Academic literature on the topic 'Online identity theft $x Prevention'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Online identity theft $x Prevention.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Online identity theft $x Prevention"

1

Chohan, Dr Rozina, Engr Murk Chohan, Irfan Mir Chohan, and Farhana Mir Chohan. "Overcoming Trusting Barriers in Inter-organizational Identity Theft Prevention in Knowledge Sharing: A Case of UK Retailing Industry." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 24, 2021): 4946–74. http://dx.doi.org/10.47059/revistageintec.v11i4.2515.

Full text
Abstract:
Inter-organizational knowledge sharing basically connects two or more firms with one another in exchange relationship for skills, expertise and knowledgeable personnel. Knowledge plays a key role in organizational performance but it is given a very little attention in terms of information security and requires addressing security concerns due to following reasons: First, because retailing is the most victimized channel due to online trade. Second, if organizational criminal wings can compromise the information system of one firm, they can attack other firms too. Hence, identity theft is a collective problem. A security breach is among the top three business stories and identity theft is the key reason why it occurs in online retailing. Identity theft is a serious issue of society at a large and its prevention requires knowledge sharing by several actors. Through different case studies, interviews and theoretical and empirical analysis, this study highlights some unknown side of prevention collaboration in the retail industry in the United Kingdom (UK) which is of theoretical and practical importance. This paper theoretically furthers our understanding of how communication of organizations with comparable goals is handled differently in information security management. Practically, it evaluates relationships of retailing firms, online fraud forums and law enforcement departments in the fraud prevention process. Our research outlines how retailers' partnerships with different stakeholders will help them solve and reduce identity theft by presenting a structure for inter-organizational fraud prevention in retailing organizations.
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Mahmood, Abdullah Maitlo, Paul Jones, and Yahaya Yusuf. "An investigation into agile learning processes and knowledge sharing practices to prevent identity theft in the online retail organisations." Journal of Knowledge Management 23, no. 9 (November 11, 2019): 1857–84. http://dx.doi.org/10.1108/jkm-06-2018-0370.

Full text
Abstract:
Purpose Lack of individual awareness of knowledge sharing practices to prevent identity theft is a significant issue for online retail organisations (OROs). Agile learning processes and sharing of knowledge is essential, but the lack of relevant training inhibits these processes within the online industry. This study aims to identify the inhibiting factors in agile learning and knowledge sharing process with recommendations for best practice for organisations and staff to effectively share knowledge on identity theft prevention. Design/methodology/approach Three qualitative case studies were undertaken in OROs in the UK. Data were collected using semi-structured interviews, internal documents and related external material. The data were analysed using a thematic analysis method. Findings The findings identified that individual staff members within OROs from the information security and fraud prevention departments often share their knowledge as a community. However, there is no formal knowledge sharing process or any related training facilitating this exchange. There is a need for agile learning environment in OROs of the UK. Originality/value The study offers both theoretical and practical contributions to the extant literature of agile learning of knowledge sharing to prevent identity theft in OROs. Existing learning opportunities are not being used to enhance the knowledge of individuals, and OROs need to increase the skills and trust of their staff to share knowledge efficiently. This study identifies the systemic weaknesses inherent in the process of knowledge sharing and existing training provision within OROs. It provides ORO managers with practical guidelines in facilitating trust between individuals and developing appropriate training systems to educate staff on sharing organisational knowledge. This study contributes by extending the knowledge sharing framework proposed by Chong et al. (2011) for enhanced individual knowledge sharing processes to prevent identity theft within OROs. It also identifies OROs’ weaknesses in knowledge sharing learning processes for theft prevention and offers prevention guidelines and recommendations for developing effective agile learning environments.
APA, Harvard, Vancouver, ISO, and other styles
3

Malik, Aftab Ahmad. "Online shopping, Cyber frauds and Fraud prevention Strategies." International Journal for Electronic Crime Investigation 8, no. 1 (March 13, 2024): 49–56. http://dx.doi.org/10.54692/ijeci.2024.0801186.

