Showing 121 - 140 results of 257 for search '"Identity theft"', query time: 0.53s Refine Results
  1. 121

    Securing EHRs With a Novel Token-Based and PPoS Blockchain Methodology by Rihab Benaich, Saida El Mendili, Youssef Gahi

    Published 2024-01-01
    “…Its features, such as confidentiality, decentralization, security and privacy, address challenges traditional healthcare systems face, such as phishing, denial of service and identity theft attacks. In this regard, our research paper presents a security solution specifically tailored for healthcare applications. …”
    Get full text
    Article
  2. 122

    Tecnologie dell’informazione e nuovi processi di vittimizzazione / Nouvelles technologies et processus de victimisation / Information technologies and new processes of victimisatio... by Marotta Gemma

    Published 2012-08-01
    “…New technologies, on the one hand, have produced undeniable positive effects, from the acceleration of cultural diffusion to the communication between "worlds" previously unknown; on the other hand, they have become now an instrument to commit new crimes and deviants acts.In the article we will discuss the processes of victimization related to specific offenses (digital identity theft, online paedopornography, cyberstalking) and to new forms of addiction due to the new media. …”
    Get full text
    Article
  3. 123

    MODERN BUSINESS CYBERSECURITY CHALLENGES AND THE ROLE OF ARTIFICIAL INTELLIGENCE IN COUNTERING THREATS by К. Ю. Завражний, А. К. Кулик

    Published 2024-10-01
    “…This study provides detailed information on the implementing of cyber threat protection systems to help companies minimize the risks of cyberattacks, identity theft and other online fraud. The research findings show that artificial intelligence is able not only to automatically identify anomalies in the behavior of users and systems, but also to provide a timely response to threats. …”
    Get full text
    Article
  4. 124

    Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer by Hanissa Rizki Kurnia, Aisyah Zahrah, Elvia Ichsazene Dina Adha, Nur Aini Rakhmawati

    Published 2023-09-01
    “… Data leakage can harm individuals who experience it, such as identity theft, financial fraud, or even physical security threats. …”
    Get full text
    Article
  5. 125

    Trusted Computing Strengthens Cloud Authentication by Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh

    Published 2014-01-01
    “…This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. …”
    Get full text
    Article
  6. 126

    STATUS OF WOMEN IN THE IT BETWEEN 2000-2014 by Ioana-Alexandra CHIRIANU, Irina IONESCU

    Published 2014-11-01
    “…As a result, cyber bullying stands for a main concern nowadays, with women often being bullied over the Internet, or easily becoming victims of identity theft. Women also face an unequal position to men in the IT industry across the studied regions.…”
    Get full text
    Article
  7. 127

    CONFRONTING CHALLENGES IN IMPLEMENTING E-PORTFOLIO VIA FACEBOOK IN A PHILIPPINE UNIVERSITY by Philippe Sipacio

    Published 2015-01-01
    “…The results showed three major issues classified as: (1) strong apprehension of students to publish their writing outputs on-line; (2) resistance of teachers towards FB as an educational tool; and, (3) concerns of institution as regards academic honesty and identity theft on-line. To confront these challenges and ensure effective implementation and sustainability of evFb at DEAL, improving participatory mechanisms was suggested and discussed. …”
    Get full text
    Article
  8. 128

    A wormhole attack detection method for tactical wireless sensor networks by Ke Zhang

    Published 2023-08-01
    “…WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. …”
    Get full text
    Article
  9. 129

    Detecting A Botnet By Reverse Engineering by Oesman Hendra Kelana, Khabib Mustofa

    Published 2013-06-01
    “…Keywords— Malware, Bot, Botnet, Botmaster, Agobot, Spam, Distributed Denial of Services, Identity Theft, Computer Security, Reverse Engineering, Debug, Windows Service, the Registry.…”
    Get full text
    Article
  10. 130

