scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Patent
26 Sep 2013
TL;DR: The anti-identity theft and information security system process as mentioned in this paper includes storing secure information in association with an electronic device having a communication circuit for sending and receiving data, where the identity of a user can be authenticated in connection with the supplied biometric information.
Abstract: The anti-identity theft and information security system process includes storing secure information in association with an electronic device having a communication circuit for sending and receiving data. Biometric information is read with a scanner so that the identity of a user can be authenticating in connection with the supplied biometric information. Once approved, a data communication line is established with a remote device and access to the secure information is unlocked. Thereafter, the secure information may be transmitted between the electronic device and the remote device.

18 citations

Proceedings ArticleDOI
26 Apr 2011
TL;DR: This paper investigates students' awareness and perception of Bluetooth security threats, and whether they are able to take preventive measures to protect security threats.
Abstract: Bluetooth, which offers users the mobility to convenient, low-cost, short-ranged connections with up to seven other Bluetooth-enabled devices, has been widely adopted especially by young adults. However, Bluetooth-enabled networks have similar security weaknesses as any other digital networks. Instilling security awareness and implementing preventive measures, responsibilities of both the device manufacturers and the users, are essential to prevent harmful security breaches that may affect data and financial loss as a consequence of identity theft. This paper investigates students' awareness and perception of Bluetooth security threats, and whether they are able to take preventive measures to protect security threats.

18 citations

Proceedings ArticleDOI
01 Sep 2016
TL;DR: This paper presents details regarding the growing database of verified phishing websites, which currently encompasses over 88,754 sites, spanning 10,956,415 files and folders, utilizing 108GB of compressed storage and offers recommendations on how this corpus can be leveraged by the cybersecurity and security informatics research communities to examine several important research problems.
Abstract: The number of active, online phishing websites continues to grow unabated in recent years. This has created an ever-increasing security risk for both individual and enterprise users in terms of identity theft, malware, financial loss, etc. Although resources exist for tracking, cataloguing, and blacklisting these types of sites (e.g., PhishTank.com), the ephemeral nature of phishing websites makes in-depth analysis exceptionally difficult. In order to better understand how these phishing sites exploit user and system weaknesses, we have crafted a platform named PhishMonger for capturing live phishing websites in real-time on an ever-present, rolling basis, which we outline in this paper. Moreover, we present details regarding our growing database of verified phishing websites, which currently encompasses over 88,754 sites, spanning 10,956,415 files and folders, utilizing 108GB of compressed storage. We offer recommendations on how this corpus can be leveraged by the cybersecurity and security informatics research communities to examine several important research problems.

18 citations

Journal ArticleDOI
TL;DR: The privacy paradox is often characterized as a risk-benefit trade-off as mentioned in this paper, where risks like identity theft, invasions of privacy, and online harassment compete with benefits like social need fulfill.
Abstract: The privacy paradox is often characterized as a risk-benefit trade-off. Risks like identity theft, invasions of privacy, and online harassment compete with benefits like social need fulfill...

18 citations

Journal ArticleDOI
30 Mar 2011
TL;DR: In this paper, the authors examined whether interactivity serves as a means to diminish the perceived risks and increase the perceived benefits of using e-services and found that interactivity moderated relationships such that consumers were more likely to report higher intentions to use eservices.
Abstract: News reports of Internet-based security breaches, identity theft, fraud, and other dangers may increase the perceived risk and decrease the perceived benefits of using electronic services (or e-services). We examine whether interactivity serves as a means to diminish the perceived risks and increase the perceived benefits of using e-services. To examine interactivity‟s influence on consumers‟ perceptions, we conducted a laboratory experiment using a simulated web-based, online payment system. When compared to a non-interactive preview of an online payment system, we found that consumers who used an interactive e-service simulation reported higher perceived involvement and authenticity as well as higher intangibility and risks of e-services. Further, we found that interactivity moderated relationships such that consumers were more likely to report higher intentions to use eservices. The paper concludes with implications for research and practice.

18 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112