scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
01 Jan 2009
TL;DR: Identity theft occurs when a thief steals personal identification and uses that information as if it was his or her own The information can be used to open credit card accounts, rob bank accounts, make withdrawals from ATMs and obtain employment opportunities or make down payments/deposits on a car or housing Fraudulent use of credit cards is not limited to the loss or theft of the actual credit card as mentioned in this paper.
Abstract: Identity theft occurs when a thief steals your personal identification and uses that information as if it was his or her own The information can be used to open credit card accounts, rob bank accounts, make withdrawals from ATMs and obtain employment opportunities or make down payments/deposits on a car or housing Fraudulent use of credit cards is not limited to the loss or theft of the actual credit card Identity theft can happen when your purse or wallet is stolen or lost It also can happen when you give your credit card information out over the telephone or Internet, when someone gets numbers off papers they find in the trash, or overhear numbers given in a telephone conversation and by watching you key in account or PIN numbers in check-out lines or at ATMs A capable criminal needs to know only your credit numbers to fraudulently make numerous charges, including cash withdrawals, against your accounts The following crime prevention tips will help you guard against the illegal use of credit cards

1 citations

Journal ArticleDOI
TL;DR: The analysis of the proposed proposed approaches based on IBE and PBE using AVISPA back-ends indicated that both of them are safe and suitable and scalable enough to secure the anonymous communication in cloud services environment comparing to the state of the art solutions.
Abstract: Nowadays, we are moving quickly to a new Identity concept due to the cloud computing paradigm called Identity as a Service (IDaaS). However, the one Identity adoption for all services access does not bring only good news. Hackers are increasing more and more their attacks based Identity theft. This means that the security of Identity itself becomes a threat vector. Therefore, this paper focuses on the concept of using Virtual Identity ( $$V_{ID}$$ ) under the framework of IDaaS. This IDaaS is well known for Software as a Service (SaaS) cloud deployment model authentication. It can be delivered by a a third party Identity providers for the whole identity management approach including the creation process, the authentication mechanism and the identity privacy assurance level. Moreover, the proposed $$V_{ID}$$ mechanism for IDaaS framework is considered as a new realization for anonymous Single Sign On (SSO) in this distributed cloud services environments. Actually, we proposed the $$V_{ID}$$ creation framework using Elliptic Curve Cryptography (ECC). After we designed the two approaches either Identity Based Encryption (IBE) or Pseudonym Based Encryption (PBE), we implemented them by MIRACL security library. In order to judge on our solutions security measure, we used the (AVISPA) tool to assess the IBE and PBE protocols vulnerabilities. AVISPA: Automated Validation of Internet Security Protocols and Applications uses a group of applications to build and analyze the formal models of many known or designed security protocols. Through its language structure, we built our communication protocols in a descriptive way. The analysis of our $$V_{ID}$$ proposed approaches based on IBE and PBE using AVISPA back-ends indicated that both of them are safe (i.e. no attacks found). So, the $$V_{ID}$$ proposed approaches based on IBE and PBE are suitable and scalable enough to secure the anonymous communication in cloud services environment comparing to the state of the art solutions.

1 citations

Book ChapterDOI
01 Feb 2010
TL;DR: The Handbook on Crime as discussed by the authors is a comprehensive edited volume that contains analysis and explanation of the nature, extent, patterns and causes of over 40 different forms of crime, in each case drawing attention to key contemporary debates and social and criminal justice responses to them It also challenges many popular and official conceptions of crime.
Abstract: Book summary: the Handbook on Crime is a comprehensive edited volume that contains analysis and explanation of the nature, extent, patterns and causes of over 40 different forms of crime, in each case drawing attention to key contemporary debates and social and criminal justice responses to them It also challenges many popular and official conceptions of crime This book is one of the few criminological texts that takes as its starting point a range of specific types of criminal activity It addresses not only 'conventional' offences such as shoplifting,burglary, robbery, and vehicle crime, but many other forms of criminal behaviour - often an amalgamation of different legal offences - which attract contemporary media, public and policy concern These include crimes committed not only by individuals, but by organised criminal groups, corporations and governments There are chapters on, for example, gang violence, hate crime, elder abuse, animal abuse,cyber crime, identity theft, money-laundering, eco crimes, drug trafficking, human trafficking, genocide, and global terrorism Many of these topics receive surprisingly little attention in the criminological literature The Handbook on Crime will be a unique text of lasting value to students, researchers,academics, practitioners, policy makers, journalists and all others involved in understanding and preventing criminal behaviour

1 citations

Proceedings ArticleDOI
19 May 2022
TL;DR: This paper highlights the weakest links of cyber security, the user’s mistakes when choosing their passwords, and different ways of password security in both personal, and business use.
Abstract: Passwords are used consistently in our everyday lives. Whether it’s from logging in to our smart phones, our computers, accessing our bank, etc. We need to use passwords to protect everything important to us, and to keep our information safe. If our passwords are known by a malicious party, we could lose not only access to our personal data, but potentially lose everything through identity theft. While it’s important to change our passwords occasionally, could requiring changes too frequently actually make our passwords worse. This paper highlights the weakest links of cyber security, the user’s mistakes when choosing their passwords. Additionally, this paper provides different ways of password security in both personal, and business use.

1 citations

Book ChapterDOI
29 Aug 2011
TL;DR: This study developed a technique to strengthen weak passwords that integrates UserIDs, weaker password, salts, challenge responses and random variables to derive a stronger password for authentication.
Abstract: The internet has accelerated access to and sharing of electronic medical records (EMR). EMRs are meant to be confidential and only accessed or shared with authorization from the owner. A combination of UserID and a Password is the most widely used mechanism to assure user authentication and access to EMRs. However, these mechanisms have been greatly compromised by guessing and hacking of weak passwords leading to increased cases of medical identity theft, cyber terrorism and information systems attacks. This has resulted in false financial claims, debts due to unauthorized disclosure of the private and confidential EMRs leading to huge losses for the victims. This study developed a technique to strengthen weak passwords that integrates UserIDs, weaker password, salts, challenge responses and random variables to derive a stronger password for authentication. A system prototype to test the technique was built, tested and validated by users.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112