scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A synopsis of the findings from the last 2 years concerning cyber-attacks on web-based academia and a brief overview of the methods for detecting cyber fraud are presented in an attempt to present general guidelines for researchers who would like to continue the work.
Abstract: In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.

1 citations

Patent
05 Apr 2004
TL;DR: A pre-paid card, referred to as an Internet card, can be used to make anonymous payments over the Internet for services and products, e.g., to pay for Internet access and/or product purchases as discussed by the authors.
Abstract: A pre-paid card, referred to as an Internet card, in accordance with the invention can be used to make anonymous payments over the Internet for services and products, e.g., to pay for Internet access and/or product purchases. The Card is purchased, e.g., with cash, from a card retailer, e.g., a convenience store. In some embodiments the card includes security information which is hidden from the retailer but can be viewed by the purchaser, e.g., after performing a tear off or scratch off operation to reveal the security information. The security information can be used to authorize a transaction to be charged against the card without the need to reveal any personal information and without the risk of the retailer making unauthorized purchases since the security information is hidden from the retailer. By avoiding the need for personal information privacy is maintained and the risk of identity theft avoided.

1 citations

Journal ArticleDOI
TL;DR: In this paper, the authors focus on new risks facing individuals and families with substantial wealth and suggest that failure to address cyber security issues could mean severely diminished or destroyed returns on an otherwise highly successful portfolio, as measured by traditional means.
Abstract: The author focuses on new risks facing individuals and families with substantial wealth. Financial manager acumen, market fluctuations and credit risks are now compounded by a variety of cyber threats and crimes, including identity theft. He suggests that the failure to address cyber security issues could mean severely diminished or destroyed returns on an otherwise highly successful portfolio, as measured by traditional means. Individuals, families and wealth managers can reduce risk by evaluating their financial advisor9s ability and preparedness to respond to cyber threats. He postulates that, when a client experiences a loss or other damage as a result of a cyber-related incident, the issue relates to who will bear the loss—the client, the financial institution or someone else. He argues that effective wealth management now requires a critical analysis of the financial advisor9s ability to anticipate and respond to cyber threats, to how cyber-related risks are contractually allocated between the client and financial advisor, and to the financial advisor9s ability to compensate the client (both balance sheet strength and through appropriate insurance).

1 citations

Book ChapterDOI
01 Jan 2021
TL;DR: A review of various data hiding techniques that are used to provide security to the information that is being shared over unsecure channel is presented in this article, where the main aim of cyber security is to protect the systems information, communication channels and sending information from unauthorized users.
Abstract: Cyber-attack is a category of attack that uses malicious code for intentionally altering the computer data, exploiting computer systems and networks, which might result in disruptive ramification and even compromise the data. Cyber-attack can impel to cybercrimes like information and identity theft. In computing context, the term security means cyber security. The main aim of cyber security is to protect the systems information, communication channels and sending information from unauthorized users. With the increasing volume and sophistication of cyber-attacks, user’s personal information must be protected. This paper presents a review of various data hiding techniques that are used to provide security to the information that is being shared over unsecure channel.

1 citations

Journal ArticleDOI
TL;DR: The study explores the effectiveness of firewall protection by presenting more gains that demerits, and some entities are forced to incorporate both hardware and software to get the desired level of protection.
Abstract: Computers and networks serve a host of functions. As they provide the much-needed services, unscrupulous parties also make work difficult by promoting cyberattacks that could lead to sensitive data loss and inability to access a personal computer. The submission explores the use of firewalls in protecting users against network-driven attacks. Firewalls intercept malware attacks, phishing, and identity theft by denying access to certain suspicious sites. However, users must realize that some hardware firewalls cannot protect them from certain web attacks and software firewalls that are in-built fail to detect malicious attacks on some occasions. Therefore, some entities are forced to incorporate both hardware and software to get the desired level of protection. Using an experimental research method, the study explores the effectiveness of firewall protection by presenting more gains that demerits.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112