scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
25 Mar 2011
TL;DR: In this article, a dynamic signature/sign biometric verification system for detecting and preventing fraudulent transactions is described, which is mainly designed for use in payment card industries (e.g. credit cards, debit cards).
Abstract: A dynamic signature/sign biometric verification system for detecting and preventing fraudulent transactions is described. The system comprises remote digital signature/sign input devices, a means to extract spatial and temporal features from the signature, a means to transmit the signature/sign features along with customer identifier information to a centralized signature/sign verification authority, a means for combining signature/sign feature verification with other forms of fraud detection technology, and a means for transmitting the results of a signature/sign verification back to the remote location where the signature/sign was captured. The system was primarily developed for use in payment card industries (e.g. credit cards, debit cards) but has applicability to other centralized signature/sign verification applications such as Automated Teller Machine authorizations and other identity theft detection and monitoring services.

147 citations

Proceedings Article
30 Jan 2007
TL;DR: In this article, a user-centric approach based on hardware and software technology is proposed to assist users when accessing online services with the aim of making them better able to control and manage their digital identities.
Abstract: Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of different identities that each user needs to manage. As a result, many people feel overloaded with identities and suffer from password fatigue. This is a serious problem and makes people unable properly control and protect their digital identities against identity theft. This paper discusses the usability and privacy in online identity management solutions, and proposed a general approach for making users better able to control and manage their digital identities, as well as for creating more secure identity management solutions. More specifically, we propose a user-centric approach based on hardware and software technology on the user-side with the aim of assisting users when accessing online services.

147 citations

Journal ArticleDOI
TL;DR: The impact of aphasia on identity is frequently acknowledged, but there have been few theoretical or research publications focusing on identity as an explanatory construct in understanding quality-of-life issues for persons with Aphasia and their significant others as discussed by the authors.
Abstract: Background: The impact of aphasia on identity is frequently acknowledged, but there have been few theoretical or research publications focusing on identity as an explanatory construct in understanding quality of life issues for persons with aphasia and their significant others. This article is abbreviated from a keynote address at the 2004 Clinical Aphasiology Conference.Aims: The purpose of this article is to review concepts from the sociocultural literature that bear upon social identity and can be applied to an understanding of short- and long-term consequences of aphasia.Main Contribution: Theoretical premises related to social identity are outlined, then applied to the life experiences of persons with aphasia and their significant others. The clinical relevance of such concepts is illustrated through specific examples. Particular attention is paid to the recognition work involved in moving on with life in the context of aphasia. The implications of the identity construct are also addressed through qu...

138 citations

Patent
19 Sep 2005
TL;DR: In this article, a fraudulent business transaction application is provided for monitoring application based fraud and when a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft.
Abstract: A fraudulent business transaction application (110) is provided for monitoring application based fraud (112). When a consumer supplies account access information in order to carry out an Internet business transaction, the FBTA uses an online fraud mitigation engine to detect phishing intrusions and identity theft (114). Methods are also provided for calculating travel velocity and transaction frequency, which are useful for determining a fraudulent transaction (120).

138 citations

01 Jan 2008
TL;DR: In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches as mentioned in this paper.
Abstract: In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting “data breach disclosure laws” that require firms to notify consumers if their personal information has been lost or stolen. While the laws are expected to reduce identity theft, their effect has yet to be empirically measured. We use panel data from the U.S. Federal Trade Commission to estimate the impact of data breach disclosure laws on identity theft from 2002 to 2009. We find that adoption of data breach disclosure laws reduce identity theft caused by data breaches by 6.1 percent, on average.

136 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112