scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This survey focused on analyzing the interest for adults for ‘cyber threat eduction seminars’, e.g., how to project themselves and their loved ones, to understand a possible audience, willingness for paying / time commitment, or fields of interest.
Abstract: Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link the security chain. Therefore, this survey focused on analyzing the interest for adults for ‘cyber threat eduction seminars’, e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand a possible audience, willingness for paying / time commitment, or fields of interest as well as background and previous training experience. The survey was conducted in late 2016 and taken by 233 participants. The results show that many are worried about cyber threats and about their children exploring the online domain. However, seminars do not seem to be a priority as many individuals were only willing to spend 1-1.5h on seminars.

27 citations

Book
06 Aug 2008
TL;DR: For example, Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters".
Abstract: Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively protect their own networks from such attacks.

27 citations

Journal ArticleDOI
TL;DR: It is found that adoption of data breach disclosure laws reduce identity theft caused by data breaches, on average, by 6.1 percent from 2002 to 2009.
Abstract: In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting “data breach disclosure laws” that require firms to notify consumers if their personal information has been lost or stolen. While the laws are expected to reduce identity theft, their effect has yet to be empirically measured. We use panel data from the U.S. Federal Trade Commission to estimate the impact of data breach disclosure laws on identity theft from 2002 to 2009. We find that adoption of data breach disclosure laws reduce identity theft caused by data breaches by 6.1 percent, on average.

27 citations

Journal ArticleDOI
28 Apr 2014
TL;DR: The proposed face recognition system checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper.
Abstract: The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment.

26 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112