scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
01 Jan 2008
TL;DR: In this article, the authors discuss mishandling and appropriate handling of personal information and the difficulty of keeping up with ever-changing security threats in the case of online consumer purchase, such as identity theft and the use of Personal Identifiable Information.
Abstract: In today’s fast moving world, the use of technology has become a part of everyday life. Whether it is using a computer to access the Internet, sending email, or using cell phones to contact friends and family, technology is found in almost everything. Technology provides many conveniences such as online banking, renewing a driver’s license, making a consumer purchase, or conducting research. However, using technology has its pros and cons. On the positive side, conducting personal business online is convenient, saves time, and is economical. However, with the pluses, there are usually minuses as well. In the case of an online consumer purchase, one may find price deals, but may discover a lack of quality or poor customer care. Also, with online advertising growing at such a high rate, the use of imbedded spyware or adware has also increased. Still, one of today’s biggest threats is identity theft and the use of Personal Identifiable Information (PII). This paper discusses mishandling and appropriate handling of personal information and the difficulty of keeping up with ever-changing security threats.
01 Jan 2014
TL;DR: This paper contents addition of two layers: communal detection (CD) and spike detection (SD) which checks for social relationships to reduce the suspicion score, and it is not effected by synthetic identity.
Abstract: Credit card fraud is an element of identity fraud. Information on the card can be used and other identity crime can arise. Protect from miss using signature on the back of a credit card which is stolen, giving a credit card to a friend or family member can cause someone to obtain details which they need to open other credit card accounts or bank accounts with the victim’s name. Credit applications are costumer request f o r smart c1ards, mortgage loans, and personal loans. This can be of the paper work or internet base form. Credit application fraud is a type of fraud which includes synthetic identity fraud and real identity theft. This paper contents addition of two layers: communal detection (CD) and spike detection (SD) [4]. CD checks for social relationships to reduce the suspicion score, and it is not effected by synthetic identity. Whitelist-oriented approach is used on fixed set of attributes. SD increases the suspicion by duplicating on certain attributes. Attribute-oriented approach is used on variable-size set of attributes,
Patent
23 Nov 2016
TL;DR: In this article, the authors present a method and a system for verification of employees data while maintaining and managing security issues related to identity theft. But they do not describe the verification process itself.
Abstract: Embodiments of the present invention are generally directed towards providing systems and methods for verification of employee data. Specifically, embodiments of the present invention relate to a method and a system for verification of employees data while maintaining and managing security issues related to identity theft.
Journal ArticleDOI
TL;DR: This study is a review of literature on biometrics with a focus on feasible alternatives and implementation issues in the banking industry, and indicates that techniques like retinal scanning show promise.
Abstract: Fraud is a growing problem in the banking industry. New legislative requirements have highlighted biometric technology as a reliable secondary means of authentication. This study is a review of literature on biometrics with a focus on feasible alternatives and implementation issues in the banking industry. The literature indicates that techniques like retinal scanning show promise. However, standards are needed in the following areas: (1) allowable degree of invasiveness, (2) desired ease of use, (3) use of biometric data and (4) security of biometric data templates. It is difficult to quantify savings from implemented systems. Therefore, top management should be involved in adoption decisions.
Journal ArticleDOI
30 Sep 2022
TL;DR: The development in the field of E-commerce is something that is very important for this country today, but there are things that can be very detrimental to us if the authors are not careful enough in the development of this E- commerce technology.
Abstract: The development in the field of E-commerce is something that is very important for our country today. E-commerce is not only advancing the country in the field of electronics, but this development can also be felt in other fields such as: Economics, and also the field of Education. However, it is not the only benefit that we can feel from these developments. There are things that can be very detrimental to us if we are not careful enough in the development of this E-commerce technology. Oneaofatheamostaimportant thingsato watch outafor is the breach of individual data/identity leakage that can be carried out by irresponsible parties in the E-commerce sector. Even though there are already articles of the ITE Law Article 32 Paragraphs 1, 2, and 3 which regulate the theft of personal data, the crime of theft still occurs in Indonesia. We can see examples of this crime from several similar crime cases, such as: The case of data leakage of 91 million accounts on Tokopedia in May 2020 and the case of data leakage of Cermati and Lazada involving 2.9 million accounts at the end of 2020.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112