scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Insight is provided into the root causes of cybercrime, its participants and their motivations, and some of the issues inherent in dealing with this crime wave are identified.
Abstract: Painted in the broadest of strokes, cybercrime essentially is the leveraging of information systems and technology to commit larceny, extortion, identity theft, fraud, and, in some cases, corporate espionage Who are the miscreants who commit these crimes, and what are their motivations? One might imagine they are not the same individuals committing crimes in the physical world Bank robbers and scam artists garner a certain public notoriety after only a few occurrences of their crimes, yet cybercriminals largely remain invisible and unheralded Based on sketchy news accounts and a few public arrests, such as Mafiaboy, accused of paralyzing Amazon, CNN, and other Web sites, the public may infer these miscreants are merely a subculture of teenagers In this article we provide insight into the root causes of cybercrime, its participants and their motivations, and we identify some of the issues inherent in dealing with this crime wave

26 citations

28 Feb 2001
TL;DR: Identity theft is simply the theft of identity information such as a name, date of birth, Social Security number (SSN), or a credit card number as mentioned in this paper, which can be accomplished anonymously, easily, with a variety of means, and the impact upon the victim can be devastating.
Abstract: Identity theft has been referred to by some as the crime of the new millennium. It can be accomplished anonymously, easily, with a variety of means, and the impact upon the victim can be devastating. Identity theft is simply the theft of identity information such as a name, date of birth, Social Security number (SSN), or a credit card number. The mundane activities of a typical consumer during the course of a regular day may provide tremendous opportunities for an identity thief: purchasing gasoline, meals, clothes, or tickets to an athletic event; renting a car, a video, or home-improvement tools; purchasing gifts or trading stock on-line; receiving mail; or taking out the garbage or recycling. Any activity in which identity information is shared or made available to others creates an opportunity for identity theft.

26 citations

Journal Article
TL;DR: This Comment argues that a more effective methodology in the fight against cybercrime is to develop a model of community policing, in which the power to deter and prevent cyber crime is divested into the hands of individual computer users.
Abstract: Cybercrime-crime committed through the use of a computer-is a real and growing problem that costs governments, businesses, and individual computer users millions of dollars annually and that facilitates many of the same crimes committed in realspace, such as identity theft and the trafficking of child pornography, only on a larger scale. However, the current strategies deployed by law enforcement to combat cybercrime have proven ineffective. Borne out of traditional notions of criminal behavior, these strategies and tactics are often ill-suited to prevent or punish cybercrime, which often defies the traditional notions of criminal behavior bounded by the corporeal world such as scale and proximity. This Comment argues that a more effective methodology in the fight against cybercrime is to develop a model of community policing, in which the power to deter and prevent cybercrime is divested into the hands of individual computer users. One such strategy for achieving effective community policing against cybercrime is through the increased use of open-source software, software in which users are given access to the underlying source code and may make modifications to that source code in order to ameliorate vulnerabilities that may enable cybercrime. This Comment looks at the development of traditional community policing strategies and argues that the increased use of open source softwarespurned by greater involvement by government and corporations-may be a more effective technique in the fight against cybercrime.

25 citations

Journal ArticleDOI
TL;DR: Information in both these online resumes initially put Meg and Norton in danger of becoming identity-theft victims, but they received some unexpected protection in the form of a computer program called Identity Angel, which this article describes in more detail.
Abstract: In search of a job after graduating from college, Meg Kemp posts her resume online. Norton Steuben, a retired law professor, hasn't looked for employment in more than 35 years and rarely uses the Internet, yet his law school maintains his curriculum vita online. Although such activity might seem innocuous, information in both these online resumes initially put Meg and Norton in danger of becoming identity-theft victims. Fortunately, they received some unexpected protection in the form of a computer program called Identity Angel, which this article describes in more detail.

25 citations

Journal ArticleDOI
TL;DR: In this article, the authors examine the importance of expertise on the commission of identity theft (a crime that requires time to commit), highlighting the roles of both legitimate and illegitimate experiences in developing skills to be successful.

25 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112