Full text
Abstract:
Online shopping is increasingly being targeted by hackers and cyber criminals, who exploit the anonymity of the internet to deceive unsuspecting shoppers. These scams involve fake websites or ads, posing as legitimate sellers, damaging innocent citizens' bank accounts and databases, and causing damage to customers. Online shopping fraud involves using stolen credit or debit cards for purchases, while identity theft involves stealing personal information for fraudulent purposes like credit or illegal purchases. We discuss, the safety tips to avoid online shopping scams, using these safety tips before making a purchase. In United states a government agency FTC has been entrusted the task of implementation the civil law related to anti-trust; it also indorses and promotes the protection of consumers rights while working with Justice Department. Online shopping scams were the second most common fraud category in 2021, according to the FTC. To avoid them, use safety tips to identify and avoid scams. Cybercriminals steal and can use personal information to make unauthorized purchases or engage in fraudulent activities. Identity theft is a crime involving capturing and the misuse of another's personal identifying information like Id-card, credit card and bank account information. Fraudsters often use stolen credit cards to purchase items, return them for refunds, and then sell the refunded money or goods. Machine learning is a rapidly evolving technology that can significantly enhance online shopping security and user awareness which is coupled with artificial intelligence
APA, Harvard, Vancouver, ISO, and other styles
4

DeLiema, Marguerite, Lynn Langton, and David Burnes. "Identity Theft Among Older Adults: Risk and Protective Factors." Innovation in Aging 4, Supplement_1 (December 1, 2020): 31. http://dx.doi.org/10.1093/geroni/igaa057.100.

Full text
Abstract:
Abstract Although financial exploitation and fraud targeting older adults have been the focus of increasing academic attention, research on identity theft among older adults is virtually nonexistent. Identity theft refers to an intentional, unauthorized transfer or use of a person’s identifying information for unlawful purposes (Federal Trade Commission 1998). Society’s growing reliance on technology to transfer and store private information has created increased opportunities for financial predators to access and misuse personal data. Results from the most recent Bureau of Justice Statistics’ Identity Theft Supplement show that nearly 1 in 10 adults aged 65 or older experienced identity theft in the past year, with financial losses totaling $2.5 billion. Given the high frequency and cost of identity theft among older Americans, more research is needed to guide prevention efforts and interventions that support recovery. This paper examines the risk factors, protective factors, costs, and consequences of identity theft victimization among older adults, focusing on differences between those aged 65-74 and those 75 or older. Findings suggest that the prevalence of identity theft is lower among those 75 or older (6.6% versus 10.3%), but those 75 or older experienced higher average losses per identity theft incident ($155 vs $96). Compared to those aged 65-74, a lower percentage of adults aged 75 or older engaged in online shopping, thereby reducing their risk of identity exposure (48% versus 24%). However, they were also less likely to engage in protective behaviors such as checking credit reports, changing passwords, checking account statements, and using security software.
APA, Harvard, Vancouver, ISO, and other styles
5

Hole, Prof K. R. "Fraud Detection and Prevention in E-commerce using Decision Tree Algorithm." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 2187–96. http://dx.doi.org/10.22214/ijraset.2024.60307.

Full text
Abstract:
Abstract: Fraud detection is an important part of e-commerce because it helps prevent fraud such as illegal transactions, identity theft, and money laundering. Recently, there has been a lot of literature on the application of machine learning algorithms to identify e-commerce fraud. These algorithms work by learning patterns in data that indicate fraud. Pattern checking deals with discovering differences in data, such as unusual products, locations, or behavior outside the norm for certain users, through machine learning. In this project, we propose a decision tree algorithm to detect fraud in e-commerce using newly generated data from various online products on e-commerce sites. In addition to fraud detection, we also provide advice on fraud prevention. We propose a new security model that will prove the user's identity. In this security model, users are required to register their profile with some questions. Our security systems will display relevant images in response to the registration question. The user has to click on the correct answer image within the time limit. We will ask the user 3 questions in graphic format. If the user selects the correct answer, the user will be considered a real user.
APA, Harvard, Vancouver, ISO, and other styles
6

Komosny, Dan. "Retrospective IP Address Geolocation for Geography-Aware Internet Services." Sensors 21, no. 15 (July 22, 2021): 4975. http://dx.doi.org/10.3390/s21154975.

