scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
12 May 2015
TL;DR: In this paper, the authors proposed a method to identify and share information about users and/or user devices interacting with the consortia, at least in part by a delta of time parameter between a user device used and a reference time.
Abstract: The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by a delta of time parameter between a user device used and a reference time. Other parameters may be analyzed to identify a computer user and/or device and noteworthy transactions. The invention may be used for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, ratings-based communities and law enforcement. User may be permitted to register user devices in order to control access for performing transactions.

33 citations

01 Jan 2009
TL;DR: In this paper, the authors present new findings from surveys conducted in Summer 2009 on the largest group of fraud victims in the UK to date, using face-to-face interviews, focus groups and telephone interviews about 800 victims have provided information on their experiences and their attitudes to the support available.
Abstract: In recent years the needs of crime victims have become much more recognised in the responses of the justice system and other agencies. There have been campaigns to improve the situation of victims of domestic violence, sexual assaults, gun and knife crimes. However, few campaigns have focussed on fraud victims, resulting in fraud being described as a ‘silent crime’, with victims receiving little support or restitution. Research carried out by the authors of this report has started to fill this gap. Their reviews of the research literature and the fraud support infrastructure (Button et al., 2009a, 2009b) illustrated: the diversity of frauds that affect individuals and small businesses in England and Wales; the perpetrators of fraud; and the techniques employed. It identified victim typologies; discovered what victims want in response to frauds; assessed information and support currently available to victims. This report adds to a growing body of research by presenting new findings from surveys conducted in Summer 2009 on the largest group of fraud victims in the UK to date. Using face-to-face interviews, focus groups and telephone interviews about 800 victims have provided information on their experiences and their attitudes to the support available. The findings reveal that, similar to more visible crimes, victims of fraud are a diverse group, ranging from the young, educated and professional through to the elderly and more vulnerable. The impact of a fraud is often individualised, depending on specific factors relating to the victim. The same fraud can affect multiple victims very differently. This has implications for the level of information, support and services required, with some requiring greater support than others.

32 citations

Journal ArticleDOI
Abstract: The commercial use of information on the Internet has produced substantial benefits for consumers. But, as the use of information online has increased, so have concerns about privacy. In this paper we argue that acting on those concerns would be counterproductive. Far from a 'free lunch,' more privacy implies less information available for producing benefits for consumers, including targeted advertising and the valuable web services it supports, e.g. search engines, email, and social networks. Concerns about privacy may also be misguided. Most data collected about individuals is anonymous, and reducing legitimate uses of online information is not likely to reduce identity theft. Firms appear to be responsive to consumers’ privacy preferences, which also points to a properly functioning market. Our analysis suggests that proposals to restrict the amount of information available would not yield net benefits for consumers.

32 citations

Patent
11 Apr 2005
TL;DR: In this paper, a tamper resistant smart card is used to identify Ghost Web sites, bogus e-mails and unauthorised, modified or corrupted data in an institution's online business interface.
Abstract: Customers of institutions which engage in e-business are issued with tamper resistant smart cards which include among other things a cryptographic public key of the institution. When the customer communicates with the institution on-line the customer uses the smart card to challenge the identity of the on-line business interface. Ghost web sites, bogus e-mails and unauthorised, modified or corrupted data are thereby identified effectively combating any attempted theft of the institution’s on-line identity.

32 citations

Journal ArticleDOI
TL;DR: In this article, the authors describe the results of an assessment of these equity issues in the context of lower-income areas of Portland, Oregon, based on a mixture of quantitative and qualitative research.
Abstract: There is an active debate about the potential costs and benefits of emerging “smart mobility” systems, especially in how they will serve communities already facing transportation challenges. This paper describes the results of an assessment of these equity issues in the context of lower-income areas of Portland, Oregon, based on a mixture of quantitative and qualitative research. The study found that by lowering costs and improving service for public transit, ridesharing and active transportation, smart mobility systems could address many of the needs of transportation disadvantaged communities. Similar to those found in other case studies, significant barriers prevent smart mobility technologies from benefiting all communities. For example, lower income survey respondents and respondents of color had significantly lower access to the “smart mobility ecosystem” including bank accounts and credit cards, they rely more heavily on paying cash for transit tickets, had lower access to internet at home and work, and were more likely to reduce data use or cancel cell plans because of cost or data restrictions. Respondents were also concerned about information security, as the impacts of loss or theft, especially identity theft can be devastating for lower-income residents. Since integrating payment systems and relying on internet and cell data for mobile applications is a core feature of smart mobility ecosystem, these disparities are significant barriers to the equitable transition to smart mobility. Policy recommendations to address barriers include expanding free and public WiFi, better real-time transit information, improved training, and language translation for phone applications, among other things.

32 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112