scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article , the authors examined the challenges of preventing internal identity theft related crimes (IIDTRC) in the UK retail sector using Nvivo aided thematic analysis and interpretivism underpinned by Role-Based Framework (RBF).
Abstract: Abstract This paper aims to examine the challenges of preventing internal identity theft related crimes (IIDTRC) in the UK retail sector. Using an in-depth multiple case studies of a selected number of cross-functional management teams in the UK retail companies, management roles were analysed. We used semi-structured interview as a qualitative data collection technique and used Nvivo aided thematic analysis and interpretivism underpinned by Role-Based Framework (RBF) for analysis. Our findings revealed that vagueness of roles and lack of clarity in sharing data security responsibilities are the major challenges of preventing IIDTRC in UK retail companies. We suggest an application of RBF which provides a conceptual analysis for cross-functional management team to address the challenges of preventing IIDTRC. RBF enables clarity of shared roles where both information security and crimes prevention teams work in unison is required to prevent IIDTRC to maximise internal data security. Contributions for policymakers are offered in this paper.

1 citations

Proceedings ArticleDOI
11 Nov 2022
TL;DR: In this paper , a fresh, in-depth model of phishing that takes into account attack stages, different types of attackers, threats, targets, attack channels, and attack tactics is presented.
Abstract: A particularly successful type of cybercrime that allows criminals to trick people and steal crucial data is phishing. Phishing is currently one of the most common online scams. Phishing assaults may result in significant losses for sensitive information, identity theft, businesses, and the government are just some of their victims. Phishing websites are widespread entrance points for social engineering attacks carried out online, including countless website frauds. When such attacks occur, by copying the acts of reputable websites, the attacker(s) create website pages and send the URL(s) to the targeted recipients via social networking, texting, or spam messaging. However, the number of victims is rising exponentially as a result of inadequate security technologies. Studies have categorized phishing attacks by basic phishing methods and defenses, ignoring the significance of the end-to-end phishing lifecycle. This article offers a fresh, in-depth model of phishing that takes into account attack stages, different types of attackers, threats, targets, attack channels, and attack tactics. The proposed anatomy will also make it easier for readers to understand how long a phishing effort lasts, increasing knowledge of these attacks and the techniques used as well as aiding in the creation of a comprehensive anti-phishing system. Due to the anonymity and lack of regulations on the Internet, phishing attacks are more likely to be successful. The effectiveness of the phishing detection system is limited, according to existing research. To protect consumers from cyberattacks, a clever strategy is needed. A detection method used in this work is based on artificial intelligence-based LSTM which has produced satisfactory performance and accuracy.

1 citations

01 Jan 2007
TL;DR: In this paper, the authors discuss the applicability of voice biometrics in other areas of the financial services industry, such as the UK wealth management industry, where they have been used to provide differentiated service to their customers.
Abstract: While the added security of voice biometrics has made it a natural fit for the banking industry with current fears around fraud and identity theft, little coverage has been given to its applicability in other areas of the financial services industry Several UK wealth management providers are considering the use of voice biometrics as a means of providing differentiated service to their customers While the enhanced security of voice biometrics is clear, what is often ignored is the extra convenience the technology can provide to callers For example, when Australian Health Management offer their members the option of being able to verify their identity just by speaking their membership number, over 95 per cent of them accept This is perhaps hardly surprising when the alternative is the standard process of having to provide 4 pieces of personal information (member number, name, address and date of birth) to a customer service agent With the highly competitive nature of the wealth management industry, providing a high level of customer service is key in ensuring that Independent Financial Advisors (IFAs) recommend a company's products to their clients While hardly an issue for a policy holder calling every three years or less, questions asked in the contact centre to establish if the advisor is authorised on the policy can become frustrating for the IFA if they contact the organisation many times a week on behalf of the multiple clients they represent With the introduction of voice biometrics, advisors are able to establish and confirm their identity just by speaking a single phrase such as a unique number or their company name The proposition is clear: the advisor wins by gaining a level of service akin to the fast track now being offered for those who enrol a biometric at airport immigration; and the contact centre wins by saving time (up to 40 seconds) spent verifying the caller's identity Identity-related fraud is one of the fastest growing areas of crime globally and it is of increasing concern to banking and finance sectors The Australian Federal Police estimate that identity fraud costs businesses (and ultimately consumers) over $2 billion per year Identity fraud is difficult to detect and has a significant emotional impact on its victims, comparable to that of violent crime Most victims only find out about fraud through their own investigations and, on average spend around 600 hours resolving the issue

1 citations

Dissertation
01 Jan 2006
TL;DR: An active information policy is proposed in which all organizations must actively inform individuals when that particular individual's personal information is created, edited, transferred, or received.
Abstract: Identity theft is the serious problem in North America Criminals assume another person's identity in order to fraudulently perform actions or crimes in another person's name These actions range from opening chequing accounts to renting apartments Identity thieves can even perform serious crimes and impersonate the victim when arrested This project proposes an active information policy in which all organizations must actively inform individuals when that particular individual's personal information is created, edited, transferred, or received To cope with the influx of information, each individual will have an Information Agent whose responsibility is to protect the privacy of said individual An Information Agent will be a professional who provides information services that may be impossible for the general public to perform Information Agents shall be responsible for maintaining and cataloguing information as it is received, ensuring that the information is accurate, and vigilantly detecting anomalies which would indicate criminal activity

1 citations

09 Mar 2018
TL;DR: In this article, a review of the literature revealed that awareness level is very variable, making reports from one publication to the other conflicting, making it difficult for people to quit Facebook.
Abstract: Facebook has become more powerful now more than ever. As it expands its network, more and more information becomes available for them to use for various purposes for an improved experience of a Facebook user. The social capital to which people have invested in the social media platform made it more difficult for people to quit. The review of the literature revealed that awareness level is very variable, making reports from one publication to the other conflicting. It is however very evident that even if people who are aware of the risks involved still patronize Facebook. Some may have tinkered with their privacy setting to improve privacy control but their actions/activities on the net make that extra precaution useless. As the internet become more of a necessity than choice, more and more information is readily available for data mining through Facebook or other platforms capable of phishing valuable information such as passwords. The adult population who has more at stake have taken extra precaution compared to the young population who has the tendency to self-disclose.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112