To see the other types of publications on this topic, follow the link: Identity theft.

Dissertations / Theses on the topic 'Identity theft'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Identity theft.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ruppar, Carrie Aliene. "Identity theft prevention in CyberCIEGE." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FRuppar.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunter, Harry A. "Computer crime and identity theft." [Denver, Colo.] : Regis University, 2010. http://adr.coalliance.org/codr/fez/view/codr:144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.

Full text
Abstract:
ID-theft survival kit -- Book From victim to victor -- ID theft FAQ -- Audiocassettes -- Identity theft resources -- Testimonials -- ID theft action letters -- About the author -- Media appearances -- Identity theft laws -- Theft Deterrence Act.
Title from opening screen, December 28, 1999.
APA, Harvard, Vancouver, ISO, and other styles
4

Allison, Stuart F. H. "A Case Study of Identity Theft." [Tampa, Fla. : s.n.], 2003. http://purl.fcla.edu/fcla/etd/SFE0000093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Whitmer, Evelyn, and Linda Block. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/146292.

Full text
Abstract:
3 pp.
The publication covers protecting yourself from identity theft. It covers how identity theft happens and ways to protect yourself from identity theft. It also gives you some steps to take if you are a victim of identity theft as well as identity theft contact information.
APA, Harvard, Vancouver, ISO, and other styles
6

Whitmer, Evelyn. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2012. http://hdl.handle.net/10150/239593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Minniti, Robert K. "Identifying Business Risk Factors of Identity Theft." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2935.

Full text
Abstract:
Businesses are under pressure to identify and control risks affecting profitability, including the risk of fraud. Identity theft, a type of fraud, costs businesses, governments, and individuals in excess of $56 billion a year. In order to develop good internal controls to help prevent and detect fraud, it is necessary to identify the risks to the business, but business owners are not always aware of what risk factors relate to identity theft. A nonexperimental research design formed the basis of this research study. The population for this study was data from all 50 U.S. states, represented via government databases maintained by the Federal Trade Commission, the U.S. Census Bureau, and the Department of Labor from all 50 U.S. states from 2008 until 2014. The fraud triangle theory formed the theoretical framework for this study. Regression analysis determined the significance of relationships between state-specific instances of international immigration, state-specific unemployment rates, and state-specific instances of identity theft. Both state-specific instances of international immigration and state-specific unemployment rates demonstrated a significant and positive relationship with instances of identity theft. The implications for positive social change include improved understanding of risk factors for identity theft, which could lead to lower costs of operation for businesses and lower prices for consumers.
APA, Harvard, Vancouver, ISO, and other styles
8

Klockars, Karl. "Governing the e-subject through identity theft discourses." Thesis, University of Ottawa (Canada), 2011. http://hdl.handle.net/10393/28909.

Full text
Abstract:
This study explores the social construction of identity theft, including its meanings, risk factors, specific causes and accompanying solutions, articulated in policy documents published by the Consumer Measures Committee (a sub-committee of Industry Canada) and the Royal Bank of Canada. A qualitative analysis of the documents indicates that identity theft is predominately constructed within the documents as an individualized consumer concern. This is in keeping with the shift to neoliberalism identified by Monahan (2009) and Caeton (2007). Within this, individuals are constructed as buying into the electronic marketplace, aligning their own motivations with larger political and economic objectives, while trusting in the advice of experts to overcome manageable risks.
APA, Harvard, Vancouver, ISO, and other styles
9

Angelopoulou, Olga. "Analysis of digital evidence in identity theft investigations." Thesis, University of South Wales, 2010. https://pure.southwales.ac.uk/en/studentthesis/analysis-of-digital-evidence-in-identity-theft-investigations(87649de4-e445-49c3-bcba-8297ee5ef684).html.

Full text
Abstract:
Identity Theft could be currently considered as a significant problem in the modern internet driven era. This type of computer crime can be achieved in a number of different ways; various statistical figures suggest it is on the increase. It intimidates individual privacy and self assurance, while efforts for increased security and protection measures appear inadequate to prevent it. A forensic analysis of the digital evidence should be able to provide precise findings after the investigation of Identity Theft incidents. At present, the investigation of Internet based Identity Theft is performed on an ad hoc and unstructured basis, in relation to the digital evidence. This research work aims to construct a formalised and structured approach to digital Identity Theft investigations that would improve the current computer forensic investigative practice. The research hypothesis is to create an analytical framework to facilitate the investigation of Internet Identity Theft cases and the processing of the related digital evidence. This research work makes two key contributions to the subject: a) proposing the approach of examining different computer crimes using a process specifically based on their nature and b) to differentiate the examination procedure between the victim’s and the fraudster’s side, depending on the ownership of the digital media. The background research on the existing investigation methods supports the need of moving towards an individual framework that supports Identity Theft investigations. The presented investigation framework is designed based on the structure of the existing computer forensic frameworks. It is a flexible, conceptual tool that will assist the investigator’s work and analyse incidents related to this type of crime. The research outcome has been presented in detail, with supporting relevant material for the investigator. The intention is to offer a coherent tool that could be used by computer forensics investigators. Therefore, the research outcome will not only be evaluated from a laboratory experiment, but also strengthened and improved based on an evaluation feedback by experts from law enforcement. While personal identities are increasingly being stored and shared on digital media, the threat of personal and private information that is used fraudulently cannot be eliminated. However, when such incidents are precisely examined, then the nature of the problem can be more clearly understood.
APA, Harvard, Vancouver, ISO, and other styles
10

Celikbag, Yusuf El Mogahzy Yehia. "Developing methods for detecting cotton fiber identity theft." Auburn, Ala., 2009. http://hdl.handle.net/10415/1768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Goodrich, Gwendolyn Lea. "Identity theft awareness in north central West Virginia." Huntington, WV : [Marshall University Libraries], 2003. http://www.marshall.edu/etd/descript.asp?ref=218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Edvalson, Michael George. "TrustBroker : a defense against identity theft from online transactions /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1149.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Saunders, Lewis O. "The relationship between cell phone use and identity theft." Thesis, Walden University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3615824.

Full text
Abstract:

The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell phone use. The purpose of this qualitative study was to determine how cell phone use is affected by attitudes toward privacy and identity theft. The study was based on social impact theory, according to which people's attitudes and behavior are affected by the strength and immediacy of others' attitudes and behavior. The research questions concerned the extent to which participants connected cell phone use with decreasing privacy and increasing cybercrime, how the use of biometrics affected cell phone users' attitudes and behavior, and what steps can be taken to reduce the misuse of private information associated with cell phone use. Data collection consisted of personal interviews with representatives from 3 groups: a private biometrics company, individual cell phone users who earn more than $55,000 a year, and individual cell phone users who earn less than $55,000 a year. Interviews were transcribed and coded for themes and patterns. Findings showed that interviewees were more likely to see identity theft as a problem among the public at large than in the industries in which they worked. Participants recommended a variety of measures to improve cell phone security and to reduce the likelihood of identity theft: passwords, security codes, voice or fingerprint recognition, and encryption. The implications for positive social change include informing government officials and individual users about the use and abuse of cell phones in order to decrease violations of privacy and identity theft while still promoting national security.

APA, Harvard, Vancouver, ISO, and other styles
14

Saunders, Lewis O. "The relationship between cell phone use and identity theft." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/1123.

Full text
Abstract:
The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell phone use. The purpose of this qualitative study was to determine how cell phone use is affected by attitudes toward privacy and identity theft. The study was based on social impact theory, according to which people's attitudes and behavior are affected by the strength and immediacy of others' attitudes and behavior. The research questions concerned the extent to which participants connected cell phone use with decreasing privacy and increasing cybercrime, how the use of biometrics affected cell phone users' attitudes and behavior, and what steps can be taken to reduce the misuse of private information associated with cell phone use. Data collection consisted of personal interviews with representatives from 3 groups: a private biometrics company, individual cell phone users who earn more than {dollar}55,000 a year, and individual cell phone users who earn less than {dollar}55,000 a year. Interviews were transcribed and coded for themes and patterns. Findings showed that interviewees were more likely to see identity theft as a problem among the public at large than in the industries in which they worked. Participants recommended a variety of measures to improve cell phone security and to reduce the likelihood of identity theft: passwords, security codes, voice or fingerprint recognition, and encryption. The implications for positive social change include informing government officials and individual users about the use and abuse of cell phones in order to decrease violations of privacy and identity theft while still promoting national security.
APA, Harvard, Vancouver, ISO, and other styles
15

Holmes, Timothy. "Examination of identity theft and identity fraud and the role of the National Identity Card Scheme." Thesis, Bangor University, 2009. https://research.bangor.ac.uk/portal/en/theses/examination-of-identity-theft-and-identity-fraud-and-the-role-of-the-national-identity-card-scheme(2ea7fafb-d68d-4e1a-9edb-591a1abcf167).html.

