Topic
Identity theft
About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.
Papers published on a yearly basis
Papers
More filters
••
08 Dec 2016
TL;DR: The authors compared post-victimization changes in Internet activities among reimbursed victims of identity fraud and non-reimbursed victims, as well as non-victims, and found no differences in Internet activity change between the distinguished groups.
Abstract: Due to digitalization of modern societies, identity fraud is becoming a serious problem. Until recently, Dutch victims of unauthorized cash withdrawals from their bank accounts were reimbursed by their banks in most instances. Because most victims were not confronted with financial damages, this generous reimbursement policy may have unintendedly stimulated moral hazard among victims, due to a lack of incentives to change risky behavior and avoid future victimization. This chapter therefore compares post-victimization changes in Internet activities among reimbursed victims of identity fraud and non-reimbursed victims, as well as non-victims. For this purpose, large-scale, representative longitudinal data were used from the Dutch LISS-panel. Overall, we found no differences in Internet activity change between the distinguished groups. Significant differences were found for shifts in PC security measures, with steepest increases in protection for reimbursed victims. Overall, this points to the absence of moral hazard in this specific case.
1 citations
••
01 Oct 2017
TL;DR: Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers, however, according to Identity Theft ...
Abstract: Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft ...
1 citations
•
01 Jan 2015TL;DR: Analysis of user generated content posted by users on Facebook indicates that Self presentation and relationship building are the major user benefits eventuating from basic user information, whereas loss of privacy, security risk, and identity theft are theMajor user costs.
Abstract: The purpose of this study is to examine the implications (user benefits and costs) of user generated content posted by users on Facebook to individual users. Although motivations to use social networking sites are widely researched and published, studies on implications of information on social networking sites is sparse. Hence, this study addresses this gap by an interpretive analysis of user generated content posted by users on Facebook. Content posted by a selected number of users on Facebook is classified based on an information classification framework. Implications eventuating from the classified user generated content to individual users are established using thematic analysis. Findings indicate that Self presentation and relationship building are the major user benefits eventuating from basic user information, whereas loss of privacy, security risk, and identity theft are the major user costs. Users entail professional career development by posting information on user's education. Employment details of user entail benefits of professional career development and impression management. On the other hand, posting textual communication entails benefits of impression management, enjoyment, and relationship building, whereas costs include social conflict and emotional distress. Findings of this study add to the theory on implications of user generated content posted by users on Facebook.
1 citations
••
13 Jun 2006
TL;DR: The Data Protection Act applies when there is processing of personal data by a data controller established in the UK in the context of that establishment or using equipment in UK as discussed by the authors, which stands in the way of a surveillance society where government and commercial bodies know everything about everybody.
Abstract: Data protection law stands in the way of a surveillance society where government and commercial bodies know everything about everybody. It helps prevent the growing problems of identity theft and the buying and selling of personal information. Data protection act applies when there is processing of personal data by a data controller established in the UK in the context of that establishment or using equipment in the UK.
1 citations
••
TL;DR: A novel CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) based mechanism is put forward, which can protect the crucial information even if the account is hacked.
Abstract: Identity theft, privacy invasion, loss of key information is the major reasons for which E-mail security is breached these days. Hence, it is very essential that effective security prevention measures are taken. This paper, proposes many such hacking prevention measures with approaches to recover a hacked account. It also puts forward a novel CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) based mechanism, which can protect the crucial information even if the account is hacked.
1 citations