Identity Theft: Breakthroughs in Research and Practice

Editor: Information Resources Management Association
Publication Year: 2016
Publisher: IGI Global

Single-User Purchase Price: $345.00
Unlimited-User Purchase Price: $517.50
ISBN: 978-1-52-250808-3
Category: Social Sciences - Criminology & Law
Image Count: 61
Book Status: Available
Table of Contents

Identity Theft: Breakthroughs in Research and Practice highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when ones identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future.

Share this

This book is found in the following Credo Collections:

Table of Contents

  • Preface
  • Section 1: Fundamental Concepts and Design Methodologies
  • Chapter 1: Privacy, Security, and Identity Theft Protection
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • REGULATORY LAWS AND COMPLIANCE
  • PRIVACY AND SECURITY
  • INCENTIVES AND DETERRENCE FOR PRIVACY PROTECTION
  • FURTHER RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 2: Overview of the U.S. Criminal Justice System and Safety Tips for International Students
  • ABSTRACT
  • INTRODUCTION
  • OVERVIEW OF THE U.S. CRIMINAL JUSTICE SYSTEM
  • INTERNATIONAL STUDENTS AND LEGAL ISSUES IN THE U.S.
  • SAFETY FROM CRIME
  • HATE CRIMES
  • SELF-PROTECTION
  • ALCOHOL AND DRUGS
  • DOMESTIC VIOLENCE
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 3: Identity and Access Management in the Cloud Computing Environments
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • FUNCTIONAL REQUIREMENTS AND CHALLENGES OF THE IAM
  • AUTHENTICATION
  • AUTHORIZATION
  • IDENTITY PROVISIONING AND DE-PROVISIONING
  • FEDERATED IDENTITY MANAGEMENT IN THE CLOUD
  • CLOUD IDENTITY-AS-A-SERVICE
  • INTER-CLOUD IDENTITY MANAGEMENT
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 4: A Routine Activity Theory-Based Framework for Combating Cybercrime
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • ROUTINE ACTIVITY THEORY
  • A UNIFIED FRAMEWORK
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 5: Security and Privacy Issues, Solutions, and Tools for MCC
  • ABSTRACT
  • INTRODUCTION
  • ARCHITECTURE OF MOBILE CLOUD COMPUTING
  • SECURITY-RELATED ISSUES IN MCC
  • SECURITY THREATS AND COUNTER MEASURES
  • TRUST MANAGEMENT IN MOBILE CLOUD COMPUTING ENVIRONMENT
  • AUTHENTICATION AND AUTHORIZATION PROCESS
  • ACCESS CONTROL
  • RSA ALGORITHM
  • DATA ENCRYPTION STANDARD (DES) ALGORITHM
  • ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM
  • TWO-FACTOR AUTHENTICATION (2FA) SYSTEM
  • CLOUD COMPUTING SECURITY ATTACKS
  • DENIAL OF SERVICE (DOS) ATTACK
  • DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK
  • HOW TO PREVENT A DENIAL-OF-SERVICE (DOS) ATTACK?
  • PHISHING ATTACK AND SPOOFING
  • SSL AND TLS
  • TYPES OF CYBER ATTACK OR THREATS
  • FEATURES OF CLOUDSIM (A FRAMEWORK FOR MODELING AND SIMULATION OF CLOUD COMPUTING INFRASTRUCTURES AND SERVICES)
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • Chapter 6: National Security Policy and Strategy and Cyber Security Risks
  • ABSTRACT
  • INTRODUCTION
  • NATIONAL SECURITY POLICY AND CYBER THREATS
  • CYBER-ATTACKS AND THREAT SOURCES
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 7: Identity Management Systems
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. BACKGROUND
  • 3. COMPONENTS OF IDM SYSTEMS
  • 4. ARCHITECTURE
  • 5. ATTRIBUTES OF A GOOD IDM SYSTEM
  • 6. MOST POPULAR SOFTWARE SOLUTIONS
  • 7. EVALUATION FACTORS FOR COMPARING VARIOUS SOLUTIONS
  • 8. CHALLENGES
  • 9. APPLICATIONS
  • 10. STANDARDS RELATED TO IDM SYSTEMS
  • 11. RISK ASSESSMENT
  • 12. CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Section 2: Technologies and Applications
  • Chapter 8: The German Electronic Identity Card
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • GOVERNMENT-OPERATED ELECTRONIC AUTHENTICATION INFRASTRUCTURES: HELPFUL OR USELESS?
  • OPERATION BY THE GOVERNMENT?
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 9: The Role of Radio Frequency Identification in Modern Libraries
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • ROLE OF RADIO FREQUENCY IDENTIFICATION IN MODERN LIBRARIES
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 10: A Novel Technique for Securing E-Commerce Transaction
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. BACKGROUND
  • 3. VISUAL CRYPTOGRAPHY
  • 4. STEGANOGRAPHY
  • 5. PROPOSED METHODOLOGY
  • 6. IMPLEMENTATION AND ANALYSIS
  • 7. CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 11: Analysis of Various Security Issues and Challenges in Cloud Computing Environment
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. PRELIMINARY
  • 3. BARRIERS, SECURITY ISSUES, AND THREATS
  • 4. SECURITY CHALLENGES
  • 5. CURRENT ISSUES AND DISCUSSION
  • 6. CONCLUSION
  • REFERENCES
  • Chapter 12: Cybercrimes Technologies and Approaches
  • ABSTRACT
  • INTRODUCTION
  • MOTIVES OF CYBERCRIMINALS
  • CYBER INCIDENT AND SPENDING TRENDS
  • TYPES OF CYBERATTACKS
  • INTERNATIONAL PRIVACY LAWS
  • U.S. PRIVACY LAWS
  • U.S. CYBERSECURITY STRATEGY
  • EU PRIVACY LAWS
  • EU CYBERSECURITY STRATEGY
  • CYBERSPACE CHALLENGES
  • CIVIL LIBERTY AND PRIVACY CONCERNS
  • TECHNICAL APPROACHES
  • NON-TECHNICAL APPROACHES
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 13: A Wrapper-Based Classification Approach for Personal Identification through Keystroke Dynamics Using Soft Computing Techniques
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • METHODOLOGY
  • EXPERIMENTAL RESULTS
  • CONCLUSION AND FUTURE DIRECTIONS
  • REFERENCES
  • Section 3: Social Implications, Critical Issues, and Emerging Trends
  • Chapter 14: Cyber Risk
  • ABSTRACT
  • INTRODUCTION
  • INFORMATION SECURITY: A GROWING CHALLENGE
  • CYBER RISK IN THE SECURITIES MARKETS: A FOCUS ON THE FINANCIAL SYSTEM
  • THE CYBER RISK MANAGEMENT IN DEVELOPED AND EMERGING MARKETS: A SUMMARY
  • CYBER SECURITY AND CYBER INSURANCE
  • CONCLUSION
  • ACKNOWLEDGMENT
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 15: The Value of Personal Information
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • MAIN FOCUS OF CHAPTER
  • SOLUTIONS AND RECOMMENDATIONS
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 16: How Private Is Your Financial Data?
  • ABSTRACT
  • INTRODUCTION
  • AUTHENTICATION: BACKGROUND
  • ROLE OF AUTHENTICATION IN ONLINE BANKING
  • INTERNET BANKING: ISSUES
  • FRAUD PREVENTION STRATEGIES
  • SYSTEMS AND SOLUTIONS TO ATTACKS IN ONLINE BANKING
  • AUTHENTICATION IN MOBILE BANKING
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 17: Cyber-Crimes against Adolescents
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • CYBER-CRIME AGAINST ADOLESCENTS
  • ISSUES, CONTROVERSIES, PROBLEMS
  • SOLUTIONS AND RECOMMENDATIONS
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 18: Privacy Dangers of Wearables and the Internet of Things
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • ISSUES, CONTROVERSIES, AND PROBLEMS
  • ENTERPRISE SOLUTIONS TO PRIVACY CONCERNS
  • FALLOUT FROM SECURITY BREACHES
  • SOLUTIONS AND RECOMMENDATIONS
  • DATA STORAGE
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • DISCUSSION POINTS
  • QUESTIONS
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 19: User Authentication Based on Dynamic Keystroke Recognition
  • ABSTRACT
  • 1. INTRODUCTION
  • 3. METHODOLOGY FRAMEWORK
  • 4. PROPOSED ALGORITHM
  • 5. ENROLLMENT PHASE
  • 6. AUTHENTICATION RESULT
  • 7. EXPERIMENTAL RESULTS
  • 8. SIMULATION RESULTS
  • 9. SYNTHESIS RESULTS
  • 10. IMPLEMENTATION RESULTS
  • 11. POWER CONSUMPTION ANALYSIS
  • 12. CONCLUSION AND FUTURE WORK
  • ACKNOWLEDGMENT
  • REFERENCES