Full text
Abstract:
Since the start of the 21st century the terms identity theft and identity fraud have been used to describe a variety of crimes which appear both new and unique to the 21st century. So much so, that the government is in the process of re-introducing a National Identity Card Scheme to tackle the problem. But are identity theft and identity fraud uniquely 21st century problems, and is a new Identity Card Scheme going to prevent these crimes? The study seeks to examine identity theft and identity fraud and determine what these crimes are, and to distinguish between the two. In order to do this, the study will examine the different definitions used in America, Australia and the U.K. as well as the history of identity related crime. The use of identity theft and identity fraud by organised crime, illegal immigration and terrorism will also be discussed. This examination of identity theft and identity fraud includes an explanation of the differences between modern and traditional identity related crimes and the various methods used to gather information on people's identities. The study also looks at ways of researching identity related crime. As part of the research process, simulated identity theft was developed as a research approach. The use of this research method and the ethical and legal consideration associated with it are discussed at length as is the use of the internet as a source of information. The study concludes with an analysis of the role of the National Identity Card Scheme in preventing identity related crime, and the potential benefits and drawbacks of reintroducing a National Identity Card Scheme.
APA, Harvard, Vancouver, ISO, and other styles
16

Edvalson, Michael George. "Trust Broker: A Defense Against Identity Theft From Online Transactions." BYU ScholarsArchive, 2005. https://scholarsarchive.byu.edu/etd/348.

Full text
Abstract:
The proliferation of online services over the years has encouraged more and more people to participate in Internet activities. Many web sites request personal and sensitive information needed to deliver the desired service. Unfortunately, it is difficult to distinguish the sites that can be trusted to protect such information from those that cannot. Many attempts to make the Internet easier to use introduce new security and privacy problems. On the other hand, most attempts at creating a safe online environment produce systems that are cryptic and hard to use. The TrustBroker system is based on a specialized online repository that safely stores user information and helps the user determine which sites can be trusted with their sensitive information. Also, the repository facilitates the transfer of the user's in- formation. The overall effect of the system is to inspire greater confidence in online participation among users who desire to protect their personal information.
APA, Harvard, Vancouver, ISO, and other styles
17

Abdullah. "Knowledge sharing processes for identity theft prevention within online retail organisations." Thesis, University of Central Lancashire, 2017. http://clok.uclan.ac.uk/23998/.

Full text
Abstract:
The occurrence of identity theft has increased dramatically in recent times, becoming one of the fastest-growing crimes in the world. Major challenges associated with identity theft related offences include problems of consumers with credit, such as: aggravation by debt collectors; rejection of loans; disturbance in normal lives such as reputation damage; and the psychological disruption of providing personal data to organisations and banks during the investigation. For these reasons, and with the ready access of identity thieves to the retail industry, this problem is acute in the online retail industry, yet there has been insufficient research undertaken in this domain. This research investigated knowledge sharing processes for identity theft prevention within online retail organisations. An analysis of how individual staff and teams share their knowledge for identity theft prevention in organisations is presented, which includes the investigation of existing barriers in knowledge sharing for identity theft prevention in organisations. A qualitative case study research approach, using the guiding framework proposed by Salleh (2010), was adopted and extended to improve knowledge sharing processes for identity theft prevention in online retail organisations. Three case studies were conducted with leading online retailers in the UK. Data collection included one-to- one semi-structured interviews, internal documents from the researched companies and external documents from various secondary sources. The researcher used the thematic analysis approach using the NVivo software tool and a manual coding process. The total number of interviews was 34 across 3 case studies, with each interview lasting between 45 and 75 minutes. The participants were selected according to their experience, knowledge and involvement in solving identity theft issues and knowledge sharing. Investigation of internal documents included email conversations, policy documents and internal conversations such as emails and memos from the researched companies. This study found that knowledge of identity theft prevention is not being shared within online retail organisations. Individual staff members are learning from their experiences, which is time-consuming. Existing knowledge sharing barriers within the organisations were identified, and improvements in knowledge sharing processes in the online retail industry of the UK using the extended framework are proposed. This research contributes to existing research by providing new insights into knowledge sharing for identity theft prevention. It extends an existing framework proposed by Salleh (2010) in the new context of knowledge sharing processes for ID theft prevention in the retail industry by simplifying the model and combining elements into a more coherent framework. The present study also contributes by investigating the online retail sector for knowledge sharing for ID theft prevention. The empirical research identifies the barriers to knowledge sharing for ID theft prevention and the weaknesses of knowledge sharing in online retail organisations relevant to ID theft prevention. Finally, this study provides managers with useful guidelines for developing appropriate knowledge sharing processes for ID theft prevention in their organisation, and to educate staff in effective knowledge sharing.
APA, Harvard, Vancouver, ISO, and other styles
18

Alleyne, Olson DeCourcey. "Criminalising identity theft : a comparative study of Barbados, England and Australia." Thesis, University of Leicester, 2014. http://hdl.handle.net/2381/28908.

Full text
Abstract:
This thesis examines whether identity theft is an offence in Barbados, England or Australia and, more fundamentally, considers if the criminalisation of the misconduct is justified by reference to the normative theories of harm and morality. The study is a doctrinal and theoretical one that draws on primary and secondary legal materials. Comparative examination of laws of relevance to identity-related misconduct are not new but this is the first involving these three countries, each of which presents a unique feature. More importantly, the thesis contributes to the literature on the special part of the criminal law by commencing detailed normative inquiry into the criminalisation of identity theft. Adopting a conceptualisation based on its folk origins, identity theft is taken to mean the assumption of another’s identity through the use of that person’s personal identification information. The study focuses on the harm which may arise from that core act as distinct from that which may be consequential on conduct facilitated by, or associated with, it. An examination of relevant offences in the countries of choice leads to the conclusion that the misconduct is not a criminal offence. Additionally, the study rejects the practice of sentencing courts in treating identity theft as an aggravating factor as an inadequate denunciation of the misconduct and a breach of the principle of fair labelling. This necessitates the normative enquiry which includes considerations of objectification, ethically grey conduct, human dignity, consent and remote harm. With respect to the latter, the thesis offers a conceptualisation of the role of identity theft in facilitating wrongdoing. The study establishes a prima facie case for criminalisation based on morality, the risk of harm to direct victims and harm to the societal interest in identification.
APA, Harvard, Vancouver, ISO, and other styles
19

Cerda, III Cruz. "Medical Identity Theft and Palm Vein Authentication: The Healthcare Manager's Perspective." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4778.

Full text
Abstract:
The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The research questions were designed to investigate the relationship between intention to adopt palm vein authentication technology and perceived usefulness, complexity, security, peer influence, and relative advantage. The unified theory of acceptance and use of technology was the theoretical basis for this quantitative study. Data were gathered through an anonymous online survey of 109 healthcare managers and doctors, and analyzed using principal axis factoring, Pearson's product moment correlation, multiple linear regression, and 1-way analysis of variance. The results of the study showed a statistically significant positive correlation between perceived usefulness, security, peer influence, relative advantage, and intention to adopt palm vein authentication. No statistically significant correlation existed between complexity and intention to adopt palm vein authentication. These findings indicate that by effectively using palm vein authentication, organizations can mitigate the risk of medical fraud and its associated costs, and positive social change can be realized.
APA, Harvard, Vancouver, ISO, and other styles
20

Leufvén, Claes. "Detecting SSH identity theft in HPC cluster environments using Self-organizing maps." Thesis, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-6818.

Full text
Abstract:

Many of the attacks on computing clusters and grids have been performed by using stolen authentication passwords and unprotected SSH keys, therefore there is a need for a system that can detect intruders masquerading as ordinary users. Our assumption is that an attacker behaves significantly different compared to an ordinary user. Previous work in this area is for example statistical analysis of process accounting using Support Vector Machines. We can formalize this into a classification problem that we will solve with Self-organizing maps. The proposed system will work in a tier model that uses process accounting and SSH log messages as data sources.

APA, Harvard, Vancouver, ISO, and other styles
21

Clement, Junior V. "Strategies to Prevent and Reduce Medical Identity Theft Resulting in Medical Fraud." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4843.

Full text
Abstract:
Medical identity fraud is a byproduct of identity theft; it enables imposters to procure medical treatment, thus defrauding patients, insurers, and government programs through forged prescriptions, falsified medical records, and misuse of victim's health insurance. In 2014, for example, the United States Government lost $14.1 billion in improper payments. The purpose of this multiple case study, grounded by the Health Insurance Portability and Accountability Act as the conceptual framework, was to explore the strategies 5 healthcare leaders used to prevent identity theft and medical identity fraud and thus improve business performance in the state of New York. Data were collected using telephone interviews and open-ended questions. The data were analyzed using Yin's 5 step process. Based on data analysis, 5 themes emerged including: training and education (resulting to sub-themes: train employees, train patients, and educate consumers), technology (which focused on Kiosk, cloud, off-site storage ending with encryption), protective measures, safeguarding personally identifiable information, and insurance. Recommendations calls for leaders of large, medium, and small healthcare organizations and other industries to educate employees and victims of identity theft because the problems resulting from fraud travel beyond the borders of medical facilities: they flow right into consumers' residences. Findings from this study may contribute to social change through improved healthcare services and reduced medical costs, leading to more affordable healthcare.
APA, Harvard, Vancouver, ISO, and other styles
22

Balasubramaniyan, Vijay A. "Effective identities for trusted interactions in converged telecommunication systems." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/44920.

