scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A thorough review of various security threats affecting the Online Social Network users are discussed along with examples and some existing solutions to fight against these threats are also discussed.
Abstract: The popularity of social networks is increasing day by day to such an extent that people have become addict to it. Large proportion of users are teenagers. But most of these users are not aware of various security and privacy risks affecting these social sites like identity theft, sexual harassment, spamming and many more. The Online Social Network users readily share a lot of personal and private information in the network like phone numbers, email address, family relations, bank details, home address etc. This information can be easily hacked by hackers and attackers. There are lot of solutions available in the market to fight against these threats. So, a thorough review of various security threats affecting the Online Social Network users are discussed along with examples. Also, some existing solutions to fight against these threats are also discussed.
Journal ArticleDOI
TL;DR: In this paper, the authors introduced an additional element -other data by means of which it is publicly identified, which raises doubts; in particular, the terms 'in public' and 'is identified'.
Abstract: The Act of March 31, 2020 changed, inter alia, the content of the provision of Art. 190 a § 2 of the Polish Criminal Code. In the original wording of this provision, conduct consisting of impersonating another person using his/her image or other personal data in order to inflict material or personal harm on her/ him was criminalized. Image is not an easy concept to define. It is assumed to include the appearance of a person and other externally perceptible features that allow for their identification. The concept of personal data has been defined in the Regulation of the European Parliament and of the Council (EU) as any information relating to an identifiable natural person. Currently, the legislator has introduced an additional element - 'other data by means of which it is publicly identified'. The legitimacy of introducing this characteristic and the way it was shaped raise doubts; in particular, the terms 'in public' and 'is identified'. Both the concept of image and personal data fall under the term 'other data'.
Journal ArticleDOI
TL;DR: AMPK activation stimulates autophagy and ameliorates muscular dystrophy in the mdx mouse diaphragm and its reactivation rescues myofiber degeneration.
Abstract: Van Cromphaut S, Debaveye y, gosselink R, gunst J, Wilmer A, Van den Berghe g, Vanhorebeek I: Effect of tolerating macronutrient deficit on the development of intensive-care unit acquired weakness: A subanalysis of the EPaNIC trial. Lancet Respir Med 2013; 1:621–9 34. Raben N, hill V, Shea L, Takikita S, Baum R, Mizushima N, Ralston E, Plotz P: Suppression of autophagy in skeletal muscle uncovers the accumulation of ubiquitinated proteins and their potential role in muscle damage in Pompe disease. hum Mol genet 2008; 17:3897–908 35. Masiero E, Agatea L, Mammucari C, Blaauw B, Loro E, Komatsu M, Metzger D, Reggiani C, Schiaffino S, Sandri M: Autophagy is required to maintain muscle mass. Cell Metab 2009; 10:507–15 36. grumati P, Coletto L, Sabatelli P, Cescon M, Angelin A, Bertaggia E, Blaauw B, Urciuolo A, Tiepolo T, Merlini L, Maraldi NM, Bernardi P, Sandri M, Bonaldo P: Autophagy is defective in collagen VI muscular dystrophies, and its reactivation rescues myofiber degeneration. Nat Med 2010; 16:1313–20 37. Pauly M, Daussin F, Burelle y, Li T, godin R, Fauconnier J, Koechlin-Ramonatxo C, hugon g, Lacampagne A, Coisy-Quivy M, Liang F, hussain S, Matecki S, Petrof BJ: AMPK activation stimulates autophagy and ameliorates muscular dystrophy in the mdx mouse diaphragm. Am J Pathol 2012; 181:583–92
01 Jan 2015
TL;DR: This system has developed a secured web-based payment system with the help of BPCS (Bit Plane Complexity Segmentation) Steganography and Visual Cryptography, which will lead to data confidentiality as the Pin of customer is hidden inside a Steganographed image.
Abstract: Apparently as online transactions are becoming recurrent in various applications like E-commerce and Banking, a great many attacks are been designed each day to hack the data which is really crucial. Out of these attacks phishing is the most popular attack where hackers create a fake website in an attempt to get personal confidential information such as passwords and credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. With high speed prosperity of online shopping, Debit or Credit card fraud and personal information security are major concerns for customers of these sites, merchants and banks specifically in the case of CNP (Card Not Present). In our implemented system we have developed a secured web-based payment system with the help of BPCS (Bit Plane Complexity Segmentation) Steganography and Visual Cryptography. This system will lead to data confidentiality as the Pin of customer is hidden inside a Steganographed image. Data integrity is also preserved by creating two shares out of the Steganographed image. Even if a share image is altered, the original image won’t be obtained. Certified authority is introduced as a Fourth-Party so as to facilitate stacking of two shares and to obtain the original image. The main motive of this system is customer satisfaction by having a successful fund transfer from bank to merchant.
Dissertation
01 Jan 2016
TL;DR: This dissertation explores the vulnerabilities in both end-user applications and end users, investigates vulnerabilities of the password managers in the five most popular Web browsers, investigate vulnerabilities of two commercial browser extension and cloud based password managers, and investigates cross-site input inference attacks on mobile Web users.
Abstract: Using different end-user applications on personal computers and mobile devices has become an integral part of our daily lives. For example, we use Web browsers and mobile applications to perform many important tasks such as Web browsing, banking, shopping, and bill-paying. However, due to the security vulnerabilities in many applications and also due to the lack of security knowledge or awareness of end users, users’ sensitive data may not be properly protected in those applications and can be leaked to attackers resulting in severe consequences such as identity theft, financial loss, and privacy leakage. Therefore, exploring potential vulnerabilities and protecting sensitive data in end-user applications are of great need and importance. In this dissertation, we explore the vulnerabilities in both end-user applications and end users. In terms of end-user applications, we focus on Web browsers, browser extensions, stand-alone applications, and mobile applications by manually or automatically exploring their vulnerabilities and by proposing new data protection mechanisms. Specifically, we (1) investigate vulnerabilities of the password managers in the five most popular Web browsers, (2) investigate vulnerabilities of two commercial browser extension and cloud based password managers, (3) propose a framework for automatic detection of information leakage vulnerabilities in browser extensions, (4) propose a secure cloud storage middleware for end-user applications, and (5) investigate cross-site input inference attacks on mobile Web users. In terms of end users, we focus on phishing attacks by investigating users’ susceptibility to both traditional phishing and Single Sign-On phishing. Specifically, we (6) explore the feasibility of creating extreme phishing attacks and evaluate the effectiveness of such phishing attacks. By conducting these research projects, we expect to advance the scientific and technological understanding on protecting users’ sensitive data in applications, and make users’ online experience more secure and enjoyable.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112