scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
12 Nov 2011
TL;DR: Wireless mobile devices, methods and systems dedicated to achieve greater customer control for protection against identity fraud/theft and medical/health insurance fraud, able to curtail any and/or most or all unauthorized and fraudulent usage of legitimate a person's identity as discussed by the authors.
Abstract: Wireless mobile devices, methods and systems dedicated to achieve greater customer control for protection against identity fraud/theft and medical/health insurance fraud, able to curtail any and/or most or all unauthorized and fraudulent usage of legitimate a person's identity.

24 citations

Journal ArticleDOI
TL;DR: A new distributed scheme for media content sharing on online social networks that may minimize users’ privacy exposure, through automated procedures and is a step towards enabling OSNs to interact, exchange information with equal rights, independently of their size, focus and underlying infrastructure.

24 citations

DOI
01 Jan 2016
TL;DR: In this article, the Naive Bayesian classifier is used to count up the occurrence of each feature in an e-mail and calculate the cumulative score to detect if a URL is malicious or legitimate.
Abstract: Embedding malicious URLs in e-mails is one of the most common web threats facing the internet community today. Malicious URLs have been widely used to mount various cyber-attacks like spear phishing, pharming, phishing and malware. By falsely claiming to be a trustworthy entity, users are lured into clicking on these compromised links to divulge vital information such as usernames, passwords, or credit card details and unknowingly succumb to identity theft. Hence, the detection of malicious URLs in e-mails is very essential so as to help internet users implement safe practices and as well prevent them from becoming victims of fraud. This paper explores how malicious links in e-mails can be detected from the lexical and host-based features of their URLs to protect users from identity theft attacks. This research uses Naive Bayesian classifier as a probabilistic model to detect if a URL is malicious or legitimate. The Naive Bayesian classifier is used to count up the occurrence of each feature in an e-mail and calculate the cumulative score. If the cumulative score is greater than the given threshold, the URL is considered malicious otherwise the URL is legitimate.Keywords: Malicious URLs; Pharming; Phishing, Attacks; Naive Bayesian classifier, threshold

24 citations

Book ChapterDOI
14 May 2007
TL;DR: An interdisciplinary approach to the key security and privacy issues arising from the use of ePassports is taken and how European data protection legislation must be respected and what additional security measures must be integrated in order to safeguard the privacy of the EU ePassport holder is analyzed.
Abstract: The European Union sees the introduction of the ePassport as a step towards rendering passports more secure against forgery while facilitating more reliable border controls. In this paper we take an interdisciplinary approach to the key security and privacy issues arising from the use of ePassports. We further analyse how European data protection legislation must be respected and what additional security measures must be integrated in order to safeguard the privacy of the EU ePassport holder.

24 citations

Journal ArticleDOI
TL;DR: Female students are more aware and have affirmative insights than male, students in the age group of 18-23 years have lower perception and awareness than those aged 24 years and above and those with higher academic qualifications are moreaware at cybercrime and perceived the issue of risk differently.
Abstract: Cybercrime is a criminal (unethical and unlawful) activities using internet facilities such as virus infections, identity theft and hacking. There is high risk of becoming a victim especially for young internet user. The purpose of this study is to protect them by providing empirical evidence to the policy makers in combating cybercrime. The study examines the relationship between perception and gender, age and knowledge as well as the relationship between awareness and gender, age and knowledge towards cybercrime. A field survey is conducted among 342 students in the faculty of accountancy of Universiti Teknologi MARA (UiTM) with a structured questionnaire that covers demographic information and seven most known cybercrimes. Percentile analysis, correlation matrix, multivariate regressions are done to test the hypotheses. In addition, Post Hoc test is conducted to locate where the significant differences lies. The study finds: (1) Female students are more aware and have affirmative insights than male, (2) students in the age group of 18-23 years have lower perception and awareness than those aged 24 years and above and (3) those with higher academic qualifications are more aware at cybercrime and perceived the issue of risk differently. The study provides empirical evidence to the top management of the higher level institutions on the needs to improve their policies and procedures to protect young generation reducing the high risk of becoming a victim.Keywords: Cybercrime, Internet Crime, Cyber Security, UiTM, Higher Academic Institutions, Internet Users, MalaysiaIntroductionThe rapid changes in computer connectivity and innovation in digital technology provide numerous benefits to human life but it is not out of side affect such as cybercrime. Cybercrime is a new wave of crimes using internet facilities, which needs to be addressed urgently and earnestly by policy planners to protect the young generation as there is a high risk of becoming a victim of this crime (Asokhia, 2010; Mensch and Wilkie, 2011). Center for Strategic and International Studies (CSIS) reported that every year there is a financial loss of 445 billion dollar in world economy due to cybercrime (The Daily Amar Desh, 2014). Cyber Security Malaysia reported that the total number of cybercrimes was 1038 in 2007 and it increased to 2123 in 2008 (The Star, 200). Cybercrime statistics along with an increasing number of research studies indicate that young people do not always behave ethically in online activities and hence, there is a chance of every internet user becoming a victim (McQuade, 2009). Chen et al. (2008) state that human factors are involved in security awareness process. Human beings are usually the first line of defence to secure information assets, no matter how advanced and rigid the security technology solutions may be. All the security breaches such as virus infections, identity theft and hacking are the direct cause of carelessness and lack of knowledge and action on the part of users (Chen et al., 2008). A high level awareness about information security and cybercrime issues amongst users at home, in government and educational institutions, especially young people, would decrease the occurrence of cybercrime (Sembok, 2003). The effectiveness of combating cybercrime among users' especially young users will work if they are familiar and adroit while using online. Therefore, human factors such as gender, age, knowledge and skills (experience) may assist in augmenting the levels of awareness among young people. Students' perceptions of risk and awareness on security of the internet and information should be profoundly addressed (Wang et al., 2008). Past studies have examined students' attitude towards computer skills and ethics among educators (Shariff and Deni, 2005; Aris et al., 2004; Sembok, 2003). The majority of earlier studies are focused on approaches of law and enforcement agency tools in combating cybercrime. …

24 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112