scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This article found that Californians overvalue the mere fact that a website has a privacy policy, and assume that websites carrying the label have strong, default rules to protect personal data, thus limiting the ability of the market to produce outcomes consistent with consumers' expectations.
Abstract: The volume of online commerce grows every year, in absence of a federal law setting baseline protections for the collection, use, and disclosure of personal information. Instead, information collected by websites are governed by individual privacy policies.In order to gauge Californians' understanding of privacy policies and default rules in the online environment, we commissioned a representative survey of adults in the State (N=991). The telephonic survey of Spanish and English speakers was conducted by the Survey Research Center of University of California, Berkeley.A gulf exists between California consumers' understanding of online rules and common business practices. For instance, Californians who shop online believe that privacy policies prohibit third-party information sharing. A majority of Californians believes that privacy policies create the right to require a website to delete personal information upon request, a general right to sue for damages, a right to be informed of security breaches, a right to assistance if identity theft occurs, and a right to access and correct data.These findings show that California consumers overvalue the mere fact that a website has a privacy policy, and assume that websites carrying the label have strong, default rules to protect personal data. In a way, consumers interpret "privacy policy" as a quality seal that denotes adherence to some set of standards. Website operators have little incentive to correct this misperception, thus limiting the ability of the market to produce outcomes consistent with consumers' expectations. Drawing upon earlier work, we conclude that because the term "privacy policy" has taken on a specific meaning in the minds of consumers, its use should be limited to contexts where businesses provide a set of protections that meet consumers' expectations.

30 citations

Journal ArticleDOI
TL;DR: In this article, the authors investigated the relationship between the constructs of fear of financial losses, fear of reputational damage, perceived risk, and online purchase intention and found that the relation between these constructs of perceived risk and online intention were negative.
Abstract: Background and Purpose: Online activities are present in almost every aspect of people’s daily lives. Online purchases are also increasing each year and therefore it is important to investigate what influences online purchase intentions. Online purchase intentions are among everything else, influenced by the fear of identity theft and perceived risk. Design/Methodology/Approach: The online survey was conducted among 190 participants from Slovenia. The relations between the constructs of fear of financial losses, fear of reputational damage, perceived risk and online purchase intention were investigated. Results: The research showed that the relations between the constructs of fear of financial losses, fear of reputational damage, perceived risk are positive and the relation between the constructs of perceived risk and online purchase intention were negative. All of the relations were statistically significant. Conclusion: Understanding the impact of fear of identity theft and perceived risk on online purchase intention can be helpful for online sellers, because with these findings they can manage this fear and perceived risk to increase online purchase intention and address the risks accordingly. Online sellers should therefore regard new findings from the field of online sales. If an online store wants to have success in sales, they should consider all sides of customers’ desires as well as their restraints. Keywords: e-commerce; fear of identity theft; online purchase intention; perceived risk; SEM

29 citations

Proceedings ArticleDOI
17 Oct 2011
TL;DR: It is identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy, and it is shown that Facebook lists are a superset of Google+ circles, both functionally and logically, even though Google+ provides a better user interface.
Abstract: In this paper we provide a preliminary analysis of Google+ privacy. We identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy. We also identified that Google+ encourages the provision of other names including maiden name, which may help criminals performing identity theft. We show that Facebook lists are a superset of Google+ circles, both functionally and logically, even though Google+ provides a better user interface. Finally we compare the use of encryption and depth of privacy control in Google+ versus in Facebook.

29 citations

Journal ArticleDOI
26 May 2021
TL;DR: This paper explores how a blockchain-based decentralized identity management system can draw on the SSI framework to provide high-level security and transparency for all involved parties in public transportation ecosystems.
Abstract: Identity management has been ripe for disruption over the past few years due to recurring incidents of data breaches that have led to personal information leaks and identity theft. The rise of blockchain technology has paved the way for the development of self-sovereign identity—a new class of user-controlled resilient identity management systems that are enabled by distributed ledger technology. This paper examines how SSI management can be used in a public transportation sector that spans different operators in multiple countries. Specifically, the paper explores how a blockchain-based decentralized identity management system can draw on the SSI framework to provide high-level security and transparency for all involved parties in public transportation ecosystems. Accordingly, building on analyses of the existing public transportation ticketing solutions, we elicited requirements of a comparable system based on the SSI principles. Next, we developed a low-fidelity prototype to showcase how passengers can utilize standardized travel credentials that are valid across different transportation networks in Europe. The proposed system eliminates the need for multiple travel cards (i.e., one for each transportation provider) and empowers individuals to have better control over the use of their identities while they utilize interoperable ticketing systems across Europe. Overall, building on the public transportation case, we offer a proof-of-concept that shows how individuals can better manage their identity credentials via the SSI framework.

29 citations

Posted Content
TL;DR: This chapter argues that abuses of personal information are caused by the failure to regulate the way companies manage personal information, and that the law becomes involved when information misuses such as identity theft actually occur, not earlier on in the process.
Abstract: This book chapter was originally written for a conference on privacy and security at Stanford Law School held in March 2004. The chapter argues that abuses of personal information are caused by the failure to regulate the way companies manage personal information. Despite taking elaborate technological measures to protect their data systems, companies readily disseminate the personal information they have collected to a host of other entities and sometimes even to anyone willing to pay a small fee. Companies provide access to their record systems over the phone to anybody in possession of a few easy-to-find pieces of personal information such as Social Security numbers, birth dates, and mothers' maiden names. Reforming this problematic state of affairs requires a rethinking of the way the law comprehends the abuse of personal information. The law fails to focus on the causes of information abuses; instead, it becomes involved when information misuses such as identity theft actually occur, not earlier on in the process. If the law addressed information leaks and insecurity, it would more effectively curtail abuses.

29 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112