well as file documents to change the legal address of the victim’s company. Throughout the past decade, corporations have been using variations of biometric technology to prevent identity theft. This paper presents a new scheme for corporate identity theft prevention using biometric technology. Specifically, we develop a biometric based authentication system consisting of encryption and decryption processes. To show the practicality of our proposed scheme, an attacker-centric threat mode is created.

1 citations

Book ChapterDOI
01 Jan 2020
TL;DR: The authors examines Native American identity theft and the process of cultural appropriation that underpins it, and explores the ways in which the blood quantum has been used to create a national narrative which implies the eventual disappearance of Native Americans; and how that idea has helped to shape Trump's approach to Warren.
Abstract: Elizabeth Warren has been a regular target for Trump, particularly her problematic Native American identity. Trump, an adherent to the idea of the ‘vanishing Indian’, has relentlessly mocked her claims to a Native American identity, delegitimising it by emphasising the concept of Indigenous racial purity. To complicate matters, Warren’s claims to a Native American identity have been rejected by many Native Americans. Based on vague family histories rather than cultural experience or a shared identity, Warren’s struggle with her own ethno-identity cast a light on an important phenomenon—Native American identity theft. This chapter examines Native American identity theft and the process of cultural appropriation that underpins it. It explores the ways in which the blood quantum has been used to create a national narrative which implies the eventual disappearance of Native Americans; and how that idea has helped to shape Trump’s approach to Warren. It also examines the ways in which imagery of Native Americans has evolved over the course of the twentieth century, helping to create an aspirational image that has proven itself attractive to many non-Indians who have gone on to claim, often without any basis in reality, an Indigenous identity of their own.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112