scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
08 Dec 2016
TL;DR: The authors compared post-victimization changes in Internet activities among reimbursed victims of identity fraud and non-reimbursed victims, as well as non-victims, and found no differences in Internet activity change between the distinguished groups.
Abstract: Due to digitalization of modern societies, identity fraud is becoming a serious problem. Until recently, Dutch victims of unauthorized cash withdrawals from their bank accounts were reimbursed by their banks in most instances. Because most victims were not confronted with financial damages, this generous reimbursement policy may have unintendedly stimulated moral hazard among victims, due to a lack of incentives to change risky behavior and avoid future victimization. This chapter therefore compares post-victimization changes in Internet activities among reimbursed victims of identity fraud and non-reimbursed victims, as well as non-victims. For this purpose, large-scale, representative longitudinal data were used from the Dutch LISS-panel. Overall, we found no differences in Internet activity change between the distinguished groups. Significant differences were found for shifts in PC security measures, with steepest increases in protection for reimbursed victims. Overall, this points to the absence of moral hazard in this specific case.

1 citations

Journal ArticleDOI
01 Oct 2017
TL;DR: Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers, however, according to Identity Theft ...
Abstract: Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft ...

1 citations

Proceedings Article
01 Jan 2015
TL;DR: Analysis of user generated content posted by users on Facebook indicates that Self presentation and relationship building are the major user benefits eventuating from basic user information, whereas loss of privacy, security risk, and identity theft are theMajor user costs.
Abstract: The purpose of this study is to examine the implications (user benefits and costs) of user generated content posted by users on Facebook to individual users. Although motivations to use social networking sites are widely researched and published, studies on implications of information on social networking sites is sparse. Hence, this study addresses this gap by an interpretive analysis of user generated content posted by users on Facebook. Content posted by a selected number of users on Facebook is classified based on an information classification framework. Implications eventuating from the classified user generated content to individual users are established using thematic analysis. Findings indicate that Self presentation and relationship building are the major user benefits eventuating from basic user information, whereas loss of privacy, security risk, and identity theft are the major user costs. Users entail professional career development by posting information on user's education. Employment details of user entail benefits of professional career development and impression management. On the other hand, posting textual communication entails benefits of impression management, enjoyment, and relationship building, whereas costs include social conflict and emotional distress. Findings of this study add to the theory on implications of user generated content posted by users on Facebook.

1 citations

Proceedings ArticleDOI
13 Jun 2006
TL;DR: The Data Protection Act applies when there is processing of personal data by a data controller established in the UK in the context of that establishment or using equipment in UK as discussed by the authors, which stands in the way of a surveillance society where government and commercial bodies know everything about everybody.
Abstract: Data protection law stands in the way of a surveillance society where government and commercial bodies know everything about everybody. It helps prevent the growing problems of identity theft and the buying and selling of personal information. Data protection act applies when there is processing of personal data by a data controller established in the UK in the context of that establishment or using equipment in the UK.

1 citations

Journal ArticleDOI
TL;DR: A novel CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) based mechanism is put forward, which can protect the crucial information even if the account is hacked.
Abstract: Identity theft, privacy invasion, loss of key information is the major reasons for which E-mail security is breached these days. Hence, it is very essential that effective security prevention measures are taken. This paper, proposes many such hacking prevention measures with approaches to recover a hacked account. It also puts forward a novel CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) based mechanism, which can protect the crucial information even if the account is hacked.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112