    Data protection for android based wireless mobile devices by Wai, Yan

    Published 2014
    “…Once infected these mobile devices may be involved in many kinds of online criminal activity, including identity theft, unsolicited commercial SMS messages, scams and massive coordinated attacks. …”
    Get full text
    Final Year Project (FYP)
  11. 131

    Intelligent Data Security Solutions for e-Health Applications / by Singh, Amit Kumar, editor 651061, Elhoseny, Mohamed, editor 650905, ScienceDirect (Online service) 7722

    Published 2020
    “…Currently, medical-related identity theft costs billions of dollars each year and altered medical information can put a person’s health at risk through misdiagnosis, delayed treatment or incorrect prescriptions. …”
    Get full text
    software, multimedia
  12. 132

    Threats and Challenges for Security Measures on the Internet of Things by Mohammad Faiz, A.K. Daniel

    Published 2022-05-01
    “…Due to the billions of connected devices, there is a potential risk of data loss, identity theft, device manipulation, trust issues, falsification of data, network/server manipulation, and various impacts in the application of IoT platforms. …”
    Get full text
    Article
  13. 133

    Internet fraud and transnational organized crime by Nadiia Shulzhenko, Snizhana Romashkin

    Published 2020-03-01
    “…The main task of this article is to determine the most common forms of online financial crimes, such as “Hacking” or electronic transmission unintended for the interceptor, such as passwords, credit card information, or other types of identity theft. The article discusses the features of legal regulation and the activities of the Ukraine to protect citizens form Internet frauds and to avoid Internet scams, phishing and other cybercrimes in Internet. …”
    Get full text
    Article
  14. 134

    Privacy Threat MOdeling Language by Andrey Rodrigues, Maria Lucia Bento Villela, Eduardo Luzeiro Feitosa

    Published 2023-01-01
    “…Users of OSNs become victims of identity theft, cyberstalking, and information leakage, which are real threats to privacy. …”
    Get full text
    Article
  15. 135

    EEG-based identification system using deep neural networks with frequency features by Yasaman Akbarnia, Mohammad Reza Daliri

    Published 2024-02-01
    “…Among various methods, electroencephalography-based (EEG-based) identification is a dependable way to prevent identity theft and impersonation. Due to the distractions present in the identification environment, such as lack of focus, mental engagement, small body movements, blinking, and other noises, it is essential to analyze data that reflects these conditions. …”
    Get full text
    Article
  16. 136

    Phishing Attacks: A Recent Comprehensive Study and a New Anatomy by Zainab Alkhalil, Chaminda Hewage, Liqaa Nawaf, Imtiaz Khan

    Published 2021-03-01
    “…Phishing attacks can lead to severe losses for their victims including sensitive information, identity theft, companies, and government secrets. This article aims to evaluate these attacks by identifying the current state of phishing and reviewing existing phishing techniques. …”
    Get full text
    Article
  17. 137

    Email and Website-Based Phishing Attack: Examining Online Users Security Behavior in Cyberspace Environment by kibreab adane, Berhanu Beyene

    Published 2023-01-01
    “…As a result, phishing, an identity theft cyber-attack that targets humans rather than computers, was born to harvest internet users' confidential information by taking advantage of human behavior and hurting an organization's continuity, reputation, and credibility. …”
    Get full text
    Article
  18. 138

    Securing Health Sensing Using Integrated Circuit Metric by Ruhma Tahir, Hasan Tahir, Klaus McDonald-Maier

    Published 2015-10-01
    “…An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. …”
    Get full text
    Article
  19. 139

    Life-long phishing attack detection using continual learning by Asif Ejaz, Adnan Noor Mian, Sanaullah Manzoor

    Published 2023-07-01
    “…Abstract Phishing is an identity theft that employs social engineering methods to get confidential data from unwary users. …”
    Get full text
    Article
  20. 140

    Confusion, control and comfort: premediating identity management in film and television by Turner, G, van Zoonen, L, Harvey, J

    Published 2013
    “…Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. …”
    Journal article