scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
16 May 2013
TL;DR: In this paper, the authors present a method, circuit and system for detecting, reporting and preventing an attempted security breach of a commercial website (for example a banking website), such as identity theft, website duplication (mirroring/Phishing), MITB (man in the browser) attacks, MITM (mister in the middle) attacks and so on.
Abstract: The present invention is a method, circuit and system for detecting, reporting and preventing an attempted security breach of a commercial website (for example a banking website), such as identity theft, website duplication (mirroring/Phishing), MITB (man in the browser) attacks, MITM (man in the middle) attacks and so on.

40 citations

DOI
06 Dec 2012
TL;DR: In the case of the Paddington rail crash, Lee Simm reported his flatmate, Karl Hackett, missing, but no trace of Hackett's body was found and his family, from whom he had been estranged for more than ten years, were notified and attended a memorial service at the site of the crash as discussed by the authors.
Abstract: Following the news of the Paddington rail crash in October 1999, Lee Simm reported his flatmate, Karl Hackett, missing. According to Simm, Hackett had been due to return from a trip to Cheltenham on the train that crashed. No trace of Hackett's body was found and his family, from whom he had been estranged for more than ten years, were notified and attended a memorial service at the site of the crash. It later transpired that Hackett had not been killed in the train crash; he had not even been on the train. However, it was discovered that his flatmate, Simm, who reported Hackett missing, had been dead for 15 years, hi order to escape his criminal record, Hackett adopted Simm's identity after his friend committed suicide. Hackett went on to live a blameless life using Simm's name and other personal details and would probably have remained undetected had he not decided to 'kill off' his former self in the rail crash (The Sunday Times 2000:14). Such a wholesale and enduring absorption of another's persona provides a relatively uncommon example of identity theft. The Hackett/ Simm case is unusual in that identity theft typically involves a partial and transient adoption of another's identity undertaken in order to facilitate criminal activity. Identity theft spans a wide spectrum of conduct that covers varying degrees of fraudulent behaviour. This chapter will begin with a consideration of the nature of identity, focusing on the disparity between individual, social and legal constructions of identity, and explore what it means for a person's identity to be stolen. Having outlined the various manifestations of identity theft, the chapter will go on to

40 citations

01 Jan 2013
TL;DR: The nature, causes, types and consequences of cyber crime in tertiary institutions in Zaria, Kaduna State are examined.
Abstract: In Nigeria today, numerous internet assisted crimes are committed daily in various forms such as identity theft, desktop counterfeiting, internet chat room, cyber harassment, fraudulent electronic mails ,Automated Teller Machine spoofing, pornography, piracy, hacking, phishing and spamming. Usually these crimes are committed in forms like sending of fraudulent and bogus financial proposals from cyber criminals to innocent internet users. The increasing rates of cyber crime in the society have become a strong threat to Nigeria’s e-commerce growth and has led to ill- reputation intentionally and consequently denied some innocent Nigerians certain opportunities abroad. Therefore, innocent internet users should inculcate the habit of continuously updating their knowledge about the ever changing nature of ICTs, through this, they can not only be well informed about the current trends in cyber crimes, but they will also have the knowledge about different forms of the said crimes and how the cyber criminals carry out their heinous activities. Thus, they can devise means of protecting their information from cyber criminals. Internet users should be security conscious. On the whole, this paper examines the nature, causes, types and consequences of cyber crime in tertiary institutions in Zaria, Kaduna State.

40 citations

Journal ArticleDOI
TL;DR: A vulnerability measure of an individual's login credentials is suggested and the vulnerability of current Internet users is analyzed to help managers and policy makers striving to reduce security vulnerability.

39 citations

Patent
14 Jan 2005
TL;DR: In this article, a computer network, Credit and Identity Protection Network (CIPN), is established to detect credit damage and identity theft occurring to individuals, organizations, and other entities.
Abstract: A computer network, Credit and Identity Protection Network (“CIPN”), is established to detect credit damage and identity theft occurring to individuals, organizations, and other entities It automatically advises the potential victims to verify the possible fraudulent activities and helps them to take proper actions to protect their credit and identity In addition, this computer network provides the potential victim with assistance in notifying financial institutions, credit bureaus, merchants, and government agencies of suspicious activities and/or of confirmed fraudulent cases so that these organizations can take proper actions to protect themselves and the victims

39 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112