Full text
Abstract:
The paper deals with the locations of IP addresses that were used in the past. This retrospective geolocation suffers from continuous changes in the Internet space and a limited availability of past IP location databases. I analyse the retrospective geolocation of IPv4 and IPv6 addresses over five years. An approach is also introduced to handle missing past IP geolocation databases. The results show that it is safe to retrospectively locate IP addresses by a couple of years, but there are differences between IPv4 and IPv6. The described parametric model of location lifetime allows us to estimate the time when the address location changed in the past. The retrospective geolocation of IP addresses has a broad range of applications, including social studies, system analyses, and security investigations. Two longitudinal use cases with the applied results are discussed. The first deals with geotargeted online content. The second deals with identity theft prevention in e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
7

Yeon, Soo-Kwon, and Jin-Ho Yoo. "A study on Prevention of Large Scale Identity Theft through the Analysis of Login Pattern(Focusing on IP/Account Blocking System in Online Games)." Journal of Korea Game Society 16, no. 2 (April 30, 2016): 51–60. http://dx.doi.org/10.7583/jkgs.2016.16.2.51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shtonda, Roman, Yuliya Chernish, Tetiana Tereshchenko, Katerina Tereshchenko, Yurii Tsykalo, and Serhiy Polishchuk. "CLASSIFICATION AND METHODS OF DETECTION OF PHISHING ATTACKS." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 69–80. http://dx.doi.org/10.28925/2663-4023.2024.24.6980.

Full text
Abstract:
The reliable operation of data transmission networks, computer systems and mobile devices is a mandatory condition for the effective functioning of the state and society, and the life of an individual. The reliability of key information systems for public use depends on many factors: cyber attacks, hardware and software failures, and various types of errors. Rapid expansion of threats to national security in the 21st century. entrusts state authorities with the tasks of their prevention, detection and neutralization. Cyber security is increasingly viewed as a fundamental problem of the state, which comprehensively affects its security, defense, economy, and almost all spheres of public life. The Internet gave a powerful impetus to the development of mass communication, trade and information exchange. However, today it is the area where many crimes are committed. The impersonal nature of digital infrastructure has made identity theft a natural and highly attractive project. Cybercriminals actively use various means of stealing information, including phishing. At the current stage and in the future, the development of both individual societies and states, as well as the world in general, will be carried out in accordance with the concept of the information society, which is connected with the use of information and telecommunication technologies in the acquisition, storage and processing of information in everyday life Phishing is a serious online security problem that involves spoofing genuine websites to trick online users and steal their confidential information. Analyzing these definitions, we can conclude that “phishing” can be considered in different ways, but the main purpose of its conduct remains unchanged—stealing data. The practical value of the results lies in the possibility of using the obtained classifier for further creation of software solutions for recognizing phishing sites. It, as well as a set of characteristics, can be implemented in anti-phishing browser extensions or other anti-phishing tools.
APA, Harvard, Vancouver, ISO, and other styles
9

Rodríguez Correa, Marisol, and Juan Carlos Rivadulla López. "Percepción y experiencias sobre el ciberbullying en estudiantes universitarios." @tic revista d'innovació educativa, no. 21 (December 21, 2018): 10. http://dx.doi.org/10.7203/attic.21.12926.

