scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: All the security requirements and all the goals an ideal remote user authentication scheme should satisfy and achieve are defined and presented.
Abstract: User authentication is the process of verifying the legitimacy of a user. Until now, several authentication schemes using smart card proposed in the literature and each proposed scheme has its own merits and demerits. A common attribute among most of the proposed schemes is that the user identity is static in all the transaction sessions, which may reveal some facts about that user and can create threat of identity theft during the communication. In this paper, we have defined all the security requirements and all the goals an ideal remote user authentication scheme should satisfy and achieve. We have presented the results of our survey about remote user authentication schemes for client-server model. All the schemes are vulnerable to various attacks and do not meet the goals. In the future, we look forward to an ideal remote user authentication scheme, which meets all the security requirements and achieves all the goals can be developed. We should confidence that the attacks and goals we offer here can also aid future researchers develop better schemes.

21 citations

Journal ArticleDOI
TL;DR: In this article, the authors investigated the decision by victims to report the crime to the police following identity theft victimization and found that the decision to contact law enforcement is based on the seriousness of the offense, the victim's knowledge of who committed the crime and how it was perpetrated, as well as practical considerations.
Abstract: The current study investigates the decision by victims to report the crime to the police following identity theft victimization. Potential influences on the reporting decision are framed around two criminal justice theories—focal concerns theory and Gottfredson and Gottfredson’s theory of criminal justice decision making. The data used to examine this decision were collected from a nationally representative sample of U.S. adults as a supplement to the 2012 National Crime Victimization Survey. Results suggest that the decision to contact law enforcement is based on the seriousness of the offense, the victim’s knowledge of who committed the crime and how it was perpetrated, as well as practical considerations. These findings parallel other research into victim decision making generally, while also highlighting factors that may be unique to identity theft, notably the effects of income. The results also support the use of criminal justice theory to study and understand victim decision making.

21 citations

01 Mar 2014
TL;DR: This paper explores the identity cyberattacks that can be related to Internet of Things and it presents a vulnerability assessment model that attempts to predict how an environment can be influenced by this type of attacks.
Abstract: In the Internet of Things everything is interconnected. In the same context that “man-made fire” got the party started for human civilisation, “man-made TCP” enabled computing devices to participate in our lives. Today we live in a socially-driven knowledge centred computing era and we are happy in living our lives based on what an Internet alias have said or done. We are prepared to accept any reality as long as it is presented to us in a digitised manner. The Internet of Things is an emerging technology introduced in Smart Devices that will need to be intergrated with the current Information Technology infrastructure in terms of its application and security considerations. In this paper we explore the identity cyberattacks that can be related to Internet of Things and we raise our concerns. We also present a vulnerability assessment model that attempts to predict how an environment can be influenced by this type of attacks.

21 citations

Patent
08 Feb 2006
TL;DR: In this paper, a computerized method and apparatus are established to identify a subject of common interest among multiple parties without releasing the true identity of any subject, without exposing that subject to possible identity theft.
Abstract: A computerized method and apparatus are established to identify a subject of common interest among multiple parties without releasing the true identity of any subject. Furthermore, a computerized network provides different parties at different locations with a mechanism to conduct cooperative activities concerning such a subject of common interest without exposing that subject to possible identity theft.

21 citations

Patent
16 Sep 2005
TL;DR: In this paper, a method to the creation and management of a secondary identification to avoid identify theft is described, which can be used to create a credit card containing the requestor's secondary identification.
Abstract: The present invention relates to a method to the creation and management of a secondary identification to avoid identify theft. Identity theft may occur over the internet, the purchase of goods and services by credit, and many other forms not yet known. The present invention creates a secondary identification for a person by creating one or more of the following secondary identifications which include a secondary email address, a secondary postal address, a secondary phone number, and any other identifying secondary information. The present invention describes methods and systems to create a secondary identification. Further, the present invention may be used to create a credit card containing the requestor's secondary identification.

21 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112