Topic
Identity theft
About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A synopsis of the findings from the last 2 years concerning cyber-attacks on web-based academia and a brief overview of the methods for detecting cyber fraud are presented in an attempt to present general guidelines for researchers who would like to continue the work.
Abstract: In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.
1 citations
•
05 Apr 2004TL;DR: A pre-paid card, referred to as an Internet card, can be used to make anonymous payments over the Internet for services and products, e.g., to pay for Internet access and/or product purchases as discussed by the authors.
Abstract: A pre-paid card, referred to as an Internet card, in accordance with the invention can be used to make anonymous payments over the Internet for services and products, e.g., to pay for Internet access and/or product purchases. The Card is purchased, e.g., with cash, from a card retailer, e.g., a convenience store. In some embodiments the card includes security information which is hidden from the retailer but can be viewed by the purchaser, e.g., after performing a tear off or scratch off operation to reveal the security information. The security information can be used to authorize a transaction to be charged against the card without the need to reveal any personal information and without the risk of the retailer making unauthorized purchases since the security information is hidden from the retailer. By avoiding the need for personal information privacy is maintained and the risk of identity theft avoided.
1 citations
••
TL;DR: In this paper, the authors focus on new risks facing individuals and families with substantial wealth and suggest that failure to address cyber security issues could mean severely diminished or destroyed returns on an otherwise highly successful portfolio, as measured by traditional means.
Abstract: The author focuses on new risks facing individuals and families with substantial wealth. Financial manager acumen, market fluctuations and credit risks are now compounded by a variety of cyber threats and crimes, including identity theft. He suggests that the failure to address cyber security issues could mean severely diminished or destroyed returns on an otherwise highly successful portfolio, as measured by traditional means. Individuals, families and wealth managers can reduce risk by evaluating their financial advisor9s ability and preparedness to respond to cyber threats. He postulates that, when a client experiences a loss or other damage as a result of a cyber-related incident, the issue relates to who will bear the loss—the client, the financial institution or someone else. He argues that effective wealth management now requires a critical analysis of the financial advisor9s ability to anticipate and respond to cyber threats, to how cyber-related risks are contractually allocated between the client and financial advisor, and to the financial advisor9s ability to compensate the client (both balance sheet strength and through appropriate insurance).
1 citations
••
01 Jan 2021TL;DR: A review of various data hiding techniques that are used to provide security to the information that is being shared over unsecure channel is presented in this article, where the main aim of cyber security is to protect the systems information, communication channels and sending information from unauthorized users.
Abstract: Cyber-attack is a category of attack that uses malicious code for intentionally altering the computer data, exploiting computer systems and networks, which might result in disruptive ramification and even compromise the data. Cyber-attack can impel to cybercrimes like information and identity theft. In computing context, the term security means cyber security. The main aim of cyber security is to protect the systems information, communication channels and sending information from unauthorized users. With the increasing volume and sophistication of cyber-attacks, user’s personal information must be protected. This paper presents a review of various data hiding techniques that are used to provide security to the information that is being shared over unsecure channel.
1 citations
••
TL;DR: The study explores the effectiveness of firewall protection by presenting more gains that demerits, and some entities are forced to incorporate both hardware and software to get the desired level of protection.
Abstract: Computers and networks serve a host of functions. As they provide the much-needed services, unscrupulous parties also make work difficult by promoting cyberattacks that could lead to sensitive data loss and inability to access a personal computer. The submission explores the use of firewalls in protecting users against network-driven attacks. Firewalls intercept malware attacks, phishing, and identity theft by denying access to certain suspicious sites. However, users must realize that some hardware firewalls cannot protect them from certain web attacks and software firewalls that are in-built fail to detect malicious attacks on some occasions. Therefore, some entities are forced to incorporate both hardware and software to get the desired level of protection. Using an experimental research method, the study explores the effectiveness of firewall protection by presenting more gains that demerits.
1 citations