scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
01 Jan 2018
TL;DR: In this paper, the authors analyzed the recent studies and their findings regarding credit card and identity theft and found that credit card theft varies in terms of techniques and methods used and it is crucially important to review and improvise the existing prevention method to reduce the number of crimes related to credit card this paper.
Abstract: Credit card industry is one of the major components of financial institutions in Malaysia. The crimes related to credit card and identity theft of late is increasing drastically. Credit card theft varies in terms of techniques and methods used and it’s crucially important to review and improvise the existing prevention method to reduce the number of crimes related to credit card and identity theft. This study also aims to analyze the recent studies and their findings regarding credit card and identity theft. This article contains information about credit card and identity theft, impact of TN50 implementation and also other fraud prevention methods being practiced internationally. There are plenty of methods being practiced to prevent credit card related frauds which is issue specific and it needs appropriate availability of technology to implement it. The methods that are discussed and considered in this article will definitely play a vital role in terms of cost savings and time efficiency.
Patent
24 Oct 2014
TL;DR: A card identity concealment device partially covers a card to conceal an identity portion on the card, while still enabling functionality of the card by allowing access to a reading portion as discussed by the authors.
Abstract: A card identity concealment device partially covers a card to conceal an identity portion on the card, while still enabling functionality of the card by allowing access to a reading portion on the card. The device protects against unauthorized viewers, identity theft, or physical damage to the card and allows easy insertion into a Credit Card reader. A first panel overlays a substantial region of the first side, including the identity portion. The first panel includes a first panel indicia that creates a false identity for the card by indicating a different card information than on the identity portion of the card. Second panel is spaced parallel and joined along at least two opposing sides with the first panel. The second panel is adapted for receiving the card, while still allowing access to the reading portion.
Book ChapterDOI
29 Jul 2011
TL;DR: The Sugeno-Style fuzzy inference is envisaged in the implementation of information fusion in a multimode authentication system in an effort to provide a solution to identity theft and fraud.
Abstract: Fuzzy inference systems have been used in a number of systems to introduce intelligence behaviour. In this paper we attempt to address an area of security challenges in identity management. The Sugeno-Style fuzzy inference is envisaged in the implementation of information fusion in a multimode authentication system in an effort to provide a solution to identity theft and fraud. Triangular and Sigmoidally shaped membership functions are used in the fuzzification of the three inputs categories namely biometrics, pseudo metrics and device based credentials. Term weight from text mining and entropy from information theory are used to compose the identity attributes metrics. Three corpora are used to mine the identity attributes and generate the statistics required to develop the metrics values from the application forms and questionnaires.
Patent
14 Jan 2011
TL;DR: In this paper, an asset theft reporting system is provided, and includes a pre-paid debit card provided to an individual which is initially capable of being used only to pay for a telephone call by the individual to report a theft of an asset such as a vehicle.
Abstract: An asset theft reporting system is provided, and includes a pre-paid debit card provided to an individual which is initially capable of being used only to pay for a telephone call by the individual to report a theft of an asset such as a vehicle The asset is pre-registered with the system, and information about the asset is stored in a database A telephone call from the individual reporting a theft of the asset is received and processed, and information about the theft is stored in the database When the theft has been reported, the pre-paid debit card is electronically configured for use as a general-purpose debit card to purchase goods and/or services Optionally, the system can contact one or more law enforcement authorities, and/or other entities, to report the theft of the asset and to initiate an investigation
Journal ArticleDOI
TL;DR: In this paper, the authors introduce risk management methods based on quantitative and qualitative analysis including demand-supply curve model and Gordon & Loeb model to analyze the risks for security management.
Abstract: Providing trading partners with personal information to establish an e-commerce financial transaction is inevitable. Most e-commerce companies keep personal information and transaction data for user’s convenience and develop additional services as their applications. However, keeping personal information increases the likelihood of identity theft causing direct or indirect damage while it may simplify repetitive financial transactions. This study introduces risk management methods based on quantitative and qualitative analysis including demand-supply curve model and Gordon & Loeb model to analyze the risks for security management. The empirical analysis with survey results from KISA (Korea Information Security Agency) shows that the root cause of different statistics of personal information leakage incidents according to core business of internet companies is the difference in their Loss Expectancy caused by them. Also we suggest disciplinary compensation and higher standard for personal information protection as a solution to prevent the variation of investment on it between individual companies.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112