scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
DOI
26 Sep 2018
TL;DR: This article reviews the most relevant current existing literature about facial authentication as a biometric system, as well as the systems available on the market, so that organizations can use them with its clients or users.
Abstract: I n recent years, new technologies have become the focal point of any operation or digital system. Smartphones are increasingly gaining ground as a technological tool that combines a large number of applications and online services. It is an observable reality, as operations are increasingly being carried out in electronic commerce applications, banking transactions, health applications, and distance education. However, the widespread use of these types of practices means that more risks can present themselves through the internet. Therefore, any organization must take into account changes in virtual security, having to face possible cyber attacks or identity theft. Although smartphones have become a powerful tool in daily lives of most people, it is true that it has brought a series of challenges in the security and privacy of users, where facial authentication seems to be a possible solution to this type of problems. This article reviews the most relevant current existing literature about facial authentication as a biometric system, as well as the systems available on the market, so that organizations can use them with its clients or users.

1 citations

01 Jan 2011
TL;DR: The internal structure of ATM, processing of data in machine, data transmission, various security aspects, few levels of vulnerabilities of data transaction and security levels of data and encryption standard used in banking data security are explained.
Abstract: In today's era of banking operation, identity theft, password protection is no longer adequate to guard your personal information, this paper will explain you the internal structure of ATM, processing of data in machine, data transmission, various security aspects. It will help you to understand the operational issues of auto teller machine, few levels of vulnerabilities of data transaction and security levels of data and encryption standard used in banking data security

1 citations

Posted Content
TL;DR: Some aspects of how the computer can be used as a tool to commit violent and criminal acts and some key factors to mitigate these risks are considered.
Abstract: Cybercrime is commonly defined as any criminal act in which a perpetrator breaks or hacks into a computer or computer network in order to illegally obtain sensitive information or disseminate destructive computer software. Common examples include Internet fraud, identity theft, credit card account theft, or access to information that can cause harm to an individual or corporation. Web technology has played an important role in giving rise to such crimes. Hacking into a computer these days is like taking snapshots or x-rays of someone’s body – there is vast amount of personal information stored in the computer. A person may have actual research or potential ideas for it (the brain), memorable pictures (the heart), work files (making a living) and some additional information stored on the computer. On the surface the hacker is not physically hurting anyone in this scenario, but this is not true in general. The damage caused by these crimes cannot be easily measured. Physical violence is a visible form of crime but cybercrimes are committed in the ‘unseen’ world of Internet that may be ‘accessible’ by the world. In this case we could say that this is not physical violence because nobody is physically hurt; however this is no an encompassing definition of violence. According to the World Health Organization (WHO), violence can be defined as “the intentional use of physical force or power, threatened or actual, against oneself, another person, or against a group or community, which either results in or has a high likelihood of resulting in injury, death, psychological harm, mal-development, or deprivation.” In addition to these, violence can also include exposure to ridicule or defamation of character. In this sense, cybercrimes can cause more psychological harm and deprivation than any other crime committed against a person. The trauma caused by cybercrime can have a long term effects on a person’s mental, physical health, and financial affairs. In this paper the authors consider some aspects of how the computer can be used as a tool to commit violent and criminal acts and some key factors to mitigate these risks.

1 citations

Journal ArticleDOI
TL;DR: In this paper, a consumer purchasing online is studied in the context of identity theft, where little objective information is available about likelihood or consequence, and subjects seem to harbor a "lingering doubt" about ICT hazards.
Abstract: When the precise risk probability or consequence of a hazard is not known, as is the case with many online and security hazards, it is not clear how people evaluate the attendant risk. Based on research in the area of decision theory, we conjecture that in such situations, people first form a judgment of how much is knowable in order to make a decision. This subjective perception of knowability induces a state of mind or a knowledge state in a person, which is then used by the person to frame a decision. We categorize a person’s state of knowledge about the decision domain as belonging to one of four states: certainty, known uncertainty or risk, unknown uncertainty, and unknowable uncertainty.In the context of a consumer purchasing online, we study a hazard about which arguably little objective information is available about likelihood or consequence viz., identity theft. We use an experiment to study the effect of knowability and hence the induced knowledge state on a person’s aversion to identity theft. Results suggest that i) subjects are willing to pay more to avoid unknown and unknowable uncertainties compared to the cases of certainty or risk, ii) subjects judge perceived losses to be higher under uncertainty conditions compared to risk, iii) subjects are not willing to pay proportionally higher premiums to avoid higher perceived losses under uncertainty, and, iv) tentatively, subjects seem to harbor a “lingering doubt” about ICT hazards. We suggest that research on uncertainty is relevant to the study of ICT hazards.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112