Full text
Abstract:
At present we find a high percentage of ICT use by adolescents, mainly in terms of online communication. Threats, ridicule, identity theft and sending material with sexual content are some of the many ways in which cyberbullying manifests itself, with the Internet and mobile phone being the main means used by young people to do so. The objective of this study was to know the perception and experience of a group of university students about cyberbullying, with the participation of 864 students from six Universities in northwestern Spain. A non-experimental quantitative methodology of a survey type was followed, specifically a non-probabilistic, accidental or incidental sampling was used, conditioned by the availability of subjects to participate in the study. The majority of the students consulted indicated that harassment through mobile phones and the Internet has more effect on the victim than "traditional bullying", indicating that they have never suffered harassment or have exercised as stalkers through the Internet and mobile phones; and only a lower percentage of students expressed that they have suffered harassment through mobile phones, but infrequently. The majority of the men consulted who indicated that they suffer harassment through the Internet worry about what others may think about what is happening to them, in the case of the women consulted, most indicated that when they are harassed they feel alone and they It also worries what others may think about what is happening to them. We must educate and sensitize society in general about the issue of harassment and cyberbullying, implementing educational measures for their prevention in schools from the first levels.
APA, Harvard, Vancouver, ISO, and other styles
10

(Sunny) Kim, Jungsun, and Bo Bernhard. "Factors influencing hotel customers’ intention to use a fingerprint system." Journal of Hospitality and Tourism Technology 5, no. 2 (August 12, 2014): 98–125. http://dx.doi.org/10.1108/jhtt-11-2013-0031.

Full text
Abstract:
Purpose – This paper aims to extend the technology acceptance model (TAM) to explore the factors influencing a hotel customer’s intention to use a fingerprint system instead of a traditional keycard system and the moderating factors (i.e. gender and age) on the relationships between the proposed factors and the customer’s intention to use fingerprint technology. When hotels add new technologies, the potential vulnerability of their systems also increases. Underestimating such risks can possibly result in massive losses from identity theft and related fraud for hoteliers. Customers who are aware of these risks may become more open to innovative methods of identification or verification, such as biometrics. Design/methodology/approach – The online survey instrument was developed based on TAMs. The authors collected complete 526 responses from hotel customers and tested the hypotheses using structural equation modeling. Findings – This study found seven factors (i.e. perceived usefulness, perceived ease of use, subjective norm, perceived convenience, perceived data security, perceived property security and personal concerns) which significantly influence a hotel customer’s intention to use fingerprint technology. Gender and age played important moderating roles in the relationships between some of these factors and the intention to use. Practical implications – Recommendations are made as to how hotels can benefit from the implementation of biometrics, particularly fingerprint systems. For example, a hotel’s marketing campaign can be more effective by emphasizing the advantages of fingerprint technology related to “data security and convenience” for younger consumers (i.e. Gen X and Gen Y). Originality/value – Both educators and practitioners will benefit from the findings of this empirical study, as there are very few published studies on a customer’s fingerprint technology acceptance in the hotel context.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Online identity theft $x Prevention"

1

Abdullah. "Knowledge sharing processes for identity theft prevention within online retail organisations." Thesis, University of Central Lancashire, 2017. http://clok.uclan.ac.uk/23998/.

