scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The aim of this research is to make use of Machine Learning algorithms for the detection of identity theft and cybercrime.
Abstract: Abstract: Online Identity Theft is known to be quite possibly the most genuine and developing dangers to people and organizations for the past decade because of the colossal financial harm caused by it. It is a critical form of cybercrime which uses information such a victim’s name, bank details, email address, passwords, passport or identification details, and other valuable information to gain access to accounts. This aim of this research is to make use of Machine Learning algorithms for the detection of such crimes. Keywords: identity theft; cybercrime; Machine Learning; detection; algorithms

1 citations

Proceedings ArticleDOI
01 Oct 2020
TL;DR: An extension for the Google Chrome web browser is developed that is capable of handling the phishing issue substantially and a combination of Blacklisting and semantic analysis methods was used.
Abstract: Phishing sends malicious links or attachments through emails that can perform various functions, including capturing the victim's login credentials or account information. These emails harm the victims, cause money loss, and identity theft. In this paper, we contribute to solving the phishing problem by developing an extension for the Google Chrome web browser. In the development of this feature, we used JavaScript PL. To be able to identify and prevent the fishing attack, a combination of Blacklisting and semantic analysis methods was used. Furthermore, a database for phishing sites is generated, and the text, links, images, and other data on-site are analyzed for pattern recognition. Finally, our proposed solution was tested and compared to existing approaches. The results validate that our proposed method is capable of handling the phishing issue substantially.

1 citations

Journal ArticleDOI
TL;DR: The results showed that the total level of CSA for college students in Indonesia was in the good criteria, indicated by a total percentage of awareness around 80%.
Abstract: Internet-based attacks have become common and are expected to happen continuously with the development of technology. Therefore, cybersecurity emerged as an important concept in everyday life. It is defined as the protection of cyberspace. Cybersecurity Awareness (CSA) exists as a major defense key in protecting users and systems from internet-based attacks. The research presented in this study aims to assess the level of CSA among college students in Indonesia. This study uses the Analytic Hierarchy Process (AHP) method to test students in three dimensions, including attitudes, knowledge, and behavior. To measure this dimension, six focus areas in the topic of cybersecurity were taken and developed from previous studies on the same topic. The six focus areas are password security, cyberbullying, phishing, malware, identity theft, and the last is downloading, sharing and use of pirated content. The results showed that the total level of CSA for college students in Indonesia was in the good criteria. This is indicated by a total percentage of awareness around 80%. Nevertheless there are some focus areas that can be improved to increase the percentage.

1 citations

Book
14 Apr 2006
TL;DR: In this paper, the authors present a comprehensive overview of internal control and administrative procedures to avoid embezzlement in a financial statement audit with a focus on the window of opportunity.
Abstract: About the Author. Acknowledgments. Preface. Disclaimer. About the Companion Website. Section 1 Embezzlement: Who Does It and When. The Perpetrators: Who They Are, Why They Do It, and How They Are Caught. The Embezzler's "Window of Opportunity". Section 2 Statement of Auditing Standard No. 99 "Consideration of Fraud in a Financial Statement Audit". Statement of Auditing Standard No. 99 "Consideration of Fraud in a Financial Statement Audit". Section 3 Essential Internal Control and Administrative Procedures to Avoid Embezzlement. The Background Check. Conditions of Employment Agreement. Conflicts of Interest. Nepotism. Whistleblowers. Noncompete Agreements. Confidentiality of Information. Bonding Issues. Signers on Bank Accounts. Two-Signature Checks. Lockbox. Positive Pay. Deposit Security and Restrictive Endorsements. Check Stock. Cash Transactions. Cash Register Issues. Insurance Committees. Computer File Backups. Check and Wire Transfer Signatures. Inventory Issues. Company Credit Cards. Lines of Credit. Bad Debt Policy. Internal Audits. Stop Payment Orders. Voiding Checks. Numbered Check Request Forms. Expense Accounts. CPA Management Letters. Random Disbursement Checks. CHECK 21. Section 4 Clever Examples of Embezzlement. Payroll Tax Deposits. Check Switching. Ghosts on the Payroll and Ghost Vendors. The Danger of Acronyms. Bank Account Reconciliations. Wire Transfers. Postage Issues. Kiting. Manual Checks (Handwritten and Typed). Auditing Receipts. Section 5 Steps to Take If You Have Been Victimized by Fraud. Documenting a Fraud Action Plan. Fraud Examinations and Assembling the Fraud Team. The Basics of Forensic Accounting. Section 6 Identity Theft. Identity Theft Issues. Section 7 Internal Control Analysis, Documentation, and Recommendations for Improvement. CPA Financial Statements, Management Letters, and Consulting Agreements. Fraud Glossary. Index.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112