scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a review of the current scenario of phishing attacks in India and some countermeasures that can be adopted by online firms to fight this kind of attack is presented.
Abstract: Purpose – Today almost all businesses are connected online and net banking has becoming a buzzword. The concept of identity theft which was more known in the Western world is making its presence felt in developing economies like India. In this context, the purpose of this paper is to review the current scenario of phishing attacks in India and provide some countermeasures that can be adopted by online firms to fight this kind of attack.Design/methodology/approach – A few statistics related to the phishing attacks worldwide are compared with India's to gauge the severity of the problem. Security measures adopted by a few banks worldwide are reviewed and are compared with their counterparts in India. In the end, some guidelines are furnished on how to tackle the situation.Findings – There has been an increase in identity theft in the last few years which could pose a serious problem in the future, resulting in loss of trust by the customer towards net banking. Most of the Indian banks are taking initiatives...

25 citations

Book ChapterDOI
04 Aug 2007
TL;DR: This paper addresses the main informational privacy risks of Web 2.0 business models with a focus on online social networking sites and the FIDIS/IFIP workshop discussion has resulted in the idea to combine existing privacy-enhancing technologies and protection methods with new safeguarding measures to accommodate the Web 1.0 dynamics and to enhance the informational privacy of Web2.0 users.
Abstract: New developments on the Internet in the past years have brought up a number of online social networking applications within the so-called Web 20 world that experienced phenomenal growth and a tremendous attention in the public Online social networking services build their business model on the myriad of sensitive personal data provided freely by their users, a fact that is increasingly getting the attention of privacy advocates After explaining the economic meaning and importance of online social networks to eCommerce in general and reiterating the basic principles of Web 20 environments and their enterprise mechanisms in particular, this paper addresses the main informational privacy risks of Web 20 business models with a focus on online social networking sites From literature review and current expert discussions, new privacy research questions are proposed for the future development of privacyenhancing technologies used within Web 20 environments The resulting paradigm shift needed in addressing privacy risks in social networking applications is likely to focus less on access protection, anonymity and unlinkability type of PET-solutions and more on privacy safeguarding measures that enable greater transparency and that directly attach context and purpose limitation to the personally identifiable data itself The FIDIS/IFIP workshop discussion has resulted in the idea to combine existing privacy-enhancing technologies and protection methods with new safeguarding measures to accommodate the Web 20 dynamics and to enhance the informational privacy of Web 20 users

25 citations

Journal Article
TL;DR: For example, Crooks as discussed by the authors argued that many instances in the transcultural phenomenon of spirit possession reflect the activity of genuine and harmful spirits, and this is true of much other spirit activity as well.
Abstract: Mark Crooks’ article offers a new paradigm for exploration: namely, that many instances in the transcultural phenomenon of spirit possession reflect the activity of genuine and harmful spirits. Although subsequent research may refine a number of points, the activity of genuine spirits reflects the most common indigenous explanation and makes sense of a significant part of the data that is more difficult to explain on some other academic paradigms. Indigenous explanations do not always view all spirits as harmful, but they usually treat many spirits as harmful, and a case can be made that this is true of much other spirit activity as well. Crooks’ explanatory model brings coherence to many points of data less well served by some competing models, and thus merits continuing exploration.

25 citations

Patent
18 Dec 2008
TL;DR: In this paper, an automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other electronic devices requiring identity verification is provided.
Abstract: An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed.

25 citations

Patent
Glenn C. Everhart1
19 Apr 2002
TL;DR: In this article, the file filtering process includes scanning at least one data file for density of a selected pattern and restricting access to the file if the density of the selected pattern in the data file is greater than or equal to a threshold density.
Abstract: A system and method for network file filtering. The file filtering process includes scanning at least one data file for density of a selected pattern. The process may also include restricting access to the file if the density of the selected pattern in the data file is greater than or equal to a threshold density.

25 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112