scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
27 May 2021
TL;DR: In this article, the authors proposed an approach that consists of hiding a generated key in each person's image, this unique key is based on user's personal information, the key will be verified by Luhn algorithm, which is considered as a widely used algorithm to verify generated IDs.
Abstract: By the huge use of biometric identification and authentication systems, securing user’s images is one of the major recent researches topics. In this paper we aim to present a new approach which is based on detecting face in any picture (even with low quality) a detection that can goes to 93%. As a second work we aim to test the ability of this algorithm to identify people while wearing medical masks. In fact, with the spread of Covid-19, people are now obliged to wear medical masks. These masks cover almost 60% of persons faces, this lack of information can prevent the identification of the person or can create some confusions. And To secure images and prevent identity theft we propose an approach that consists of hiding a generated key in each person’s image. This unique key is based on user’s personal information, the key will be verified by Luhn algorithm, which is considered as a widely used algorithm to verify generated IDs. As a third work, we aim to hide the person’s ID in the image using a steganographic algorithm. Our work main objective is to protect pictures and prevent any attempt of creating a fake model of the owners. Therefore, the ID hidden in the picture will be destructed in every attempt of creating a fake image or model.

1 citations

Journal ArticleDOI
TL;DR: In this article , the authors identify and conceptualize a thematic dimensional framework of fraudulent phishing attacks using the literature on psychological attacks and design tactics employed for deception by attackers, and use them to identify tactics embedded in fraudulent email content to understand why users still fall prey to phishing.

1 citations

Book ChapterDOI
27 Jun 2022
TL;DR: In this paper , the authors analyzed the effectiveness of DM (Data Mining) classification techniques for company detection and classifying theft into three groups with respect to the use of data mining as an aid for the identification and prevention.
Abstract: AbstractThis paper analyses the effectiveness of DM (Data Mining) classification techniques for company detection. Different approaches of data mining are accessible for the process of data mining. In many applications, data mining techniques are used to identify and prevent various kinds of theft. While data mining research and possible measures for the detection and identification of different forms of theft are already in progress, there is limited study that reconstructs many elements of theft that employ data mining methods. The use of data mining techniques to detect theft is a responsibility. We are also classifying theft into three groups with respect the use of data mining as an aid for the identification and prevention. This report examines the efficacy in determining false financial statements of policymakers, artificial neural networks, and Bayesian beliefs networks. Management theft, Theft against Customers, and computer-based theft are all three kinds of theft.KeywordsData miningTheftManagementManagementCustomerComputer

1 citations

Journal ArticleDOI
08 Aug 2022
TL;DR: In this paper , the authors used a dataset featuring over 220,000 respondents to the National Crime Victimization Survey Identity Theft Supplement (NCVS ITS) and found that demographic variables (e.g., gender, income) and types of online activities are significantly related to identity theft victimization.
Abstract: It remains unknown if taking commonly used preventive actions is related to identity theft. In the current study, we use a dataset featuring over 220,000 respondents to the National Crime Victimization Survey Identity Theft Supplement (NCVS ITS). The survey was conducted by the Bureau of Justice Statistics (BJS) first in 2012, then again in 2014, and once more in 2016. The findings reported here suggest that demographic variables (e.g., gender, income) and types of online activities (e.g., frequency of online shopping) are significantly related to identity theft victimization. An interesting additional finding is that among seven distinct types of preventive actions listed in the NCVS ITS survey (frequently checking credit reports, frequently changing passwords for financial accounts, employing purchase credit monitoring, shredding documents containing personal information, monitoring bank statements for suspect charges, using security software programs, and purchasing identity theft protection), shredding documents with personal information ALONE is significantly negatively related to identity theft victimization. All six other preventive actions are either positively related or unrelated to identity theft victimization. These findings generate practical implications and, most importantly, raise the question of whether some newly-fashioned preventive actions might provide better protection from identity theft protection.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112