scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
28 Apr 2022
TL;DR: The key intent of this paper is to examine various features of A.I. which can be blended with other security methods to create a more secure environment and make it a crucial weapon in the depository to act as a counter against the cyber threats.
Abstract: The advent of the cyberspace had us living in the lap of luxury, connecting us to every part of the world. It has also become a dependable depot for storing all forms data. This has also led to an upsurge in the number of cyber threats in the past few years. Data breaches, Identity theft, Cyberterrorism and many other forms of threats have been affecting innumerable individuals and organizations. Cybercriminals have been constantly redefining their skills to pose even greater threat to the world. Cybersecurity experts are constantly trying to evade such failures; still the current security methods have been proven not to be much effective on many fronts. The addition of the potentials of Artificial Intelligence could serve as a boon for this purpose as this machine based form of intelligence can use its abilities to enhance different forms of pre-existing cybersecurity methods and probably also to create some new methods. Artificial Intelligence has been a revolutionary creation. The key intent of this paper is to examine various features of A.I. which can be blended with other security methods to create a more secure environment and make it a crucial weapon in our depository to act as a counter against the cyber threats.
Journal ArticleDOI
TL;DR: It is suggested that implementing reliable medical record de-identification and emphasizing trust development are essential to addressing concerns and barriers to sharing and cost-effective for collecting public opinions with short surveys.
Abstract: This study used Amazon Mechanical Turk to crowdsource public opinions about sharing medical records for clinical research. The 1,508 valid respondents comprised 58.7% males, 54% without college degrees, 41.5% students or unemployed, and 84.3% under 40 years old. More than 74% were somewhat willing to share de-identified records. Education level, employment status, and gender were identified as significant predictors of willingness to share one's own or one's family's medical records (partially identifiable, completely identifiable, or de-identified). Thematic analysis applied to respondent comments uncovered barriers to sharing, including the inability to track uses and users of their information, potential harm (such as identity theft or healthcare denial), lack of trust, and worries about information misuse. Our study suggests that implementing reliable medical record de-identification and emphasizing trust development are essential to addressing such concerns. Amazon Mechanical Turk proved cost-effective for collecting public opinions with short surveys.
01 Jan 2005
TL;DR: TRUSTBROKER: A Defense against IDENTITY THEFT from Online Transactions as discussed by the authors, is a defense against identity theft from online transactions, based on trust broker.
Abstract: TRUSTBROKER: A DEFENSE AGAINST IDENTITY THEFT FROM ONLINE TRANSACTIONS
Journal ArticleDOI
TL;DR: The use of biometric data for authentication on self-service devices provides a high level of security and reduces the time of the transaction, relieves users of the need to carry payment means with them, remember passwords or a PIN code from a card, etc as mentioned in this paper .
Abstract: The article discusses biometric technologies, which allow not only to ensure the proper level of security of financial transactions, but also to speed up the process of customer service both in traditional branches and through remote service channels. A few years ago, in order to attract new customers, it was enough for banks to offer them cheaper products and services. Today the situation is rapidly changing, users prefer convenience and reliability. The most common types of biometric data used in the financial sector include facial image, fingerprints, hand geometry and iris pattern. This data can be used to identify customers in online banking, to provide access to financial services on self-service devices and at bank branches, and to gain access to safe deposit boxes. The most popular in the banking sector is two-factor authentication using a PIN code or one-time password and biometrics, which ensures the highest level of data security and access control. The problem of internal fraud and unauthorized access to data through employee accounts is relevant for financial institutions around the world. Also biometrics is able to play an increasingly important role in the global fight against different forms of terrorism, namely in countering fraud, identity theft and other criminal offenses committed by terrorists in order to support their activities. Banks are looking for solutions that can protect their internal data infrastructure and are increasingly opting for biometric technologies. However, of course, biometric technologies’ usage can have more advantages than risks of using. The use of biometric technologies for employee authorization ensures the necessary level of data security and access control to sensitive information, and also provides enough opportunities for monitoring the work of employees of a financial institution. One of the most reliable means of user authentication is biometrics. Biometric data cannot be tampered with, stolen or otherwise used without the knowledge of the bearer. The use of biometric data for authentication on self-service devices provides a high level of security and reduces the time of the transaction, relieves users of the need to carry payment means with them, remember passwords or a PIN code from a card, etc.
Journal ArticleDOI
TL;DR: In this paper , the authors investigated the influence of identity flexibility and dissociative anonymity on internet fraud, focusing on the cyber deception and theft, and employed qualitative and quantitative data analysis for the study.
Abstract: The purpose of this paper is to investigate the influence of identity flexibility and dissociative anonymity on internet fraud, focusing on the cyber deception and theft. Four victims, three culprits, and an experimental website were used to collect data for case study analysis. The researchers employed qualitative and quantitative data analysis for the study. Content analysis of interview transcriptions and results obtained from experimental website were used as the main data collection sources and tools. This study found that victims of internet fraud were defrauded by culprits who clearly practiced the application of identity flexibility and dissociative anonymity in their illegal endeavours. Despite the authenticity of registered crime related users on the experimented website, the true/actual identity of users could not be confirmed even though their credentials were technically validated before being saved. Findings shown in the study confirm the theoretical postulate that “identity flexibility, dissociative anonymity and lack of deterrence factor in the cyberspace provides the offenders the choice to commit cybercrime”. The findings are also consistent with extant studies on the isolated studies that indicate anonymity as the trump card of most cyber criminals. Findings from culprits suggests that they make a conscious effort to satisfy all requirements but without genuine identification and credentials. Practical implications study provides some recommendations for fraud prevention on the internet. The major one is the need for practitioners and future researchers to emphasize on development of solutions that serve as a reliable check on authenticity of users as well as deterrent to all fraudulent users. This study is original, as it focuses on internet fraud that is highly pervasive as per previous research findings

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112