scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
16 Aug 2015
TL;DR: In this article, the authors consider traditional theories of European extra-contractual liability/tort law to assess whether the government can be held liable for failures in the authentication procedure.
Abstract: The expansion of e-Government and online authentication possibilities in recent years increases the risk of not properly implemented authentication systems. This may often give rise to subsequent risks, such as identity theft. Whereas the legal framework has primarily focused on identity theft as a criminal act, less attention has been given to the way the Government handles information in its identity management systems. This paper considers traditional theories of European extra-contractual liability/tort law to assess whether the Government can be liable for failures in the authentication procedure.
Journal ArticleDOI
29 Jul 2020
TL;DR: The use of the proposed Multi-Layer Defense scheme, specifically randomly generated code, when making a credit card purchase online could drastically cut down on fraudulent credit card purchases.
Abstract: Purchasing items on the Internet with a credit card can be extremely risky. To mitigate this risk, we propose a new Multi-Layer Defense (MLD) scheme which uses two-factor authentication by institut...
Proceedings ArticleDOI
30 May 2023
TL;DR: In this article , the authors present an ongoing study using eye tracking metrics and varying interface components to assess users' ability to spot simulated phishing attempts and seek to establish how users interact with email inbox interfaces and will inform future design of usable security tools.
Abstract: Phishing emails typically attempt to persuade recipients to reveal private or confidential information (e.g., passwords or bank details). Interaction with such emails places individuals at risk of financial loss and identity theft. We present an ongoing study using eye tracking metrics and varying interface components to assess users’ ability to spot simulated phishing attempts. Findings seek to establish how users interact with email inbox interfaces and will inform future design of usable security tools.
Journal ArticleDOI
TL;DR: In this paper , the focus is on privacy rights and employee monitoring issues at work or on social media that human resource professionals and managers must be aware of as they design workplace policies.
Abstract: Technology inventions, diverse applications, and regular social media usage have all been advancing faster than ever before throughout the world and certainly in the workplace where employee and consumer data are continually compiled and digitally recorded. As such, the privacy of data and personal information in the workplace must be a top priority for every individual and firm. With the loss of a person’s identifiable information, such as name, phone number, address, and national identification details, one can easily become a victim of identity theft. This chapter focuses on some of the privacy laws that are applicable to companies in the United States. Specifically, the focus is on privacy rights and employee monitoring issues at work or on social media that human resource professionals and managers must be aware of as they design workplace policies.
Posted ContentDOI
29 Sep 2022
TL;DR: In this paper , a comprehensive survey of physical and digital face attack types and datasets is presented, along with the latest and most advanced progress on existing counter-attack methodologies and their current limits.
Abstract: With the rapid progress over the past five years, face authentication has become the most pervasive biometric recognition method. Thanks to the high-accuracy recognition performance and user-friendly usage, automatic face recognition (AFR) has exploded into a plethora of practical applications over device unlocking, checking-in, and financial payment. In spite of the tremendous success of face authentication, a variety of face presentation attacks (FPA), such as print attacks, replay attacks, and 3D mask attacks, have raised pressing mistrust concerns. Besides physical face attacks, face videos/images are vulnerable to a wide variety of digital attack techniques launched by malicious hackers, causing potential menace to the public at large. Due to the unrestricted access to enormous digital face images/videos and disclosed easy-to-use face manipulation tools circulating on the internet, non-expert attackers without any prior professional skills are able to readily create sophisticated fake faces, leading to numerous dangerous applications such as financial fraud, impersonation, and identity theft. This survey aims to build the integrity of face forensics by providing thorough analyses of existing literature and highlighting the issues requiring further attention. In this paper, we first comprehensively survey both physical and digital face attack types and datasets. Then, we review the latest and most advanced progress on existing counter-attack methodologies and highlight their current limits. Moreover, we outline possible future research directions for existing and upcoming challenges in the face forensics community. Finally, the necessity of joint physical and digital face attack detection has been discussed, which has never been studied in previous surveys.

Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112