Full text
Abstract:
The occurrence of identity theft has increased dramatically in recent times, becoming one of the fastest-growing crimes in the world. Major challenges associated with identity theft related offences include problems of consumers with credit, such as: aggravation by debt collectors; rejection of loans; disturbance in normal lives such as reputation damage; and the psychological disruption of providing personal data to organisations and banks during the investigation. For these reasons, and with the ready access of identity thieves to the retail industry, this problem is acute in the online retail industry, yet there has been insufficient research undertaken in this domain. This research investigated knowledge sharing processes for identity theft prevention within online retail organisations. An analysis of how individual staff and teams share their knowledge for identity theft prevention in organisations is presented, which includes the investigation of existing barriers in knowledge sharing for identity theft prevention in organisations. A qualitative case study research approach, using the guiding framework proposed by Salleh (2010), was adopted and extended to improve knowledge sharing processes for identity theft prevention in online retail organisations. Three case studies were conducted with leading online retailers in the UK. Data collection included one-to- one semi-structured interviews, internal documents from the researched companies and external documents from various secondary sources. The researcher used the thematic analysis approach using the NVivo software tool and a manual coding process. The total number of interviews was 34 across 3 case studies, with each interview lasting between 45 and 75 minutes. The participants were selected according to their experience, knowledge and involvement in solving identity theft issues and knowledge sharing. Investigation of internal documents included email conversations, policy documents and internal conversations such as emails and memos from the researched companies. This study found that knowledge of identity theft prevention is not being shared within online retail organisations. Individual staff members are learning from their experiences, which is time-consuming. Existing knowledge sharing barriers within the organisations were identified, and improvements in knowledge sharing processes in the online retail industry of the UK using the extended framework are proposed. This research contributes to existing research by providing new insights into knowledge sharing for identity theft prevention. It extends an existing framework proposed by Salleh (2010) in the new context of knowledge sharing processes for ID theft prevention in the retail industry by simplifying the model and combining elements into a more coherent framework. The present study also contributes by investigating the online retail sector for knowledge sharing for ID theft prevention. The empirical research identifies the barriers to knowledge sharing for ID theft prevention and the weaknesses of knowledge sharing in online retail organisations relevant to ID theft prevention. Finally, this study provides managers with useful guidelines for developing appropriate knowledge sharing processes for ID theft prevention in their organisation, and to educate staff in effective knowledge sharing.
APA, Harvard, Vancouver, ISO, and other styles
2

Okeke, Romanus Izuchukwu. "The prevention of internal identity theft-related crimes : a case study research of the UK online retail companies." Thesis, University of Central Lancashire, 2015. http://clok.uclan.ac.uk/12124/.

Full text
Abstract:
Ranked the third biggest cyber security threats of 2013 by Forbes, Internal Identity Theft-Related Crimes (IIDTRC) leave countless victims in their wake, including online retail companies and consumers. With the rapid growth in the use of credit and debit cards in e-commerce, the online retail has been a key target for the IIDTRC perpetrators. IIDTRC involve the misuse of information systems (IS) by the dishonest employees to steal victims’ personal identifiable data. The crimes pose significant socio-economic impact and data security risks. In the context of online retail, relatively little research has been done to prevent IIDTRC. A few studies focus on situational-based IIDTRC prevention approach built on an independent use of software security. Others develop IIDTRC prevention frameworks in the context of generic e-businesses. The majority of the frameworks have little or no grounded empirical research. This research entitled the ‘The Prevention of Internal Identity Theft-Related Crimes: A Case Study Research of the UK Online Retail Companies’, attempts to bridge this research gap. It provides answers to two questions – what is the nature of IIDTRC in online retail companies and what framework can be used for IIDTRC prevention. This research set out three aims to answer the two questions. First, it provides understanding of causes, methods of carrying out and prevention of IIDTRC. Second, it extends a role-based framework (RBF) for the prevention of IIDTRC. Third, it evaluates the extent the RBF can be applied in the prevention of IIDTRC in online retail companies. A qualitative case study was used to achieve these aims. The empirical data were collected in the northwest of UK from 2011 to 2013. The field study was carried through archival analysis, semi-structured interview and participant observation. Organisational role theory (ORT) was used to guide the concept of a role-based framework (RBF) – a collaborative approach where the key components of management work in unison is required to prevent IIDTRC. The attributes of RBF were synthesised from the recommended IIDTRC prevention practices. The empirical evidence suggests that IIDTRC perpetrators in online retail companies are likely to be the top management and call centre employees. The findings suggest that online retail consumers’ credits/debits cards details are as much vulnerable to IIDTRC as the companies’ identities such as trade secrets and trademarks. Furthermore, the common methods used by the IIDTRC perpetrators include collaboration, collusion, infiltration and social engineering. Some of the IIDTRC prevention practices, of which the majority is software security, are implemented without considering the contribution of human-centred security based on management roles. In examining the contribution of the management roles in implementing Information Systems security practices, major challenges that are faced by online retail companies were identified. They include lack of resources, lack of management support and lack of IIDTRC prevention awareness training. This research concludes that an application of RBF can reduce the impact of the identified challenges. This was suggested by applying RBF in conducting IS security auditing in three online retail companies. The finding from the selected companies suggests that the RBF approach can maximise management performance in providing effective IIDTRC prevention practices. It provides better returns on cost, quality and time in the IS security auditing. It has an impact on management attitudes on preventing IIDTRC by clarifying and aligning their roles in implementing effective IS security auditing. There is heterogeneity of this effect across the companies suggesting that some are utilising the RBF approach while others are not. The finding confirms the plausibility of the RBF attributes. It suggests that the human-centred security play an integral role for effective internal data security in preventing IIDTRC. It suggests that it pays to use the collaborative management roles approach for implementing IIDTRC prevention practices. Furthermore, the use of the RBF approach can improve the effectiveness of the online retail companies in preventing IIDTRC. The findings suggest that benefits may accrue from the RBF approach when supplemented with a collaborative IS auditing. The benefits depend on the level of management IT skills, their perception of their roles, top management support and the organisational operations. This research contributes to the literature in identity theft prevention in online retail. To IS security practitioners, it identifies the data security challenges and IIDTRC prevention practices. To theory, it extends a role-based framework for IIDTRC prevention. To the emerging research in the digital economy, it puts forward as a robust starting point for further related works in cyber security, cybercrimes prevention and criminology.
APA, Harvard, Vancouver, ISO, and other styles
3

Utakrit, Nattakant. "Security awareness by online banking users in Western Australian of phishing attacks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2012. https://ro.ecu.edu.au/theses/503.

Full text
Abstract:
Phishing involves sending e-mails pretending to be from the legitimate financial institutions to recipients and asking for personal information such as username and password. It also redirects network traffic to malicious sites, deny network traffic to web services, and modify protection mechanisms in the targeted computer systems. Consequences of successful attacks can include identity and financial losses, and unauthorised information disclosure. The purpose of this study was to investigate the experiences of Western Australian bank users in using online banking. The study considered the relationship between the background of the Western Australian bank users and their experience in using online banking security. The research analysed phishing through case studies that highlighted some of the experiences of phishing attacks and how to deal with the problems. Emphasis was placed on knowledge of phishing and threats and how they were actually implemented, or may be used, in undermining the security of users’ online banking services. The preferences and perspectives of Western Australian bank users about the deployment of online banking security protection and about future online banking services, in order to safeguard themselves against phishing attacks, are presented. The aim was to assist such Australian bank users through exploring potential solutions and making recommendations arising from this study. Research respondents had positive attitudes towards using online banking. Overall, they were satisfied with the security protection offered by their banks. However, although they believed that they had adequate knowledge of phishing and other online banking threats, their awareness of phishing attacks was not sufficient to protect themselves. Essentially, the respondents who had experienced a phishing attack believed it was due to weak security offered by their banks, rather than understanding that they needed more knowledge about security protection of their personal computers. Further education is required if users are to become fully aware of the need for security within their personal online banking.
APA, Harvard, Vancouver, ISO, and other styles
4

Abdelhalim, Amany. "New method for learning decision trees from rules and its illustration for online identity application fraud detection." Thesis, 2009. http://hdl.handle.net/1828/3084.

Full text
Abstract:
A decision tree is a graph or model for representing all the alternatives in a decision making process. Most of the methods that generate decision trees for a specific problem use examples of data instances in the decision tree generation process. We propose a new method called "RBDT-1"- rule based decision tree -for learning a decision tree from a set of decision rules that cover the data instances. RBDT-l method uses a set of declarative rules as an input for generating a decision tree. The method's goal is to create on-demand a short and accurate decision tree from a stable or dynamically changing set of rules. The rules used by RBDT-1 could be generated either by an expert or induced directly from a rule induction method or indirectly by extracting them from a decision tree. We conduct a comparative study of RBDT-1 with four existing decision tree methods based on different problems. The outcome of the study shows that in terms of tree complexity (number of nodes and leaves in the decision tree) RBDT-1 compares favorably to AQDT-1 and AQDT-2 which are methods that create decision trees from rules. RBDT-1 compares favorably also to ID3 while is as effective as C4.5 where both (ID3 and C4.5) are famous methods that generate decision trees from data examples. Experiments show that the classification accuracies of the different decision trees produced by the different methods under comparison are equal. To illustrate how RBDT-1 can successfully be applied to an existing real life problem that could benefit from the method, we choose identity application fraud detection. We designed a new unsupervised framework to detect fraudulent applications for identity certificates by extracting identity patterns from the web, and crossing these patterns with information contained in the application forms in order to detect inconsistencies or anomalies. The outcome of this process is submitted to a decision tree classifier generated using RBDT-1 on the fly from a rule base which is derived from heuristics and expert knowledge, and updated as more information are obtained on fraudulent behavior. We evaluate the proposed framework by collecting real identity information online and generating synthetic fraud cases, achieving encouraging performance results.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Online identity theft $x Prevention"

1

Organisation for Economic Co-operation and Development., ed. Online identity theft. Paris: OECD, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Organisation for Economic Co-operation and Development., ed. Online identity theft. Paris: OECD, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kiesbye, Stefan. Identity theft. Detroit: Greenhaven Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kiesbye, Stefan. Identity theft. Detroit: Greenhaven Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1963-, Payton Theresa, ed. Protecting your internet identity: Are you naked online? Lanham, Md: Rowman & Littlefield Publishers, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. House. Committee on Financial Services. Hacked off: Helping law enforcement protect private financial information : field hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Twelfth Congress, first session, June 29, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moore, Alexis. Cyber self-defense: Expert advice to avoid online predators, identity theft, and cyberbullying. Guilford, Connecticut: Lyons Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United, States Congress House Committee on Science Space and Technology (2011). HealthCare.gov: Consequences of stolen identity : hearing before the Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, second session, January 16, 2014. Washington: U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Online identity theft. Paris: OECD, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Boyer, Allison. The Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life. Atlantic Publishing Company (FL), 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Online identity theft $x Prevention"

1

"Appendix A: Protecting Yourself from Identity Theft." In Essentials of Online Payment Security and Fraud Prevention, 277–80. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118386750.app1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pereira, Filipa da Silva, Marlene Alexandra Veloso de Matos, and Álvaro Miguel do Céu Gramaxo Olivei Sampaio. "Cyber-Crimes against Adolescents." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 211–30. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6324-4.ch014.

Full text
Abstract:
At young ages there is an increase in reports of intimidation, harassment, intrusion, fear, and violence experienced through Information Technologies (IT). Hacking, spamming, identity theft, child pornography, cyber bullying, and cyber stalking are just few examples of cyber-crimes. This chapter aims to contribute, from a psychological and design perspective, to an integrative viewpoint about this complex field of cyber-crime. In this chapter, the most common types of cyber-crimes, epidemiological data, and the profiles of cyber victims and aggressors' are approached. The studies that identify the factors contributing to IT misuse and to growing online vulnerability, principally in adolescents, are also discussed. Likewise, the central explanatory theories for the online victimization and the risk factors for victimization and perpetration online are addressed. Finally, some cyber-crime prevention strategies are anticipated, in particular among young people, seeking to provide clues to the consolidation of recent policies, namely at the digital design level.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography