scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
04 Mar 2022
TL;DR: In this article , the authors present an overview of various cyber-crimes associated with OSN environment to gain insight into ongoing cyber-attacks, and counter mechanisms in the form of tools, techniques, and frameworks are suggested.
Abstract: Online social networks (OSNs) are nowadays an indispensable tool for communication on account of their rise, simplicity, and efficacy. Worldwide users use OSN as a tool for social interactions, news propagation, gaming, political propaganda, and advertisement in building brand awareness, etc. At the same time, many OSN users unintentionally expose their personal information that is used by the malicious users and third-party apps to perform various kind for cyber-crimes like social engineering attacks, cyber espionage, extortion-malware, drug-trafficking, misinformation, cyberbullying, hijacking clicks, identity theft, phishing, mistrusts, fake profiles, and spreading malicious content. This chapter presents an overview of various cyber-crimes associated with OSN environment to gain insight into ongoing cyber-attacks. Also, counter mechanisms in the form of tools, techniques, and frameworks are suggested.
Proceedings ArticleDOI
26 Jan 2023
TL;DR: In this article , the authors examined the current laws put in place by the Nigerian government for fighting cyber-crimes and highlighted Nigeria's legal system's ability to support and encourage online businesses.
Abstract: In our contemporary world, internet business is now a crucial component of our day-to-day activities, not only does the internet make life easier for people, but they also bring many devastating criminal impacts upon the people, institution, nation, government and the economy. To checkmate cyberspace criminality, various countries of the world including Nigeria, have enacted laws to regulate telecommunication infrastructures, and protect and safeguard the people, organisations, institutions and the state against cyber criminals. The thrust of this study is to examine the current laws put in place by the Nigerian government for fighting cybercrimes. This study found that Nigeria’s Cybercrimes Law has played an important role in online business, particularly in the prevention and punishment of cybercrime, card and ATM fraud, internet fraud, identity theft, malicious hacking, and data theft. The research also highlighted Nigeria’s legal system’s ability to support and encourage online businesses. The work also discusses the USA and the UK legal regimes with the view of drawing lessons that Nigeria as a country can adopt in solving the problem of cybercrimes. In conclusion, the study would provide a guide as to the need for the National Assembly to enact a robust legal regime for effective cybercrime fighting in Nigeria. In the alternative, the study recommends that our legislature should reform the Cybercrime Act 2015 and other existing extant laws on cybercrimes in line with international best practices to boost investors’ and consumers’ confidence, promote economic growth and generate job opportunities for Nigeria’s youth.
01 Jan 2014
TL;DR: Hacking, credit card fraud, software piracy, cyber identity theft, cloning of website/phishing, pornography, cyber defamation, virus dissemination and cyber stalking are the common cyber crime in Dhaka City.
Abstract: Cyber crime is a concerning issue and threat for the information and communication technology (ICT) sector of Bangladesh. Significant numbers of Dhaka city dwellers mostly secondary level (13 to 19 years old) students are doing this unlawful crime consciously or unconsciously. Here, computer is used either as a tool or target or both. There is apparently no distinction between cyber and conventional crime. The differentiation lies in the involvement of the medium in cases of cyber crime. But the identification of crime and implementation of law both are new in our society. It indicates the frequent incidence of cyber crime among the secondary school students of Dhaka city. Hacking, credit card fraud, software piracy, cyber identity theft, cloning of website/phishing, pornography, cyber defamation, virus dissemination and cyber stalking are the common cyber crime in Dhaka City.
Proceedings ArticleDOI
01 Oct 2020
TL;DR: In this article, the authors proposed a reinforcement learning algorithm for solving the optimal strategy to protect the user's identity against a malicious and efficient attacker, and the survival gap between these strategies against their active protection strategy was calculated.
Abstract: Throughout the years, authentication processes of individuals’ identities have become essential parts of our modern daily life. These authentication processes also introduced the heavy use of Personally Identifiable Information (PII) in various applications. On the other hand, the continuous increase of using identifiable information –the unauthorized use of such PII–has created rich business opportunities for identity protection service providers. These services usually consist of a monitoring system that continuously searches through the Internet for incidents that supposedly indicates identity theft activities. However, these solutions are largely based on case studies and a quantified method is missing among different identity protection services. This research offers a tool that provides quantitative analysis among different identity protection services. By bringing together previous work in the field, namely the UT Center for Identity (CID) Identity Ecosystem (a Bayesian network mathematical representation of a person’s identity), real world identity theft data, stochastic game theory, and Markov decision processes, we generate and evaluate the best strategy for defending against the theft of personal identity information. One of the research problems that this paper addresses is the computation complexity of quantitatively evaluating identity protection strategies with real world data. In a real world database like Identity Threat Assessment and Prediction (ITAP) project which the UT CID Identity Ecosystem is built on, the number of PII attributes in use are normally in the order of 103. We propose a reinforcement learning algorithm for solving the optimal strategy to protect the user’s identity against a malicious and efficient attacker. We aim to understand how initial individual PII exposure evolves into crucial PII breaches over time in terms of the dynamic integrity of the Identity Ecosystem. Real world identity protection strategies are then translated into the system and we evaluate/simulate their effectiveness against a malicious attacker for quantitative comparison in our experiment. We present the survival analysis to these strategies and calculate the survival gap between these strategies against our active protection strategy as our experiment result. This study is aimed to understand the evolutionary process of identity under attack which may inspire a new direction for future identity protection strategies.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112