scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Book ChapterDOI
01 Nov 2009
TL;DR: In this article, the authors address the problem of identity-related crime in financial transactions and the creation and use of misleading and deceptively deceptive identities, which has been greatly facilitated with the advent of information and communications technologies that have provided a rich source of personal information to steal and technologies with which to fabricate documentary evidence of identity.
Abstract: This chapter1 addresses what is, arguably, one of the most pressing financial crime problems that has faced developed societies in recent years – namely the commission of crime through the creation and use of misleading and deceptive identities. Although by no means a new phenomenon, identityrelated crime has been greatly facilitated with the advent of information and communications technologies that have provided a rich source of personal information to steal, and technologies with which to fabricate documentary evidence of identity. The genie is certainly ‘out of the bottle’ and remedying the problem has proved a challenge for businesses, governments and individuals alike.

20 citations

Patent
24 Mar 2010
TL;DR: In this paper, a new system is presented that can effectively protect users' identities, their sensitive data and help secure transactions, which does not depend on the integrity of the host personal computer nor on the security of network computers that execute network traffic.
Abstract: A new system is presented here that can effectively protect users' identities, their sensitive data and help secure transactions. The security of this system does not depend on the integrity of the host personal computer nor on the security of the network computers that execute network traffic. Furthermore, the system is designed to help prevent identity theft. This system can be implemented for governments, financial exchanges and health care systems where security is a primary concern.

20 citations

Journal ArticleDOI
TL;DR: This work proposes a SDN-based security enforcement framework for data sharing systems of smart healthcare that can effectively authenticate resource-constrained IoT things and tackle the problems caused by identity theft.
Abstract: As novel healthcare paradiagm, smart healthcare can provide more efficient and high quality medical services for patients. However, smart healthcare needs patients to share their physiological information for online diagnoses, if the data sharing system of smart healthcare lacks effective security mechanisms, these sensitive information might be abused by illegal or malicious users. Moreover, smart healthcare needs to confront some brand-new challenges, such as resource-constrained IoT things, identity theft attacks and insider attacks. To tackle these problems, we propose a SDN-based security enforcement framework for data sharing systems of smart healthcare. In our framework, each patient has a dedicated virtual machine in data sharing system, each virtual machine provides a group data services which can be released to those authorized service consumers or IoT things. In additon, virtual machine is protected by the SDN-based gateway which provides a firewall mechanism and guarantees only authorized things can access patient’s virtual machine. Since each thing has a unique MAC address, thus our framework can effectively authenticate resource-constrained IoT things and tackle the problems caused by identity theft. To validate the effectiveness and feasibility of our framework, we implement an experimental system using POX controller and Mininet emulator. The experimental results illustrate our framework is effective under different test scenarios. As increasing the scale of information flow model, the framework can still work well and its performance can be still acceptable.

20 citations

Journal ArticleDOI
TL;DR: A proper balance between measures to protect privacy and the ability to guard and improve public health requires careful consideration and development of appropriate policies, regulations and use of technology.
Abstract: Rapid advances in informatics and communication technologies are greatly expanding the capacity for information capture and transportation. While these tools can be used for great good, they also offer new opportunities for those who seek to obtain and use information for improper purposes. While issues related to identity theft for financial gain garner the most attention, protection of privacy in public health endeavors such as cancer surveillance is also a significant concern. Some efforts to protect health-related information have had unintended consequences detrimental to health research and public health practice. Achieving a proper balance between measures to protect privacy and the ability to guard and improve public health requires careful consideration and development of appropriate policies, regulations and use of technology.

19 citations

Journal ArticleDOI
TL;DR: In this article, the authors examined the performance of language in letters sent to notify consumers whose personal information had been affected by a security breach, using a theoretical framework consisting of speech act theory, conditions of felicity, and visual presentation.
Abstract: Data breaches have become a seemingly unavoidable aspect of the information age for both consumers and organizations. Breaches have tangible consequences, including the increased possibility of identity theft for consumers who see their personally identifiable information (PII) compromised. Organizations also face particular issues from data breaches, including damage to organizational reputation. In the United States, organizations are required to notify consumers in the event of a data breach. These notifications feature some aspects that are mandated by the state. However, organizations could control many aspects through the use of perspectives such as speech act theory and impression management techniques. In this article two studies examined the performance of language in letters sent to notify consumers whose PII had been affected by a security breach. Study 1, using a theoretical framework consisting of speech act theory, conditions of felicity, and visual presentation, analyzed 212 letters for spe...

19 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112