scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
01 Jan 2016
TL;DR: In this article, the authors present an overview of the background of the study, including the authors' background, background of their work, and a list of columns, columns, and columns.
Abstract: ........................................................................................................................... i DECLARATION .....................................................................................................................ii ACKNOWLEDGMENT .......................................................................................................... iii LIST OF ACRONYMS ........................................................................................................... ix LIST OF FIGURES ............................................................................................................... xi LIST OF TABLES ................................................................................................................ xiii CHAPTER ONE: BACKGROUND OF THE STUDY .............................................................. 1 1.

1 citations

Journal Article
TL;DR: In this paper, the government's proposal, which is outlined in detail below, is a controversial one, as the filter is mandatory for all web users and only filters out some content that is currently prohibited under legislation.
Abstract: There would be few who would disagree with this statement from Senator Stephen Conroy, who became Minister for Broadband, Communications and the Digital Economy after Labor won the November 2007 federal election. Yet a fierce debate rages in Australia over the best way to tackle the problem of harm, both real and potential, from internet use. Leave the 'protection' of children to the supervision of parents and teachers? Make adoption of content filters voluntary? Use home-based filters or those at the internet service provider (ISP) level? Invest more in the policing of illegal activities (such as child pornography and identity theft)? Increase education programs for children, parents and teachers about online safety? A combination of these things? Nothing at all? The government's proposal, which is outlined in detail below, is a controversial one. Rather than filtering all prohibited content for those homes with children (the plan in 2007), the filter is mandatory for all web users and only filters out some content that is currently prohibited under legislation. Either way, 2010 was meant to be the year of action on internet filtering. However, with a federal election now called for August, the government has announced that nothing will be done on the issue until 2011.

1 citations

Journal ArticleDOI
TL;DR: In this paper, the authors discuss the risk of identity theft in personal and financial information and the standard of care for providing effective cyber security for consumer information in the context of online banking.
Abstract: The convenience of conducting personal business in the comfort of one’s home attracts millions of individuals to shop, pay bills, and bank online. In the process, sensitive personal and financial information is disclosed and the exchange of this information creates a risk of identity theft. Providing effective cyber security is an issue with significant implications for companies. Failure to provide adequate security for consumer information may subject a company to legal action by the Federal Trade Commission (FTC). Information vulnerability, recent security failures and the standard of care are discussed.

1 citations

Journal ArticleDOI
TL;DR: The Arizona Revised Statutes section 44-7501 as discussed by the authors was proposed to prevent data security breaches and compensate consumers for the harm caused by the breaches and the subsequent identity theft, with mixed results.
Abstract: Identity theft is a growing problem because of the increased electronic storage of personal information. Confidential personal information is available to anyone with the desire and skill to hack into a computer system. In addition, businesses routinely allow employees to maintain customers' personal information on laptops, compromising the stored information when the laptops are stolen or misplaced. When thieves obtain personal information they usually resell it, and the buyers use the information to assume a person's identity for pecuniary gain. The effects of identity theft are serious. In addition to financial harm, identity theft can impair a victim's credit history. Data security breaches also impose costs on businesses, including replacement of credit cards, lost customers, declining consumer confidence in electronic transactions, damage to reputation, and even a drop in stock price. Moreover, there is cost to all of society because people concerned about identity theft will avoid activities that require the disclosure of personal information; for example, internet banking and registering to vote. The law has taken different approaches, with mixed results, to prevent data security breaches and compensate consumers for the harm caused by the breaches and the subsequent identity theft. This Comment focuses on the new Arizona data security-breach law, Arizona Revised Statutes section 44-7501, and discusses its shortcomings in curbing identity theft and protecting consumers. Part II defines and discusses the identity theft problem in Arizona. Part III argues that a strong data security-breach law is necessary because criminal and civil remedies have failed to curb identity theft or to compensate consumers. Part IV introduces section 44-7501, discusses its shortcomings in protecting consumers, and presents recommendations to strengthen the Arizona law.

1 citations

Journal ArticleDOI
TL;DR: In this paper, a three-phase technique that controls a synchronized queue among connected sensors and keeps their identity hidden from outsiders is proposed to preserve the linearity of time required to manage the protection of the home network.
Abstract: Smart home systems are designed as platforms for connecting sensors, home appliances, and devices to exchange data and, ultimately, to provide useful services to home residents. However, such systems are vulnerable to Cybersecurity attacks that can affect the reliability and integrity of the delivered services. Sensors, planted at smart homes or equipped with smart appliances, are highly exposed to identity theft. Intruders can recognize through the understanding of the exchanged data, their locations, or knowing their associated services. Such information might make the home resident vulnerable to life attacks. Therefore, protecting sensors identities in smart home systems is of high interest in this domain. This paper introduces a novel technique that protects sensors’ identity from being recognized through cordless communication environments. Our proposed approach utilizes a three-phase technique that controls a synchronized queue among connected sensors and keeps their identity hidden from outsiders. The proposed approach preserves the linearity of time that is required to manage the protection of the home network. To validate the performance of our proposed approach, we conducted experiments on four different smart homes datasets. Furthermore, we performed a sensitivity analysis to measure how our proposed approach is affected by different environmental variables. The results indicated that the proposed approach provides a significant performance in protecting sensors identities in smart home area networks. Furthermore, during the sensitivity analysis, we found that our proposed technique’s performance is highly affected by the threshold value that defines each sensor’s time interval.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112