Full text
Abstract:
Telecommunication systems have evolved significantly and the recent convergence of telephony allows users to communicate through landlines, mobile phones and Voice over IP (VoIP) phones. Unfortunately this convergence has resulted in easy manipulation of caller identity, resulting in both VoIP spam and Caller ID spoofing. In this dissertation, we introduce the notion of effective identity which is a combination of mechanisms to (1) establish identity of the caller that is harder to manipulate, and (2) provide additional information about the caller. We first use effective identities to address the VoIP spam problem by proposing CallRank, a novel mechanism built around call duration and social network linkages to differentiate between a legitimate user and a spammer. To ensure that this mechanism is privacy preserving, we create a token framework that allows a user to prove the existence of a social network path between him and the user he is trying to initiate contact with, without actually revealing the path. We then look at the broader issue of determining identity across the entire telecommunication landscape to address Caller ID spoofing. Towards this, we develop PinDr0p, a technique to determine the provenance of a call - the source and the path taken by a call. In the absence of any verifiable metadata, provenance offers a means of uniquely identifying a call source. Finally, we use anomalies in timbre to develop London Calling, a mechanism to identify geography of a caller. Together, the contributions made in this dissertation create effective identities that can help address the new threats in a converged telecommunication infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
23

Downing, Christopher O'Brien Jr. "Developing a Practical Intervention to Prevent Identity Theft: A Behavioral-Science Field Study." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/41968.

Full text
Abstract:
Cashiers' identification-checking behaviors were observed at two grocery stores with the aim to actively involve cashiers in decreasing credit-card fraud. After baseline observations, cashiers at one store received a participative goal-setting and feedback intervention, whereby they collaboratively set a store goal for checking customers' identification. Over 23 days, the cashiers received one-to-one verbal feedback on their store's identification-checking percentages. The percentage of identification-checked purchases at the intervention store increased from 0.2 percent at Baseline to 9.7 percent during the Intervention. Then, it declined to 2.3 percent during Withdrawal, showing functional control of the intervention over the cashiers' target behavior. The cashiers at the other store served as the control group, and their percentage of identification-checked purchases were 0.3 percent, 0.4 percent, and 0.7 percent respectively during each of the A-B-A phases at the intervention store. It was also found the intervention affected male cashiers more than female cashiers. The present study also assessed the social validity of the current intervention by surveying both customers and cashiers from the intervention store. The results showed that customers do not mind getting their ID checked, while cashiers consider it important to check a customer for identification during a credit purchase.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
24

Berg, Sara E. "Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies /." Link to online version, 2006. https://ritdml.rit.edu/dspace/handle/1850/1647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Chohan, Rozina. "An evaluation of inter-organisational identity theft knowledge sharing practice in the UK retail sector." Thesis, University of Central Lancashire, 2016. http://clok.uclan.ac.uk/18611/.

Full text
Abstract:
Knowledge is an essential source of competitive advantage in modern society and is particularly important in the current on-line environment due to increased business interactions throughout the world. Knowledge sharing initiatives taken by organisations to improve technicalities to tackle cyber threat have been extensively investigated. A particular focus of this study was on the security professionals sharing their learning experience in order to help address and mitigate identity theft. Multiple case studies were employed to interpret the triangulated data collected. ShoppingCo, PaymentCo, TeleCo, and NetworkingCo participated in this investigation. Semi structured interviews were scheduled and conducted in conjunction to company reports, personal communication, presentation slides and related materials was gathered to ensure trustworthiness and authenticity. Pattern matching analysis was employed to draw conclusions by evaluating 30 transcripts and 11 internal documents. The major theoretical contribution of this study was the proposal of a conceptual framework that adapts for private sector organisations knowledge sharing elements in the security profession. Lack of knowledge of the manager’s role is addressed. Current knowledge sharing and corporate communication practices are synthesised. Formal and informal communication, social forums and networking events are evaluated. Thus, improving the current understanding of identity theft. This empirical study contributes to an improved understanding of inter-organisational knowledge sharing practice within three retailers and an official networking forum. Because of this evaluation, an extended framework is proposed and components synthesised into a new framework. Recommendations are drawn based on an evaluation of what is working and what does not seem to be providing benefits with regard to knowledge that address and mitigate identity theft. The framework suggested that the key to improved knowledge sharing was to persuade a range of security officials working for different private sector organisations to share their knowledge of identity theft prevention.
APA, Harvard, Vancouver, ISO, and other styles
26

Johnson, Mireille. "Am I who I say I am? a systems analysis into identity fraud in New Zealand." AUT University, 2009. http://hdl.handle.net/10292/828.

Full text
Abstract:
The purpose of this thesis was to research the systems issues surrounding identity fraud in New Zealand. There is only limited published research on the topic, either at an academic or industry level. The New Zealand Government has been conducting work in identity fraud in recent times but New Zealand appears to be lagging behind other similar westernised countries in terms of developing specific identity fraud policy or legislative provisions. The research showed that New Zealand does have serious problems in its systems, which in some cases facilitate identity fraud. There is a lack of synchronicity between New Zealand Government systems which undermines a whole of government approach to minimising the risk of identity fraud. Issues in the private sector with identity fraud are just as serious, with financial advantage being one of the main reasons that identity fraud is committed. However, the lack of information sharing between the public and private sectors does not help stem the flow of identity fraud that is currently occurring. Finding policy solutions to combat identity fraud is far from being simplistic. Public policy in this area is fraught with social, political and financial implications. Identity fraud is committed with speed while public policy faces a slow battle with red tape. Nonetheless, the New Zealand Government does not even appear to categorically know what is happening on its own door step with respect to identity fraud. There are no statistics on identity fraud and no concrete figures as to the cost of identity fraud to New Zealand. To compound problems, identity fraud is not even an official offence classification so even when it is occurring, it is not always being recorded. The damage resulting from identity fraud can be catastrophic. Identity fraud is a breeder crime for other offences. It can enable an act of terrorism to occur, women and children to be trafficked, and organisations and individuals to suffer serious financial loss. In New Zealand however, the benefits of identity fraud can be great while the deterrents are weak. New Zealand faces potential harm to its international reputation if its systems are not strengthened to fight identity fraud. In order for this to occur, New Zealand needs to develop a specific identity fraud policy so that it has the basic knowledge in place to allocate the necessary resources to this problem.
APA, Harvard, Vancouver, ISO, and other styles
27

Okeke, Romanus Izuchukwu. "The prevention of internal identity theft-related crimes : a case study research of the UK online retail companies." Thesis, University of Central Lancashire, 2015. http://clok.uclan.ac.uk/12124/.

