Login/Create Account
Language:
English
US
China
Cart
0
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
All IGI Global Scholarly Journals Shift to Open Access
Following the first conversion of a portion of IGI Global’s hybrid open access/subscription-based journals to gold open access (OA) in 2021, and then again in 2022, IGI Global is pleased to announce that the remainder of their hybrid open access/subscription-based journal collection will officially convert to gold OA beginning January 1st, 2023.
Learn More
IGI Global’s New Emerging Topic e-Book Collections
Acquire highly focused and affordable Cutting-Edge Peer-Reviewed Research Content through a selection of 17 topic-focused e-Book Collections discounted up to 90%, compared to list prices. Collection topics include Diversity, Equity, and Inclusion (DEI), Artificial Intelligence, Language Learning, Marketing and Customer Relations, Religious and Indigenous Studies, and more. Hosted on the InfoSci
®
platform, these collections feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Learn More
Open Access Book (Free Access) - New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091)
The Walmart Corporation and the Lumina Foundation have provided funding to make the publication, New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091), Fully Open Access, completely removing any paywall between researchers in education and the new models for the future of higher education.
Learn More
Open Access Book (Free Access) - Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054)
Through a Collaboration between IGI Global and the University of North Texas, the Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054) has been published as Fully Open Access, completely removing any paywall between researchers of any field, and the latest research on the equitable and inclusive nature of Open Access and all of its complications.
Learn More
Books
Books
Open Access Books
OnDemand Book Chapters
Journals
Journals
Open Access Journals
OnDemand Journal Articles
e-Collections
Open Access
Open Access Publishing
Open Access Journals
Open Access Books
Retrospective Open Access
Open Access Agreements & Transformative Options
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Identity theft
1.
Assuming the
identity
of another individual by using their photographs, profiles, or e-mail accounts to act in their capacity for nefarious activities.
Learn more in: Investigating Cybercrime in Nigeria
2.
Identity
(ID)
theft
happens when someone steals your personal information to commit fraud.
Learn more in: Cyberbullying Perception and Experience Among the University Students in Bangladesh: A Qualitative Study
3.
This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud. They can also open a phone/internet account in your name, use your name to plan a criminal activity, and claim government benefits in your name. They may do this by finding out users’ passwords through hacking, retrieving personal information from social media, or sending phishing emails.
Learn more in: The Vulnerability of Children in Cyberspace
4.
The act of stealing personal information and user credentials, with the intent of using the information for fraudulent purposes.
Learn more in: Designing Antiphishing Education
5.
appropriation of an individual’s personal information for fraudulent purposes.
Learn more in: Identity Theft through the Web
6.
The crime of stealing sensitive personal information, such as usernames, passwords, date of birth, social security number, and personal and financial information.
Learn more in: Online Phishing and Solutions
7.
A form of stealing someone's
identity
in order to access resources or other benefits in that person's name.
Learn more in: A Routine Activity Theory-Based Framework for Combating Cybercrime
8.
the act of obtaining another person’s identifying information and using it without the person’s knowledge to commit crimes.
Learn more in: Emerging Cybercrime Variants in the Socio-Technical Space
9.
The unauthorized use of another person’s identifying information for financial or personal gain or with intent to commit fraud.
Learn more in: Fear Appeals, Threat Perceptions, and Protection Motivation in Information Systems Security
10.
This is the deliberate use of another person’s profile to commit a crime.
Learn more in: Underground Cyber Economy and the Implication for Africa's Development: A Theoretical Overview
11.
The stealing and use of a person’s
identity
through the acquisition of personal information without that person’s knowledge or permission.
Learn more in: E-Technology Challenges to Information Privacy
12.
The use of another person’s personally identifiable information (e.g., name, social security number, credit card number) to commit a crime.
Learn more in: Digital Security Strategy
13.
It is a type of cyber-attack in which attacker uses the
identity
of the legitimate user over the network especially social networking sites. It is done for the purpose of gaining the access to user’s account login credentials and performs some malicious activity involving user and his friends.
Learn more in: Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
14.
An activity where a perpetrator uses someone else’s personal information without their permission for financial gain. Examples could be credit card and mortgage fraud, where credit is issued to the perpetrator based upon the financial rating of the victim. Perpetrators steal identities in numerous ways: e-mails, key loggers, impersonations, phone calls, and stealing trash from an individual’s home.
Learn more in: Combating Computer Fraud
15.
Identity theft
involves the
theft
of legal
identity
, manifest in
identity
tokens such as SSNs, documents or knowledge of factual information that identifies an individual.
Learn more in: Cyber Identity Theft
16.
Inappropriately using a person’s identifying information, such as social security number or password, to engage in activities under that person’s name.
Learn more in: Human Factors in Information Security and Privacy
17.
The fraudulent use of another person’s personal information.
Learn more in: Privacy, Security, and Identity Theft Protection: Advances and Trends
18.
The forging of someone’s
identity
for the purpose of fraud.
Learn more in: Key Factors and Implications for E-Government Diffusion in Developed Economies
19.
The unauthorized access or stealing of an individual’s personal information, such as Social Security Number, name, or credit card information by an outside party. It is generally used interchangeably with identify fraud.
Learn more in: Dark Web: A Breeding Ground for ID Theft and Financial Crimes
Find more terms and definitions using our
Dictionary Search
.
Identity theft
appears in:
Encyclopedia of Criminal Activities and the Deep...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Identity theft
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 175,500 titles for
Identity theft
to find related research papers.
Learn More About Identity theft in These Related Titles
The Role of Child Life Specialists in Commun...
Social Sciences & Humanities
Copyright 2023. 472 pages.
While the genesis of the Certified Child Life Spec...
In Stock
$29.50 Individual Chapters
Critical Perspectives on Social Justice in S...
Social Sciences & Humanities
Copyright 2021. 355 pages.
There is very little discussion of socially just a...
In Stock
$29.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$29.50 Individual Chapters
Police Psychology and Its Growing Impact on...
Social Sciences & Humanities
Copyright 2017. 345 pages.
Police psychology has become an integral part of p...
In Stock
$29.50 Individual Chapters
Censorship and Student Communication in Onli...
Education
Copyright 2016. 622 pages.
While freedom of speech is a defining characterist...
In Stock
$29.50 Individual Chapters
Modern Societal Impacts of the Model Minorit...
Social Sciences & Humanities
Copyright 2015. 403 pages.
The model minority stereotype is a form of racism...
In Stock
$29.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$29.50 Individual Chapters
Servant Leadership: Research and Practice
Business & Management
Copyright 2014. 405 pages.
Leaders represent a necessary part of any organiza...
In Stock
$29.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$29.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$29.50 Individual Chapters