Identity Theft

نویسندگان

  • Kevin Gravesande
  • Rasal Mowla
  • Alvaro Restrepo
  • Carlos Thomas
  • Scott Weaver
چکیده

On February 7, 2005, the Federal Trade Commission reported that at least 10 million Americans are affected by identity (ID) theft each year[7]. The US Department of Justice defines identity theft as ”all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain[17].” ID thieves target any personal information they can get including social security numbers, bank account or credit card numbers, mother’s maiden name, drivers license numbers, financial account numbers and pins, and online account names and passwords[7], [17]. These criminals use many different methods to attack unsuspecting people, gaining information that they then use to pretend to be those people. In this paper we explain some of the methods used by ID thieves. We will focus on Phishing, a web-based social engineering method of extracting personal information for the purpose of assuming the identity of the unsuspecting. The government has stepped up legislation to help prosecute those caught engaging in identity theft, but we must do more through education and personal protection[17], [7], [4]. II. GOALS AND MOTIVATION

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Consequences of the Identity Theft Fear in the Sport Products Online Shopping From the Perspective of Physical Education Students

Background. Today, online shopping has become one of the most important components of modern marketing that had both positive and negative consequences for customers. Objectives. The purpose of present research was to study the consequences of fear of identity theft in sport products online shopping from the perspective of physical education students. Methods. The present study is a descripti...

متن کامل

An automatic and proactive identity theft detection model in MMORPGs

Identity theft happens frequently, especially in popular multiplayer games where cyberassets can be monetized. In this work, we propose an automatic and proactive identity theft detection model in online games. We specify the identity theft process into exploration, monetization, and theft and pose identity theft detection as a multi-class classification problem. We propose an automatic and pro...

متن کامل

On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking

We define identity theft as the unauthorized use and exploitation of another individual’s identity-corroborating information. Published research proposing technical countermeasures is sparse, in contrast to a number of recent proposals to address the sub-problem of phishing. We first identify some underlying problems facilitating identity theft. To address identity theft and the use of stolen o...

متن کامل

ID Theft , ID Fraud and / or ID - related Crime . Definitions matter

Identity theft is often perceived as one of the major upcoming threats in crime. However, there is no commonly accepted definition of ‘identity theft’ or ‘identity fraud’, and it is impossible to study the real threat of this phenomenon without conceptual clarity. In this article, we attempt to provide a starting point for policy and research by proposing some definitions. We indicate that what...

متن کامل

Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling

One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identity-corroborating information. It is exacerbated by the availability of personal information on the Internet. Published research proposing technical solutions is sparse. In this paper, we identify some underlying problems facilitating identity theft. To address the proble...

متن کامل

Is your practice at risk for medical identity theft?

Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005