Full text
Abstract:
Ranked the third biggest cyber security threats of 2013 by Forbes, Internal Identity Theft-Related Crimes (IIDTRC) leave countless victims in their wake, including online retail companies and consumers. With the rapid growth in the use of credit and debit cards in e-commerce, the online retail has been a key target for the IIDTRC perpetrators. IIDTRC involve the misuse of information systems (IS) by the dishonest employees to steal victims’ personal identifiable data. The crimes pose significant socio-economic impact and data security risks. In the context of online retail, relatively little research has been done to prevent IIDTRC. A few studies focus on situational-based IIDTRC prevention approach built on an independent use of software security. Others develop IIDTRC prevention frameworks in the context of generic e-businesses. The majority of the frameworks have little or no grounded empirical research. This research entitled the ‘The Prevention of Internal Identity Theft-Related Crimes: A Case Study Research of the UK Online Retail Companies’, attempts to bridge this research gap. It provides answers to two questions – what is the nature of IIDTRC in online retail companies and what framework can be used for IIDTRC prevention. This research set out three aims to answer the two questions. First, it provides understanding of causes, methods of carrying out and prevention of IIDTRC. Second, it extends a role-based framework (RBF) for the prevention of IIDTRC. Third, it evaluates the extent the RBF can be applied in the prevention of IIDTRC in online retail companies. A qualitative case study was used to achieve these aims. The empirical data were collected in the northwest of UK from 2011 to 2013. The field study was carried through archival analysis, semi-structured interview and participant observation. Organisational role theory (ORT) was used to guide the concept of a role-based framework (RBF) – a collaborative approach where the key components of management work in unison is required to prevent IIDTRC. The attributes of RBF were synthesised from the recommended IIDTRC prevention practices. The empirical evidence suggests that IIDTRC perpetrators in online retail companies are likely to be the top management and call centre employees. The findings suggest that online retail consumers’ credits/debits cards details are as much vulnerable to IIDTRC as the companies’ identities such as trade secrets and trademarks. Furthermore, the common methods used by the IIDTRC perpetrators include collaboration, collusion, infiltration and social engineering. Some of the IIDTRC prevention practices, of which the majority is software security, are implemented without considering the contribution of human-centred security based on management roles. In examining the contribution of the management roles in implementing Information Systems security practices, major challenges that are faced by online retail companies were identified. They include lack of resources, lack of management support and lack of IIDTRC prevention awareness training. This research concludes that an application of RBF can reduce the impact of the identified challenges. This was suggested by applying RBF in conducting IS security auditing in three online retail companies. The finding from the selected companies suggests that the RBF approach can maximise management performance in providing effective IIDTRC prevention practices. It provides better returns on cost, quality and time in the IS security auditing. It has an impact on management attitudes on preventing IIDTRC by clarifying and aligning their roles in implementing effective IS security auditing. There is heterogeneity of this effect across the companies suggesting that some are utilising the RBF approach while others are not. The finding confirms the plausibility of the RBF attributes. It suggests that the human-centred security play an integral role for effective internal data security in preventing IIDTRC. It suggests that it pays to use the collaborative management roles approach for implementing IIDTRC prevention practices. Furthermore, the use of the RBF approach can improve the effectiveness of the online retail companies in preventing IIDTRC. The findings suggest that benefits may accrue from the RBF approach when supplemented with a collaborative IS auditing. The benefits depend on the level of management IT skills, their perception of their roles, top management support and the organisational operations. This research contributes to the literature in identity theft prevention in online retail. To IS security practitioners, it identifies the data security challenges and IIDTRC prevention practices. To theory, it extends a role-based framework for IIDTRC prevention. To the emerging research in the digital economy, it puts forward as a robust starting point for further related works in cyber security, cybercrimes prevention and criminology.
APA, Harvard, Vancouver, ISO, and other styles
28

Brandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.

Full text
Abstract:
Detta examensarbete undersöker riskerna med elektronisk identifiering, mer specifikt säkerhetsrisker kring enheten BankID i Sverige. Idag används BankID i stor utsträckning, men elektronisk identifiering kommer också med vissa risker när det gäller identitetsrelaterade brott. I Sverige var brottstypen som ökade mest det senaste året mätt i anmälda brott, bedrägerier som huvudsakligen begåtts genom informationsteknik. Arbetet syftar därför till att undersöka vilka säkerhetsrisker som finns med den elektroniska identifieringen BankID, och hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott på detta område. Resultatet visar att den största säkerhetsrisken med BankID är användare/kunder som kan luras. Gärningsmän använder olika metoder för att få tillgång till andra personer BankID. Vad gäller hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott riktade mot elektronisk identifiering är resultatet delvis bristfälligt på grund av att Ekobrottsmyndigheten inte är representerade. Utifrån polisens perspektiv så undersöker de bedrägeri avseende BankID så som de gör med alla andra brott, men brottet har generellt en lägre prioritet inom myndigheten. Polisen samarbetar med olika aktörer samt bidrar båda till att utveckla produktens säkerhet och informera kunderna om säkerhet och risker avseende BankID.
This thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
APA, Harvard, Vancouver, ISO, and other styles
29

Wilson, Belinda R. "The Forgotten Signature: An Observational Study on Policy of Securing Identity in Prevention of Identity Theft and Credit/Debit Card Fraud at Retail Store POS Terminals." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3074.

Full text
Abstract:
Identity theft and credit and bank card fraud is increasing in America and worldwide. Given the current statistics of its prevalence and practices around the world, many in government are starting to take critical notice due to its impact on a nation’s economy. Limited amounts of research have been conducted regarding the practices of applying the Routine Activities Theory (Cohen & Felson, 1979) to better equip store managers in understanding the critical need for capable and effective point of sale guardianship for in-store prevention of credit or bank card fraud due to identity theft. This research has used qualitative observational studies to investigate the presence of or lack of capable guardianship at point of sales transactions in large department stores where a majority of in-store credit and bank card fraud loss occurs. Findings conclude an overwhelming lack of capable guardianship at retail store POS terminals.
APA, Harvard, Vancouver, ISO, and other styles
30

Bauer, David Allen. "Preserving privacy with user-controlled sharing of verified information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31676.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010.
Committee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
31

Williams, Clive Kenneth. "Stealing a car to be a man : the importance of cars and driving in the gender identity of adolescent males." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16422/1/Clive_Williams_Thesis.pdf.

Full text
Abstract:
Nationally vehicle theft is associated with approximately 40 fatalities per year with an estimated annual cost of one billion dollars. During 2000 - 2001 almost 139,000 motor vehicles (cars, motor cycles, campervans, and trucks) were stolen across Australia. Vehicle theft is an overwhelmingly adolescent male crime yet gender has not been considered in either policy or program initiatives.----- This thesis used Spence's Multifactorial Gender Identity theory to examine the relationships between vehicle theft, offending, and adolescent male gender identity. Four central research questions were posed:----- 1. Is vehicle theft a gendered behaviour, that is, do some adolescent males engage in vehicle theft to create a particular adolescent male gender identity?----- 2. Do vehicle theft offenders engage in other offending behaviours?----- 3. Are these other offences also used to create a particular adolescent male gender identity and----- 4. Will the use of a variety of gender-related scales to measure gender identity support Spence's Multifactorial Gender Identity Theory that gender identity is multifactorial?----- Study One Parts A and B provided the empirical basis for Studies Two and Three. Part A of Study One examined the "maleness" of vehicle theft and two other problem behaviours: problem drinking and traffic offence involvement. Cross-sectional and longitudinal methodologies were used to investigate a representative sample of 4,529 male high school students in relation to vehicle theft, problem drinking, and traffic offence involvement as a novice driver. Results indicated that "maleness" was significantly related to vehicle theft, problem drinking, and traffic offence involvement. Subsequent analyses, based on Jessor's Problem Behaviour Theory, found a significant relationship between vehicle theft offenders and problem drinking. Study One Part B examined the relationship between masculinity as measured by the Australian Sex Role Scale (ASRS) and problem drinking in a rural sample of 1,248 male high school students. Using a cross sectional methodology, Masculine students were more likely than students in the other gender trait groups to report a range of problem drinking behaviours. Contrary to previous research, both socially desirable and socially undesirable masculine traits were significantly related to most problem drinking behaviours.----- Having established significant relationships between "maleness" and vehicle theft and masculinity and the adolescent problem behaviour of underage drinking, Study Two qualitatively examined the perceptions of adolescent males with histories of vehicle theft in relation to "doing masculinity". Using semi-structured interviews, 30 adolescent males, clients of the juvenile justice system were asked "what do you have to do to be a man?" Vehicle theft was clearly identified as a masculine defining behaviour as were other offending behaviours. Overall, participants nominated very traditional behaviours such as having a job and providing financially for families as essential behaviours in "doing masculinity". It was suggested that in the absence of legal options for creating a masculine gender identity, some adolescent males adopted more readily accessed illegal options. Study Two also canvassed the driving behaviour of adolescent males in stolen vehicles. Crash involvement was not uncommon. Speed, alcohol, and the presence of other adolescent males were consistent characteristics of their driving behaviour. Indigenous and non-Indigenous participants were similar in their responses.----- Study Three compared the gender identity of offender and non-offender adolescent males as measured by three gender-related measures: the ASRS, the Toughness Subscale of the Male Role Norm Scale (TSMRNS) and the Doing Masculinity Composite Scale (DMCS). While the ASRS measured gender traits, the TSMRNS measured masculinity ideology. The DMCS was developed from the responses of participants in Study Two and sought to measure how participants "do masculinity". Analyses indicated vehicle theft was endorsed by just over a third of the sample as a masculine defining behaviour. Overall, offenders were again very traditional in the behaviours they endorsed. When compared to non-offenders, offenders were more likely to endorse illegal behaviours in "doing masculinity" while non-offenders were more likely to endorse legal behaviours. Both offenders and non-offenders strongly endorsed having a car and the ability to drive as masculine defining behaviours.----- In relation to gender traits, non-offenders were more likely than offenders to be classified as Masculine by the ASRS. Surprisingly offenders were more likely to be classified as Androgynous. In relation to masculinity ideology, offenders and non-offenders were similar in their results on the TSMRNS however offenders were more likely to endorse beliefs concerning the need to be tough. Overall Indigenous and non-Indigenous offenders were similar in their responses though Indigenous males were more likely to endorse beliefs concerning the need to be tough. Spence's Multifactorial Gender Identity theory was supported in that the relations between the three gender-related measures were significant but low.----- Results confirmed that vehicle theft was endorsed by a minority of participants as a gendered behaviour. Other offending behaviours were also endorsed by some adolescent males as means to create masculine gender identity. Importantly though both offenders and non-offenders endorsed very traditional behaviours in relation to "doing masculinity". The implications for policy and program initiatives include the acknowledgement of gender identity as an important component in relation to vehicle theft and offending and the desire of adolescent male offenders to engage in legal, traditional male behaviours. In the absence of legal avenues however, some adolescent males may use illegal behaviours to create gender identity. Cars and driving also feature as important components of gender identity for both offenders and non-offenders and these needs to be considered in relation to road safety initiatives.
APA, Harvard, Vancouver, ISO, and other styles
32

Williams, Clive Kenneth. "Stealing a car to be a man : the importance of cars and driving in the gender identity of adolescent males." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16422/.

