scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Cheney et al. as discussed by the authors examined four types of financial fraud (i.e., fictitious identity fraud, payment card fraud, account takeover fraud, and true name fraud) under the legal term identity theft to better understand how criminal behavior patterns, risks for consumers and lenders, and mitigation strategies vary depending upon the sort of data stolen, the type of account compromised, and the opportunity for financial gain.
Abstract: Despite a statutory definition of identity theft, there is a continuing debate on whether differences among the financial frauds associated with identity theft warrant further distinction and treatment, not only by lenders and financial institutions but also by consumers and regulatory and law enforcement agencies. In this Discussion Paper, Julia S. Cheney examines four types of financial fraud - fictitious identity fraud, payment card fraud, account takeover fraud, and true name fraud - that fall under the legal term identity theft to better understand how criminal behavior patterns, risks for consumers and lenders, and mitigation strategies vary depending upon the sort of data stolen, the type of account compromised, and the opportunity for financial gain. Three areas key to developing effective solutions that, in the view of the author, would benefit from further definitional delineations are identified: measuring the success (or failure) of efforts to fight this crime, educating consumers about the risks and responses to this crime, and coordinating mitigation strategies across stakeholders and geographies.

21 citations

Proceedings ArticleDOI
25 Jun 2012
TL;DR: This work proposes a more secure scheme for privacy in social networks by the use of watermarking that manages to diminish these problems, at least inside current social media architectures, without the need for building them from scratch.
Abstract: Due to the rise of social media, several new needs, problems and challenges have emerged in users' privacy and security policies. Two very serious problems that should be addressed are identity theft and unauthorized content sharing. In this work we propose a more secure scheme for privacy in social networks by the use of watermarking that manages to diminish these problems, at least inside current social media architectures, without the need for building them from scratch.

21 citations

01 Jan 2011
TL;DR: In this article, the authors present the evolution of new technologies of surveillance in children's services in England and the introduction of biometrics in the Netherlands - an evaluation under data protection and administrative law.
Abstract: 1 Innovating Government - an introduction to the book.- Part I Normative and ethical dimensions .- 2 Privacy 3.0.- 3 Normative assumptions in biometrics - on bodily differences and automated classifications.- 4 Electronic exchange of signals on youth at risk - a value perspective.- 5 Regulating invisible harms.- Part II Policy dimensions - Democracy .- 6 The single point of failure.- 7 Electronic voting: Approaches, strategies, and policy issues - a report from Switzerland.- 8 Striving behind the shadow - the dawn of Spanish politics 2.0.- Part III Policy dimensions - Surveillance .- 9 The normality of living in surveillance societies.- 10 The evolution of new technologies of surveillance in children's services in England.- 11 Electronic Child Records in the Netherlands - a legitimate path to right wrongs?.- 12 Legitimacy issues regarding citizen surveillance - the case of ANPR-technology in Dutch policing.- 13 The introduction of biometrics in the Netherlands - an evaluation under data protection and administrative law.- Part IV Legal dimensions - EU Law perspectives.- 14 The use of biometrics at the borders - a European policy and law perspective.- 15 Privacy and data protection aspects of e-government identity management.- 16 eHealth from a Dutch perspective.- 17 Implementation of the EU Services Directive: on eGovernment in a decentralized unitary state .- 18 The impact of Europe on geo-information.- Part V Legal dimensions - Techno-legal perspectives .- 19 Sharing information between government agencies - some legal challenges associated with semantic interoperability.- 20 Public information infrastructures and identity fraud.- 21 Access to law in Europe.- Part VI Legal dimensions - Law and philosophy perspective .- 22 Identity theft and fraud.- Part VII Technological dimensions .- 23 Biometrics and smart cards in identity management.- 24 How devices transform voting.- Part VIII Synthesis .- 25 A Brave New Government?

21 citations

Proceedings ArticleDOI
01 Sep 2015
TL;DR: A survey on Botnets provides a brief of classifications, techniques and algorithms of Botnet detection and defense and provides a comparison on existing research.
Abstract: In recent years, Botnets have become an important security problem on the Internet. Botnets have been used for many attacks, such as banking information theft, spam, distributed denial-of-service, identity theft and phishing. Then, they have been proposed as a major research topic in the network security. Although there are several surveys on the Botnets, they usually do not include a complete review on Botnet phenomenon. This paper is a survey on Botnets and provides a brief of classifications, techniques and algorithms of Botnet detection and defense. In this survey, we provide a comparison on existing research. We present an overview of studies on Botnet and discuss in detail including topologies, architectures, communication protocols, infection mechanisms, attacks, purposes, prevention techniques, detection sources and data, detection techniques and algorithms, and response techniques.

21 citations

Journal ArticleDOI
TL;DR: This is the largest ever study on privacy perceptions in India and participants showed more concerns about privacy through mobile phones, and Internet than other forms of privacy issues (physical, territorial, work place, etc.).
Abstract: India, world's largest democracy, has witnessed enormous development in information technology over past few years. It has become a necessity to share personal information for every service, from getting a mobile phone connection to registering for online banking. India being a collectivist society (one of the developing countries part of BRIC nations), has different expectations of privacy than other developed nations. The concept of privacy in India has not been investigated in detail, and we also lack empirical data with respect to privacy perceptions among Indian citizens. Recent developments in the Indian scenario e.g. privacy bill, UID project signify a need for privacy awareness and understanding in Indian masses. It is also important for policy makers to comprehend sentiments and opinion of masses for structuring effective laws and policies for the citizens of India. Our study focuses on understanding privacy perceptions and expectations of Indian citizens. In the first phase, we conducted interviews among 20 participants and 4 focus group discussions with 31 participants, to collect qualitative data about the privacy perceptions. In the second phase, we developed a survey questionnaire to collect quantitative data. We collected responses (10,427) from various cities in India. We hope the understanding developed through the responses collected during the study, helps decision makers and technology developers in producing customizable solutions and laws for Indian users. Also, it will help us in identifying conflicting nature of users in their expectations and practices on privacy matters. Key takeaways from this research work are stated below; these are drawn from the interviews, focus group discussions, and surveys that we conducted to study the privacy perceptions in India. As far as our knowledge goes, this is the largest ever study on privacy perceptions in India, we also believe that, this is the case around the world too. The main intent for this technical report is to give the raw data that we collected, and some preliminary analysis without delving deeper into the analysis and implications of the conclusions. We hope the reader will read the report by referring to the appropriate appendixes, as referred in the report. We are working on an academic paper with this data.General Privacy: Participants related to communication privacy and Internet privacy mostly, when asked about the first reactions for the word privacy. Participants showed more concerns about privacy through mobile phones, and Internet than other forms of privacy issues (physical, territorial, work place, etc.). Majority of the participants felt passwords to be the most protected Personally Identifiable Information (PII) and then, financial information (bank, credit card details). In comparison to this, religion, mobile phone number, and health related information were rated as less protected PII. Privacy awareness about issues in public places was low. Participants were not aware of various privacy issues related to cameras in public places, and others taking pictures in public places. Mobile Phones: Mobile phones are becoming the next destination for storing private information. Participants stored personal information like passwords, credit card numbers, Permanent Account Number (PAN), PINs, etc. Privacy seems to be the primary concern for not storing personal information on the mobile phones for the rest. Majority of the participants felt comfortable with the protection provided by the mobile service providers. Most participants tend to delete the information on phone (e.g. contacts, messages, videos, audios, etc.) before discarding the devices. Privacy invasion through somebody specifically taking picture of the individual is of more concern than pictures/videos taken through CCTV and the likes. Internet and Online Social Media: About 40% of the participants would "never" save/share personal information in/through emails. Privacy seems to be the primary reason for this behavior. Survey participants were more aware about privacy policies and tend to read these policies more than the earlier study in 2004. Minority of the participants had "no privacy concerns" with online social networks. Majority of the participants felt pictures to be the most privacy invasive data on the OSNs. About 5% of the survey participants tend to accept friend requests from strangers or people whom they don’t know, but just have common friends. This behavior seems to be same even with the third party applications. Financial Privacy: Participants were aware of privacy issues related to financial data; thanks to various financial frauds and thefts that has created the awareness. About 15% of the survey respondents felt that the credit cards should display personal information like name, date of birth, and phone number. About 80% of the survey respondents were aware of identity theft issue through credit cards. About 65% of the survey respondents felt that they were comfortable to use the ATM center with more than one machine in it. Government: Citizens have misinformed mental models of the privacy situation; e.g. Participants felt there were privacy laws where as there is no privacy law in India. About 17% of the survey participants said that personal information collected by UID and NATGIRD projects will not be misused. Trust in the government has reduced from 2004.

21 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112