scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal Article
TL;DR: This research highlights the need for medical practices to take action and have policies and procedures in place to prevent data breaches and protect both the patient and the practice from medical identity theft.
Abstract: Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

1 citations

Proceedings Article
23 May 2011
TL;DR: A research to verify the level of comprehension of digital security among two generations of students (freshmen and third year) and focuses on data security; fraud recognition; and identity theft.
Abstract: It becomes truth that students cannot imagine living without computers. Computers were present during major part of their life and during their whole education. Many of today's students are better typists then hand writer and they acquire information from the internet almost immediately. In their life Google and Wikipedia are primary source of information. Despite their apparent computer literacy and knowledge we still need to teach them digital competences. Their waste knowledge is just superficial and limited to the first few hits on Google. Sadly their stamina in the research activities is low. These students are aware of digital security because they hear about it everywhere; they will become teachers; and they will teach kids and teenagers how to behave in the internet. We conduct a research to verify the level of comprehension of digital security among two generations of students (freshmen and third year). In our research we focus on data security; fraud recognition; and identity theft. Students show great knowledge in the area of fraud recognition less knowledge in identity theft and great ignorance about data security. Detailed results of the research is presented in the article.

1 citations

Journal Article
TL;DR: In this paper, the authors highlight the importance of installing data protection tools to prevent the impact of cyber-crime on business and discuss the impact on management accountants, organizations that help identify, monitor, and classify data breaches created by cybercrime such as the Identity Theft Resource Center, and the anatomy of a cyberattack.
Abstract: The article highlights the importance of installing data protection tools to prevent the impact of cybercrime on business. Topics discussed include the impact of cybercrime on management accountants, organizations that help identify, monitor, and classify data breaches created by cybercrime such as the Identity Theft Resource Center, and the anatomy of a cyberattack. Information on steps to combat cybercrime, common threats to network security, and types of computer theft is also provided.

1 citations

Book ChapterDOI
24 Aug 2011
TL;DR: Geo-coding the vast amount of content currently on the web, along with providing reliable geo-location authentication services against the difficulties of spatial analysis and the inherent probabilistic estimate of current location-identification technology, is challenged.
Abstract: The Internet allows for near-total anonymity in online discussions and transactions; leading to challenges such as identity theft, spear phishing, cyber-bullying and lack of user-retailer trust for small online retailers. In an effort to restore prosperity, security and trust to our increasingly digitally interconnected society, it is important to tie some sense of the physical world in with the cyber world, e.g., creating a geo-coded Internet. However, geo-coding the vast amount of content currently on the web, along with providing reliable geo-location authentication services against the difficulties of spatial analysis and the inherent probabilistic estimate of current location-identification technology.

1 citations

Journal ArticleDOI
01 Jan 2017
TL;DR: In this article, the authors examine an emerging form of violent crime involving the internet: Social Media Victim Targeting Networks (SVTN) and discuss some of the expansion of victim targeting networks to popular Internet social networking sites using case examples.
Abstract: The world of cybercrime has transformed significantly over the past ten or twenty years Early concerns focused on the vulnerability of the financial industry, including the crimes of identity theft and hacking However, in recent years, cybercrime has evolved to include crimes of harassment, child pornography, rape, “cyberterrorism” and even murder This work examines an emerging form of violent crime involving the internet: Social Media Victim Targeting Networks (SVTN) The anonymity and limited available law enforcement on social media sites leaves predators with a large pool of vulnerable victims provide predators a new way to display and strengthen their criminological tendencies The authors will discuss some of the expansion of victim targeting networks to popular Internet social networking sites using case examples that help develop concepts to better understand, prevent, and investigate the behavior Based upon this, recommendations for future research related to this very serious and challenging behavior are noted

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112