Full text
Abstract:
Nationally vehicle theft is associated with approximately 40 fatalities per year with an estimated annual cost of one billion dollars. During 2000 - 2001 almost 139,000 motor vehicles (cars, motor cycles, campervans, and trucks) were stolen across Australia. Vehicle theft is an overwhelmingly adolescent male crime yet gender has not been considered in either policy or program initiatives.----- This thesis used Spence's Multifactorial Gender Identity theory to examine the relationships between vehicle theft, offending, and adolescent male gender identity. Four central research questions were posed:----- 1. Is vehicle theft a gendered behaviour, that is, do some adolescent males engage in vehicle theft to create a particular adolescent male gender identity?----- 2. Do vehicle theft offenders engage in other offending behaviours?----- 3. Are these other offences also used to create a particular adolescent male gender identity and----- 4. Will the use of a variety of gender-related scales to measure gender identity support Spence's Multifactorial Gender Identity Theory that gender identity is multifactorial?----- Study One Parts A and B provided the empirical basis for Studies Two and Three. Part A of Study One examined the "maleness" of vehicle theft and two other problem behaviours: problem drinking and traffic offence involvement. Cross-sectional and longitudinal methodologies were used to investigate a representative sample of 4,529 male high school students in relation to vehicle theft, problem drinking, and traffic offence involvement as a novice driver. Results indicated that "maleness" was significantly related to vehicle theft, problem drinking, and traffic offence involvement. Subsequent analyses, based on Jessor's Problem Behaviour Theory, found a significant relationship between vehicle theft offenders and problem drinking. Study One Part B examined the relationship between masculinity as measured by the Australian Sex Role Scale (ASRS) and problem drinking in a rural sample of 1,248 male high school students. Using a cross sectional methodology, Masculine students were more likely than students in the other gender trait groups to report a range of problem drinking behaviours. Contrary to previous research, both socially desirable and socially undesirable masculine traits were significantly related to most problem drinking behaviours.----- Having established significant relationships between "maleness" and vehicle theft and masculinity and the adolescent problem behaviour of underage drinking, Study Two qualitatively examined the perceptions of adolescent males with histories of vehicle theft in relation to "doing masculinity". Using semi-structured interviews, 30 adolescent males, clients of the juvenile justice system were asked "what do you have to do to be a man?" Vehicle theft was clearly identified as a masculine defining behaviour as were other offending behaviours. Overall, participants nominated very traditional behaviours such as having a job and providing financially for families as essential behaviours in "doing masculinity". It was suggested that in the absence of legal options for creating a masculine gender identity, some adolescent males adopted more readily accessed illegal options. Study Two also canvassed the driving behaviour of adolescent males in stolen vehicles. Crash involvement was not uncommon. Speed, alcohol, and the presence of other adolescent males were consistent characteristics of their driving behaviour. Indigenous and non-Indigenous participants were similar in their responses.----- Study Three compared the gender identity of offender and non-offender adolescent males as measured by three gender-related measures: the ASRS, the Toughness Subscale of the Male Role Norm Scale (TSMRNS) and the Doing Masculinity Composite Scale (DMCS). While the ASRS measured gender traits, the TSMRNS measured masculinity ideology. The DMCS was developed from the responses of participants in Study Two and sought to measure how participants "do masculinity". Analyses indicated vehicle theft was endorsed by just over a third of the sample as a masculine defining behaviour. Overall, offenders were again very traditional in the behaviours they endorsed. When compared to non-offenders, offenders were more likely to endorse illegal behaviours in "doing masculinity" while non-offenders were more likely to endorse legal behaviours. Both offenders and non-offenders strongly endorsed having a car and the ability to drive as masculine defining behaviours.----- In relation to gender traits, non-offenders were more likely than offenders to be classified as Masculine by the ASRS. Surprisingly offenders were more likely to be classified as Androgynous. In relation to masculinity ideology, offenders and non-offenders were similar in their results on the TSMRNS however offenders were more likely to endorse beliefs concerning the need to be tough. Overall Indigenous and non-Indigenous offenders were similar in their responses though Indigenous males were more likely to endorse beliefs concerning the need to be tough. Spence's Multifactorial Gender Identity theory was supported in that the relations between the three gender-related measures were significant but low.----- Results confirmed that vehicle theft was endorsed by a minority of participants as a gendered behaviour. Other offending behaviours were also endorsed by some adolescent males as means to create masculine gender identity. Importantly though both offenders and non-offenders endorsed very traditional behaviours in relation to "doing masculinity". The implications for policy and program initiatives include the acknowledgement of gender identity as an important component in relation to vehicle theft and offending and the desire of adolescent male offenders to engage in legal, traditional male behaviours. In the absence of legal avenues however, some adolescent males may use illegal behaviours to create gender identity. Cars and driving also feature as important components of gender identity for both offenders and non-offenders and these needs to be considered in relation to road safety initiatives.
APA, Harvard, Vancouver, ISO, and other styles
33

Solis, Arredondo Cynthia. "L'usurpation d'identité numérique sur Internet : Etude comparée des solutions françaises, mexicaines et nord-américaines." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS023/document.

Full text
Abstract:
L'identité numérique des personnes est devenue une des plus importantes valeurs immatérielles dans la vie quotidienne, la réputation personnelle, académique, le profil et le déroulement de la carrière professionnelle, mais encore plus que ça, la liberté d'être sur la toile sans avoir peur de l'usurpation de notre identité est l'inspiration de ce travail de thèse. Dans le monde numérique les frontières n'existent plus, les interactions avec les personnes de tout le monde sont de plus en plus courantes, le commerce électronique, les réseaux sociaux, les démarches administratives en ligne, l’échange d’information entre pays et gouvernements, et aussi les rapports romantiques dans les applications mobiles, c’est aussi la raison d’être une étude de droit comparé entre le droit mexicain, français et américain. Dans la première partie nous développons les éléments de l’identité numérique, les données personnelles comprises dans l’ensemble de ce concept qui est à la fois mal compris et en conséquence mal protégé mais aussi très importante dans le développement de l’économie numérique. La deuxième partie, comprend les interprétations de l’identité numérique dans le domaine du droit pénal du droit administratif et du droit civil et commercial. Il y a notamment des différences entre l’interprétation qui fait le droit pénal de l’identité en tant que bien juridique protégé ; en comparaison avec les interprétations du droit administratif qui protège l’identité numérique en tant que donnée personnelle, la mise en œuvre de la reconnaissance internationale du droit à la protection des données à caractère personnel et devient la régulation qui définit les règles de leur traitement, ainsi qui impose les sanctions au traitement illicite et de l’autre côté le droit civil qui d’une part reconnait le droit de la personnalité et le droit à l’image. La troisième partie est dédiée à l’étude de l’identité numérique comme source d’évolution du droit, ainsi qu’aux atteintes à l’ensemble des éléments qui font partie de cette identité. Le droit est toujours derrière l’innovation et malgré tout, à côté de l’évolution de l’humanité, des inventions, de la technologie et du développement, il existe l’évolution des actes illicites et de moyens de commission des délits dans l’endroit numérique. Même si le phénomène de l’usurpation d’identité n’est pas nouveau, il a surmonté dans le monde dans les cinq dernières années grâce aux nouvelles technologies qui permettent de créer, modifier, altérer, falsifier, reproduire et diffuser les données personnelles, photos et identifiants de façon très rapide et au niveau mondial, ce qui permet de vendre dans le marché noir plein de données personnelles pour après faire différents types d’utilisation illicite, notamment l’usurpation d’identité. Ainsi comme la nouvelle technologie sert à la sophistication des activités illicites, il existe un travail des entreprises de sécurité informatique pour lutter de façon technique contre les atteintes aux systèmes d’information, aux réseaux et à l’information, en particulier les atteintes aux données personnelles, donc, à la fin de cette partie on fait une étude des outils numériques crées à cet effet
The digital identity has become one of the most important immaterial values in everyday life, the personal and academic reputation, the professional profile, but even more than that, the freedom to be on the web without to be afraid of the usurpation of our identity is the inspiration of this thesis work. In the digital world, borders no longer exist, interactions with people around the world are becoming more common, e-commerce, social networks, online procedures, information exchange between countries and governments, and also personal relationships in mobile applications, this is also the reason for being a comparative law study between Mexican, French and American law. In the first part, we develop the elements of digital identity, the personal data included in the whole of this concept which is both misunderstood and therefore poorly protected but also very important in the development of the digital economy. The second part, understands the interpretations of digital identity in the field of criminal law administrative law and civil and commercial law. In particular, there are differences between the interpretation of the criminal law of identity as protected legal property; in comparison with interpretations of the administrative law that protects the digital identity as personal data, the implementation of international recognition of the right to the protection of personal data and becomes the regulation that defines the rules of their treatment, thus imposing sanctions on the unlawful treatment and on the other side the civil right which a party recognizes the right of the personality and the right to the personal image. The third part is dedicated to the study of digital identity as a source of evolution of the law, as well as to the attacks on all the elements that are part of this identity. Law is always behind innovation and yet, alongside the evolution of humanity, inventions, technology and development, there is the evolution of illicit acts and means of committing crimes in the world digital environment. Even though the phenomenon of identity theft is not new, it has overcome in the world in the last five years thanks to new technologies that allow to create, modify, alter, falsify, reproduce and disseminate personal data, photos and identifiers in a very fast and global way, which allows to sell in the deep web full of personal data for later to make different types of illegal use, including identity theft. As the new technology is used for the sophistication of illicit activities, there is a work of computer security companies to fight technically against attacks on information systems, networks and information, especially data breaches of personal data, so at the end of this part we do a study of digital tools created for this purpose
APA, Harvard, Vancouver, ISO, and other styles
34

Megaw, Gregory M. "Phishing within e-commerce: reducing the risk, increasing the trust." Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/376.

Full text
Abstract:
E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
APA, Harvard, Vancouver, ISO, and other styles
35

Lynch, Nicholas J. "Feeding Phishers." DigitalCommons@CalPoly, 2009. https://digitalcommons.calpoly.edu/theses/139.

Full text
Abstract:
Phishing campaigns continue to deceive users into revealing their credentials, despite advancing spam filters, browser and toolbar warnings, and educational efforts. Recently, researchers have begun investigating how fake credentials --- or honeytokens --- can be used to detect phishing sites and protect users. BogusBiter, one such work, creates sets of honeytokens based on users' real credentials and sends them alongside real user submissions to phishing sites. In this paper, we present Phish Feeder, an anti-phishing tool which extends the BogusBiter honeytoken generation algorithm in order to create more realistic and authentic-looking credentials. Phish Feeder also employs a ``honeytoken repository'' which stores generated credentials and provides a lookup service for legitimate sites that encounter invalid credentials. The Phish Feeder client is implemented as a Firefox extension and the repository is implemented as a Java web application. We compare the effectiveness of the Phish Feeder generation algorithm to that of the previous work and find that it is up to four times as effective at hiding real users' credentials within a set. Furthermore, we find that Phish Feeder introduces only negligible overhead during normal browsing, and a low overhead during credential creation and submission.
APA, Harvard, Vancouver, ISO, and other styles
36

Selinger, David Emanuel. "Designing a Security Education Curriculum Using Gamification Principles." Kent State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=kent1574424122762057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Blackwood-Brown, Carlene G. "An Empirical Assessment of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy, Perceived Risk of Identity Theft, Attitude, and Motivation to Acquire Cybersecurity Skills." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1047.

Full text
Abstract:
Cyber-attacks on Internet users have caused billions of dollars in losses annually. Cybercriminals launch attacks via threat vectors such as unsecured wireless networks and phishing attacks on Internet users who are usually not aware of such attacks. Senior citizens are one of the most vulnerable groups who are prone to cyber-attacks, and this is largely due to their limited cybersecurity awareness and skills. Within the last decade, there has been a significant increase in Internet usage among senior citizens. It was documented that senior citizens had the greatest rate of increase in Internet usage over all the other age groups during the past decade. However, whenever senior citizens use the Internet, they are being targeted and exploited particularly for financial crimes, with estimation that one in five becoming a victim of financial fraud, costing more than $2.6 billion per year. Increasing the cybersecurity awareness and skills levels of Internet users have been recommended to mitigate the effects of cyber-attacks. However, it is unclear what motivates Internet users, particularly senior citizens, to acquire cybersecurity skills so that they can identify as well as mitigate the effects of the cyber-attacks. It is also not known how effective cybersecurity awareness training are on the cybersecurity skill level of senior citizens. Therefore, the main goal of this quantitative study was to empirically investigate the factors that contributed to senior citizens’ motivation to acquire cybersecurity skills so that they would be able to identify and mitigate cyber-attacks, as well as assess their actual cybersecurity skills level. This was done by assessing a model of contributing factors identified in prior literature (senior citizens’ cybersecurity awareness, computer self-efficacy, perceived risk of identity theft, & older adults’ computer technology attitude) on the motivation of senior citizens to acquire cybersecurity skills. This study utilized a Web-based survey to measure the contributing factors and a hands-on scenarios-based iPad app called MyCyberSkills™ that was developed and empirically validated in prior research to measure the cybersecurity skills level of the senior citizens. All study measures were done before and after cybersecurity awareness training (pre- & post-test) to uncover if there were any differences on the assessed models and scores due to such treatment. The study included a sample of 254 senior citizens with a mean age of about 70 years. Path analyses using Smart PLS 3.0 were done to assess the pre- and post-test models to determine the contributions of each contributing factor to senior citizens’ motivation to acquire cybersecurity skills. Additionally, analysis of variance (ANOVA) and analysis of covariance (ANCOVA) using SPSS were done to determine significant mean difference between the pre-and post-test levels of the senior citizens’ cybersecurity skill level. The path analysis results indicate that while all paths on both models were significant, many of the paths had very low path coefficients, which in turn, indicated weak relationships among the assessed paths. However, although the path coefficients were lower than expected, the findings suggest that both intrinsic and extrinsic motivation, along with antecedents such as senior citizens’ cybersecurity awareness, computer self-efficacy, perceived risk of identity theft, and older adults’ computer technology attitude significantly impact the cybersecurity skill levels of senior citizens. The analysis of variance results indicated that there was a significant increase in the mean cybersecurity skills scores from 59.67% to 64.51% (N=254) as a result of the cybersecurity awareness training. Hence, the cybersecurity awareness training was effective in increasing the cybersecurity skill level of the senior citizens, and empowered them with small but significant improvement in the requisite skills to take mitigating actions against cyberattacks. The analysis of covariance results indicated that, except for years using computers, all the other demographic indicators were not significant. Contributions from this study add to the body of knowledge by providing empirical results on the factors that motivate senior citizens to acquire cybersecurity skills, and thus, may help in reducing some of the billions of dollars in losses accrued to them because of cyber-attacks. Senior citizens will also benefit in that they will be better able to identify and mitigate the effects of cyber-attacks should they attend cybersecurity awareness trainings. Additionally, the recommendations from this study can be useful to law enforcement and other agencies that work with senior citizens in reducing the number of cases relating to cybersecurity issues amongst senior citizens, and thus, free up resources to fight other sources of cybercrime for law enforcement agencies.
APA, Harvard, Vancouver, ISO, and other styles
38

Al-Hamar, Mariam Khalid. "Reducing the risk of e-mail phishing in the state of Qatar through an effective awareness framework." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/7272.

Full text
Abstract:
In recent years, cyber crime has focused intensely on people to bypass existing sophisticated security controls; phishing is one of the most common forms of such attack. This research highlights the problem of e-mail phishing. A lot of previous research demonstrated the danger of phishing and its considerable consequences. Since users behaviour is unpredictable, there is no reliable technological protective solution (e.g. spam filters, anti-viruses) to diminish the risk arising from inappropriate user decisions. Therefore, this research attempts to reduce the risk of e-mail phishing through awareness and education. It underlines the problem of e-mail phishing in the State of Qatar, one of world s fastest developing countries and seeks to provide a solution to enhance people s awareness of e-mail phishing by developing an effective awareness and educational framework. The framework consists of valuable recommendations for the Qatar government, citizens and organisations responsible for ensuring information security along with an educational agenda to train them how to identify and avoid phishing attempts. The educational agenda supports users in making better trust decisions to avoid phishing that could complement any technical solutions. It comprises a collection of training methods: conceptual, embedded, e-learning and learning programmes which include a television show and a learning session with a variety of teaching components such as a game, quizzes, posters, cartoons and a presentation. The components were tested by trial in two Qatari schools and evaluated by experts and a representative sample of Qatari citizens. Furthermore, the research proves the existence and extent of the e-mail phishing problem in Qatar in comparison with the UK where people were found to be less vulnerable and more aware. It was discovered that Qatar is an attractive place for phishers and that a lack of awareness and e-law made Qatar more vulnerable to the phishing. The research identifies the factors which make Qatari citizens susceptible to e-mail phishing attacks such as cultural, country-specific factors, interests and beliefs, religion effect and personal characteristics and this identified the need for enhancing Qatari s level of awareness on phishing threat. Since literature on phishing in Qatar is sparse, empirical and non-empirical studies involved a variety of surveys, interviews and experiments. The research successfully achieved its aim and objectives and is now being considered by the Qatari Government.
APA, Harvard, Vancouver, ISO, and other styles
39

Raza, Syed Qamar. "Selecting Online Vendors by Privacy Risks." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/282.

Full text
Abstract:
Many people have growing concerns about privacy issues, especially the treatment of personal information. Other researchers have demonstrated that consumers do not effectively use privacy policies while shopping online. Current research tends to focus on the contents of Online Privacy Policy (OPP). Often the OPP contains items to meet vendor interests rather than consumer concerns, such as how well the OPP reduces privacy risk. Moreover, various approaches interpret the contents of the OPP rather than the OPP effects on reducing privacy risk. These approaches have not made a substantial impact on consumer selection of a vendor. The research distinguished two types of Privacy Protection Information (PPI): the level of Vendor Privacy Risk (V) added by vendor practices allowed by the OPP and the level of Online Privacy Risk (O) not reduced by the OPP. A survey presented for each vendor the two types of PPI together with a product price. The results indicate that the respondents readily used PPI and preferred to have no Online Privacy Risk rather than no Vendor Privacy Risk. Of the six demographics attributes of the respondent, only the frequency of online shopping and the concern for privacy significantly increased the use of PPI. Recommendations were made for future research.
APA, Harvard, Vancouver, ISO, and other styles
40

Jassim, Hamdi Taih. "The efficacy of Iraq law to deal with identity theft and proposals for a more legally effective solution, with comparative references to US and UK laws." Thesis, Bangor University, 2014. https://research.bangor.ac.uk/portal/en/theses/the-efficacy-of-iraq-law-to-deal-wqith-identity-theft-and-proposals-for-a-more-legally-effective-solution-with-comparative-references-to-us-and-uk-laws(a1d2279c-11f6-4081-96de-7c19c9db9c3c).html.

Full text
Abstract:
This thesis deals with a specific type of crime, which is, today called a millennium crime. This crime is identity theft. It is not a new crime, but technological development makes it a difficult crime to combat, as nowadays it can be committed by both traditional, so-called non-sophisticated methods, and by more sophisticated, technological means, since the advent of the internet. Identity theft is a crime committed against a person’s means of identification or their financial information. The criminal, legally or illegally obtains another person’s means of identification for the purpose of either himself (or others) using it to commit other illegal activities. Iraq, currently, has no dedicated law to deal with identity theft. Therefore, the Iraq courts will find it difficult when they seek to apply existing legal texts, to deal with it effectively. Through an examination of Iraqi criminal laws, this thesis will assess whether existing Iraq criminal law is adequate to combat identity theft, and it will assess whether Iraq courts can effectively judge an accused who obtains another person’s means of identification, and then uses to commit other crimes. It seems that, first sight that identity theft shares common elements with theft offence in Iraq law, and thus, the Iraqi courts may use the current theft offence laws to fight identity theft, but this study will show that this has limitations and drawbacks. Comparative analysis with the relevant UK and US laws used to combat identity theft will form part of this analysis, in an effort to assess the effectiveness of this approach, and illustrate its weaknesses. While this thesis preparation was being undertaken, the Iraqi Government proposed a project called the Information Crimes Project 2011. This project inter alia proposed to govern identity theft with new model laws. This thesis demonstrates that this project will not succeed in realising this objective, and the thesis shows, in conclusion, existing laws, as well as proposed laws, are inadequate to govern identity theft in Iraq, and their inadequacy requires either a judicial or legislative solution. The thesis demonstrates the limitations of judicial solution because the application of the principle of legality, and concludes that the most effectively way for Iraq to combat identity theft would be to enact a new, dedicated law to fight identity theft. To assist the Iraqi legislature to enact an appropriate piece of legislation, this thesis analyses relevant UK and US laws, and assesses elements of those laws, and their utility for the Iraqi legislature, should it seek to borrow or adopt provisions from them for a new Iraqi identity theft law. One of the key findings of this thesis is that the actual identity theft must be criminalised, and this is something that is not a feature in laws of other jurisdictions, although there are several elements of other jurisdictions’ laws which, if suitable adapted, could be useful incorporated into an Iraqi identity theft law. This thesis concludes by proposing recommendation that will be guide the Iraqi legislature if it intends to enact a dedicated identity theft law at some point in the near future.
APA, Harvard, Vancouver, ISO, and other styles
41

McRae, Craig Michael. "Using Web bugs and honeytokens to investigate the source of phishing attacks." Master's thesis, Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-04012008-220800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Persson, Anders. "Exploring Phishing Attacks and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3620.

Full text
Abstract:
Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems. This, the attacker has considered and instead use “social engineering” attacks, such as phishing to gain access to the information inside [1] [15] [21]. Phishing is a growing problem that many different companies are trying to develop a working protection against. The number of new phishing-sites per month increased by 1363 % between January 2005 and October 2006, from 2560 to 37 444 attacks [3] [2]. Today there are several different antiphishing applications as well as implemented methods to prevent attacks, but it’s not certain they giving enough protection. In this paper we plan to investigate the concept of phishing to better understand the threat it provides. We will analyse 252 different phishing attacks and examine a number of existing antiphishing applications to see if there are possibilities to improve the different protection methods to improve the accuracy of such tools.
APA, Harvard, Vancouver, ISO, and other styles
43

GOMES, Anselmo Lacerda. "Mapeamento de incidentes com identidades digitais e estratégias de controle em ambientes virtuais." Universidade Federal de Pernambuco, 2015. https://repositorio.ufpe.br/handle/123456789/16377.

Full text
Abstract:
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2016-04-07T13:22:15Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) AnselmoLacerdaGomesCInMsc (19-11-2015).pdf: 2341760 bytes, checksum: 06c1abb20d748a6921088b434a7b7cb3 (MD5)
Made available in DSpace on 2016-04-07T13:22:15Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) AnselmoLacerdaGomesCInMsc (19-11-2015).pdf: 2341760 bytes, checksum: 06c1abb20d748a6921088b434a7b7cb3 (MD5) Previous issue date: 2015-08-31
O Roubo de Identidade Digital (RID) é o roubo de informações que resulta na possibilidade de alguém assumir a identidade da vítima. Em decorrência disso, credenciais de acesso e dados dispostos em qualquer meio eletrônico ficam vulneráveis, como em computadores e em dispositivos móveis. Ultimamente, esses dispositivos têm sido bastante visados pelos atacantes, devido à sensibilidade e pessoalidade dos dados nele armazenados. Senhas, informações bancárias, financeiras e de geolocalização são apenas alguns exemplos de dados expostos a essa vulnerabilidade moderna. O RID é uma prática que pode resultar no êxito de diversos outros crimes associados, por exemplo, estelionato, espionagem, ciberterrorismo e ciberguerra. Suas implicações são sérias, já que o atacante pode assumir o controle de instalações industriais, centros militares, governos e organizações inteiras, sendo imprevisíveis os danos à ordem pública e aos cidadãos. Neste trabalho foi utilizada a metodologia de mapeamento sistemático para identificar quais são os principais incidentes de segurança associados ao RID. Relações e relativizações foram realizadas a fim de mapear as suas principais causas e consequências. A principal contribuição desta dissertação é o mapeamento sistemático de RID. Finalmente, esta dissertação de mestrado objetivou delinear o conhecimento sobre o assunto, de forma atualizada, indicando diretrizes para a minimização ou completa prevenção de incidentes dessa natureza.
The Digital Identity Theft (DIT) is the stealing of information that allows the attacker to take the victim’s identity, somehow. This promotes the access to credentials and data disposed in computers, mobile devices or any electronic environment, making them vulnerable. Recently, mobile devices are being very targeted because of the sensibility and personality of the data found there. Passwords, bank, financial and geolocation information are just some examples of data being exposed by this modern vulnerability. DIT is a practice that may result in the success of many other associated crimes, like embezzlement, espionage, cyberterrorism and cyberwar. Its implications are serious because the attacker can assume the control of industrial facilities, military centres, government and entire organizations, damaging the public order and the people to an unpredictable extent. This work used the systematic mapping methodology to identify which are the main security incidents related to DIT. Relations and relativizations were performed to map its main causes and consequences. Finally, this dissertation aimed to delineate the knowledge on the subject, indicating guidelines to minimize or avoid entirely incidents with this nature.
APA, Harvard, Vancouver, ISO, and other styles
44

Ruškys, Vaidas. "Įvesties duomenų analizė tapatybės vagysčių prevencijai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100617_141609-17930.

Full text
Abstract:
Šiame darbe aptariamos vartotojų internete tykančios grėsmės, susijusios su tapatybės vagystėmis. Aptariamos slaptažodžių žvejybos bei MITM atakos ir jų veikimo principai. Problemos sprendimui siūloma naudoti vieną iš biometrijos dalių - klavišų paspaudimo analizę. Pagrindinis darbo tikslas - atlikus tyrimą nustatyti, ar galima naudojant klavišų paspaudimo analizės metodą sėkmingai sumažinti tapatybės vagystės tikimybę. Pateikiami tyrimo rezultatai naudojant skirtingai veikiančias programas, naudojančias klavišų paspaudimo analizės metodą. Analizuojama, kaip klavišų paspaudimo analizės panaudojimo galimybė kinta keičiant tam tikras analizės sudedamąsias dalis.
This paper analyzes vulnerabilities that internet users face on the internet, which are related to identity theft. Phishing and MITM attacks and their principals are described. For solving this problem is suggested one part of biometrics-Keystroke analysis. Goal of this paper is to analyze possibility to reduce probability of these attacks by using Keystroke analysis. The results of using different types of programs using Keystroke analysis are presented. Analysis off how possibility of usability to use Keystroke analysis differs by changing different parts of Keystroke analysis.
APA, Harvard, Vancouver, ISO, and other styles
45

Alim, Sophia. "Vulnerability in online social network profiles : a framework for measuring consequences of information disclosure in online social networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5507.

Full text
Abstract:
The increase in online social network (OSN) usage has led to personal details known as attributes being readily displayed in OSN profiles. This can lead to the profile owners being vulnerable to privacy and social engineering attacks which include identity theft, stalking and re identification by linking. Due to a need to address privacy in OSNs, this thesis presents a framework to quantify the vulnerability of a user's OSN profile. Vulnerability is defined as the likelihood that the personal details displayed on an OSN profile will spread due to the actions of the profile owner and their friends in regards to information disclosure. The vulnerability measure consists of three components. The individual vulnerability is calculated by allocating weights to profile attribute values disclosed and neighbourhood features which may contribute towards the personal vulnerability of the profile user. The relative vulnerability is the collective vulnerability of the profiles' friends. The absolute vulnerability is the overall profile vulnerability which considers the individual and relative vulnerabilities. The first part of the framework details a data retrieval approach to extract MySpace profile data to test the vulnerability algorithm using real cases. The profile structure presented significant extraction problems because of the dynamic nature of the OSN. Issues of the usability of a standard dataset including ethical concerns are discussed. Application of the vulnerability measure on extracted data emphasised how so called 'private profiles' are not immune to vulnerability issues. This is because some profile details can still be displayed on private profiles. The second part of the framework presents the normalisation of the measure, in the context of a formal approach which includes the development of axioms and validation of the measure but with a larger dataset of profiles. The axioms highlight that changes in the presented list of profile attributes, and the attributes' weights in making the profile vulnerable, affect the individual vulnerability of a profile. iii Validation of the measure showed that vulnerability involving OSN profiles does occur and this provides a good basis for other researchers to build on the measure further. The novelty of this vulnerability measure is that it takes into account not just the attributes presented on each individual profile but features of the profiles' neighbourhood.
APA, Harvard, Vancouver, ISO, and other styles
46

Al-Harby, Fahad M. "Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Full text
Abstract:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist¿s point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users¿ acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO, and other styles
47

Warnke, Jeffery H. "(Re)Presentation and (Re)Production of Ideology: The Case of Grand Theft Auto IV, a Framework for the Analysis of Culture and Violence, and the Role of Critical Media Literacy in an Education for Democratic Citizenship." University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1333736556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Al-Harby, Fahad Mohammed. "Biometric authentication systems for secured e-transactions in Saudi Arabia : an empirical investigation of the factors affecting users' acceptance of fingerprint authentication systems to improve online security for e-commerce and e-government websites in Saudi Arabia." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4415.

Full text
Abstract:
Security is becoming an increasingly important issue for business, and with it comes the need for appropriate authentication; consequently, it is becoming gradually more important to develop secure e-commerce systems. Fraud via the web, identity theft, and phishing are raising concerns for users and financial organisations. In addition, current authentication methods, like passwords, have many problems (e.g. some users write them down, they forget them, or they make them easy to hack). We can overcome these drawbacks by using biometric authentication systems. Biometric systems are being used for personal authentication in response to the rising issue of authentication and security. Biometrics provide much promise, in terms of preserving our identities without the inconvenience of carrying ID cards and/or remembering passwords. This research is important because the securing of e-commerce transactions is becoming increasingly important. Identity theft, hacking and viruses are growing threats to Internet users. As more people use the Internet, more identity theft cases are being reported. This could harm not only the users, but also the reputation of the organisations whose names are used in these illegal acts. For example, in the UK, online banking fraud doubled in 2008 compared to 2007. More users took to e-shopping and online banking, but failed to take necessary protection. For non-western cultures, the figures for web security, in 2008, illustrated that Saudi Arabia was ranked ninth worldwide for users who had been attacked over the web. The above statistics reflect the significance of information security with e-commerce systems. As with any new technology, user acceptance of the new technology is often hard to measure. In this thesis, a study of user acceptance of biometric authentication systems in e-transactions, such as online banking, within Saudi society was conducted. It examined whether Saudis are practically willing to accept this technology. This thesis focuses upon Saudi Arabia, which has developing economy. It has achieved a rapid rate of growth, and therefore makes an interesting and unique case study. From an economist's point of view, Saudi Arabia is the powerhouse of the Middle East. It has the leading regional economy, and, even though it is still relatively young. It has a young and rapid growing population; therefore, this makes Saudi Arabia an attractive potential market for all kinds of e-commerce applications. Having said that, with more than half of population under the age of 30 are more to be expected to take the risk of accepting new technology. For this work, 306 Saudi participants were involved in the experiments. A laboratory experiment was created that actively tested a biometric authentication system in combination with a survey. The Technology Acceptance Model (TAM) was adopted in the first experimental phase as the theoretical basis on which to develop the iv research framework, the model has proven its efficiency as a good predictor for the biometric authentication system. Furthermore, in a second experimental phase, the Unified Theory of Acceptance and Use of Technology (UTAUT) with moderating variables such as age, gender and education level was examined as a proposed conceptual framework to overcome the limitations of TAM. The aim of the study was to explore factors affecting users' acceptance of biometric authentication systems. The findings from Structural Equation Modelling (SEM) analysis indicate that education level is a significant moderating factor, while gender and age do not record as significant. This thesis added new knowledge to this field and highlighted the importance of the perceptions of users regarding biometric security technologies. It helps determine the factors affecting the acceptance of biometric technology. To our knowledge, this is the first systematic study of this issue carried out by academic and non-biased researchers in Saudi Arabia. Furthermore, the thesis presents security technology companies and developers of information security products with information to help in the determination of what is significant to their user base when taking into account the introduction of new secure systems and products.
APA, Harvard, Vancouver, ISO, and other styles
49

Opria, George R. Maraska Donald G. "An analysis of the use of the Social Security Number as Veteran Identification as it relates to identity theft a cost benefit analysis of transitioning the Department of Defense and Veterans Administration to a Military Identification Number /." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FOpria.pdf.

Full text
Abstract:
Thesis (M.S. in Management)--Naval Postgraduate School, March 2007.
Thesis Advisor(s): William D. Hatch, William Gates. "March 2007." Includes bibliographical references (p. 73-76). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
50

Maraska, Donald G. "An analysis of the use of the Social Security Number as Veteran Identification as it relates to identity theft : a cost benefit analysis of transitioning the Department of Defense and Veterans Administration to a Military Identification Number." Thesis, Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/3633.

Full text
Abstract:
Identity theft has become one of the fastest growing crimes in America and stems from the widespread and growing reliance of organizations across the nation to use Social Security Numbers (SSN) as a primary personal identifier. Originally intended for the very limited purpose of tracking social security benefits, the value of the SSN as a unique identifier was quickly recognized, and its use rapidly grew. This â functionality creepâ has led to the SSN becoming an almost de facto national ID number. Employers, universities, credit agencies and financial institutions began using the SSN as a unique personal identifier. The military started to use the SSN as a personal identifier in 1969 in place of the Military Serial Number. Today, the SSN is used pervasively throughout the military, from personnel rosters to medical records, from administrative records to operational orders. This thesis analyzes the elimination of the SSN as the primary personal identifier within the Department of Defense and the Veteransâ Administration, replacing it with a Military Identification Number (MIN). The elimination of the SSN at all but one critical location (pay related matters at the Defense Finance and Accounting System), would render all lost or stolen data useless to an identity thief. A Cost/Benefit Analysis of the transition from SSN to MIN using six methods of analysis
payback period method, discounted payback period, benefit cost ratio, net present value, internal rate of return, and a probabilistic NPV were examined. Each methodâ s benefits and drawbacks are discussed and the findings are summarized. The CBA shows that the transition to a MIN is a cost effective solution with a Net Present Value that falls between $701 million and $554 million over a 10 year period.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography