scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article , the authors highlight twelve research topics (RTs) that they believe prioritize high on the agenda of contemporary fraud analytics models, by reviewing fraud analytics from a data, model, performance, and deployment perspective.
Abstract: ABSTRACT Fraud is as old as humankind and appears in many types and forms. Popular examples are credit card fraud, tax evasion, identity theft, insurance fraud, counterfeit, click fraud, anti-money laundering, and payment transaction fraud. In earlier research we defined fraud as an uncommon, well-considered, imperceptibly concealed, time-evolving, and carefully organized crime. Nowadays, fraud is typically tackled using state-of-the-art analytical techniques with many accompanying challenges. It is the purpose of this article to highlight twelve research topics (RTs) that we believe prioritize high on the agenda of contemporary fraud analytics models. We do this by reviewing fraud analytics from a data, model, performance, and deployment perspective.
Journal ArticleDOI
TL;DR: In this paper , common security and privacy issues were examined along with recommendations to social media users to protect themselves from these issues whenever they use social media, including spamming, attacking through viruses, phishing, spear-phishing attacks and identity theft among others.
Abstract: Social media have become extremely popular in recent years, and their widespread adoption has led to the presence of huge volumes of users’ personal information on the Internet. The ever-increasing number of social media users on one hand and the massive amount of information being shared daily on the other hand have encouraged attackers to develop and use different techniques to collect and analyze such information for a number of malicious purposes, including spamming, attacking through viruses, phishing, spear-phishing attacks and identity theft among others. Clearly, this trend represents a significant challenge affecting both users and administrators, and likewise create a privacy and security issues for social media users. In this paper, common security and privacy issues were examined along with recommendations to social media users to protect themselves from these issues whenever they use social media.
Journal ArticleDOI
TL;DR: In this article , the authors explore the need for cybercrime insurance and how it can help businesses recover from a cyber-attack and look at some of the challenges that businesses face when it comes to purchasing such insurance.
Abstract: Despite the increasing awareness of cybercrime, there are many people who are still not sure what it is. Cybercrime is a criminal activity that is committed using computers or the internet. It can include anything from hacking and identity theft to fraud and child pornography. With the rise of technology, cybercrime has become one of the most common forms of crime. According to a report by Norton, a cyber-security company, there were 4.1 billion records breached in the first six months of 2019 alone. And the rate of cybercrime is only increasing. The same report stated that the average cost of a data breach globally was $3.86 million in 2018, which is up 6% from the previous year. During the duration of the Pandemic of Covid-19 most, most of the cyber-crimes increased by around five hundred times is stated by Chief of Defence Staff (CDS) General Bipin Rawat in a discussion with the Hindu Newspaper reporter in Nov. 2021. With the growing rate of cybercrime, many businesses are starting to purchase cybercrime insurance. Cybercrime insurance is a protection tool that businesses can use to financially protect themselves in the event of a data breach or other type of cyber-attack. In this research paper, we will explore the need for cybercrime insurance and how it can help businesses recover from a cyber-attack. We will also look at some of the challenges that businesses face when it comes to purchasing such insurance.
Book ChapterDOI
28 Mar 2023
TL;DR: The most frequent targets were banking accounts and credit card information that could then be accessed, used to make purchases, and become the basis for opening new, fraudulent lines of credits as discussed by the authors .
Abstract: Traditionally, identity theft has been seen as a means for obtaining access to a victim's financial information for monetary gain by a perpetrator. The most frequent targets were banking accounts and credit card information that could then be accessed, used to make purchases, and become the basis for opening new, fraudulent lines of credits. The movement of all or most of our financial information to a digital setting has increased the opportunity for identity theft and the possible losses associated with one's identity being coopted by criminal offenders. This chapter looks at the various methods used by offenders to commit identity fraud, the spectrum of crimes that are subsequently perpetrated once an identity is stolen, and governmental/justice system responses to identity fraud crimes.
Book ChapterDOI
01 Jan 2022
TL;DR: In this paper , the authors analyze digital security strategies for the 21st century by examining different types of cyberattacks, such as identity theft, malware, and phishing, focusing on monetary costs.
Abstract: This chapter analyzes digital security strategies for the 21st century. The chapter begins by examining different types of cyberattacks, such as identity theft, malware, and phishing. Next, the chapter reviews statistics about cyberattacks in the US and the world, focusing on the monetary costs. The typical targets of cyberattacks are then considered, followed by a discussion about how to prevent cybercrime. The chapter next reviews digital security indicators that can provide valuable information about cybercrime and cyberattacks. After this, the chapter discusses cyberwar, which involves cyberattacks not just used against individuals and companies, but against entire states. The chapter concludes by advancing a digital security strategy that can be used in the 21st century.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112