scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This work proposes a new technology, veiled certificates, which includes features that prevent fraudulent use of user’s credentials and provides a degree of user anonymity and also incorporates biometric authentication so that service providers know that they are dealing with the owner of the credentials.
Abstract: A leading cause of Identity Theft is that attackers get access to the victim's personal credentials. We are warned to protect our personal identifiers but we need to share our credentials with various organizations in order to obtain services from them. As a result the safety of our credentials is dependent on both the ability and diligence of the various organizations with which we interact. However, recent data breach incidents are clear proof that existing approaches are insufficient to protect the privacy of our credentials. Using a Design Science methodology, we propose a new technology, veiled certificates, which includes features that prevent fraudulent use of user's credentials and provides a degree of user anonymity. We also incorporate biometric authentication so that service providers know that they are dealing with the owner of the credentials. Results of a bench scale test that demonstrates the feasibility of the approach are reviewed. We also suggest four major applications which could take advantage of these certificates.

1 citations

Journal ArticleDOI
TL;DR: This work proposes a new multi-layered detection system consisting of communal detection (CD) and spike detection (SD) layers that are resilient, which can detect more types of attacks; better account for changing legal behavior and spike detectors complements CD.
Abstract: Identity theft is a form of stealing someone's identity in which someone pretends to be someone else, usually as a method to gain access to resources or obtain benefits in that person's name. Identity crime is prevalent, and costly; and credit application fraud is a specific case of identity crime or identity theft. The existing non-data mining detection systems that uses business rules and scorecards, and known fraud matching have limitations. To overcome these limitations and combat identity crime in real-time, we propose a new multi-layered detection system consisting of communal detection (CD) and spike detection (SD) layers that are resilient. Resilience is the longterm capacity of a system to deal with change and continue to develop communal detection (CD) finds real social relationships to decrease the suspicion score, and is tamper-resistant to the synthetic social relationships. It is the whitelist oriented approach on a fixed set of attributes [1]. The CD algorithm matches all links against the whitelist to find communal relationships and reduce their link score. CD can detect more types of attacks; better account for changing legal behavior and spike detection (SD) complements CD.

1 citations

01 Jan 2006
TL;DR: In this article, the authors argue that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts, and propose to ease this noise in consent doctrine through creating an objective "reasonable digital consumer" standard based on empirical testing of real consumers.
Abstract: Law is contributing to an information security paradox. Consumers are regularly "consenting" to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using this case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease this noise in consent doctrine through creating an objective "reasonable digital consumer" standard based on empirical testing of real consumers.

1 citations

Journal ArticleDOI
TL;DR: A master level course for teaching digital security in education, which will run for the first time this year and includes topics of data security, computer viruses, computer fraud, spyware, and identity theft.
Abstract: Topics of digital security were neglected in our education for long time. Only in last two years studies have shown that digital natives or digi-kids are not sufficiently aware of these topics. Our research reveals that while students are not immune to these problems, teachers are almost completely ignorant about the digital security. We have created a master level course for teaching digital security in education, which we will run for the first time this year. In order to fulfil this task, we decide which topics are relevant for education and establish contemporary students' digital security knowledge. Topics related to psychology and other social sciences courses were not included but we provide ground knowledge for further studies. Therefore, we include topics of data security, computer viruses, computer fraud, spyware, and identity theft.

1 citations

Book ChapterDOI
01 Jan 2014
TL;DR: The results show that even respondents as young as twelve years old appear still attribute most importance to their privacy protection against data mining, and indicate that the development of policies to regulate and safeguard SNSs users privacy online may be of prime importance.
Abstract: By making use of SNSs, users expose themselves to several potential privacy threats at once, yet little is known in how SNSs users of various ages prioritize their concerns over these different privacy threats. This study makes use of an innovative method will be used to determine the relative importance attributed by SNS users to the protection against three distinct privacy threats they face on SNSs: data mining, identity theft, and social conflict. The results show that even respondents as young as twelve years old appear still attribute most importance to their privacy protection against data mining. Furthermore, the results suggests that respondents generally seek privacy protection that is good enough, avoiding the most obvious privacy violations, as opposed to trying to obtain the best privacy protection. These findings, when considering that participation on SNSs in not necessarily a completely free choice and users generally have little choice or input in their actual privacy protection once participating, indicate that the development of policies to regulate and safeguard SNSs users privacy online may be of prime importance.

1 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112