Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Identity theft

Encyclopedia of Criminal Activities and the Deep Web
Assuming the identity of another individual by using their photographs, profiles, or e-mail accounts to act in their capacity for nefarious activities.
Published in Chapter:
Investigating Cybercrime in Nigeria
Mufutau Temitayo Lamidi (University of Ibadan, Nigeria)
Copyright: © 2020 |Pages: 16
DOI: 10.4018/978-1-5225-9715-5.ch069
Abstract
Advances in ICT have brought both joy and sadness to individuals and organizations. Cybercrime, a byproduct of advances in ICT, is a relatively new area where crime flourishes in Nigeria, and many such cases have been reported by victims at different social forums. This study investigates cybercrime as it affects individuals and the society at large with a view to exposing the tricks often used by fraudsters and offering possible solutions. Data were collected from personal experiences (phone calls and text messages), WhatsApp messages and stories posted on Facebook and Nairaland forums by victims. They were analysed descriptively. The article suggests that tougher legislative sanctions and strict law enforcement by government can curb this menace. Also, through grammatical competence, improved morality as dictated by culture, logical reasoning, and avoidance of greed, individuals can detect fraudulent proposals and escape cyberattacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cyberbullying Perception and Experience Among the University Students in Bangladesh: A Qualitative Study
Identity (ID) theft happens when someone steals your personal information to commit fraud.
Full Text Chapter Download: US $37.50 Add to Cart
The Vulnerability of Children in Cyberspace
This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud. They can also open a phone/internet account in your name, use your name to plan a criminal activity, and claim government benefits in your name. They may do this by finding out users’ passwords through hacking, retrieving personal information from social media, or sending phishing emails.
Full Text Chapter Download: US $37.50 Add to Cart
Designing Antiphishing Education
The act of stealing personal information and user credentials, with the intent of using the information for fraudulent purposes.
Full Text Chapter Download: US $37.50 Add to Cart
Identity Theft through the Web
appropriation of an individual’s personal information for fraudulent purposes.
Full Text Chapter Download: US $37.50 Add to Cart
Online Phishing and Solutions
The crime of stealing sensitive personal information, such as usernames, passwords, date of birth, social security number, and personal and financial information.
Full Text Chapter Download: US $37.50 Add to Cart
A Routine Activity Theory-Based Framework for Combating Cybercrime
A form of stealing someone's identity in order to access resources or other benefits in that person's name.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Cybercrime Variants in the Socio-Technical Space
the act of obtaining another person’s identifying information and using it without the person’s knowledge to commit crimes.
Full Text Chapter Download: US $37.50 Add to Cart
Fear Appeals, Threat Perceptions, and Protection Motivation in Information Systems Security
The unauthorized use of another person’s identifying information for financial or personal gain or with intent to commit fraud.
Full Text Chapter Download: US $37.50 Add to Cart
Underground Cyber Economy and the Implication for Africa's Development: A Theoretical Overview
This is the deliberate use of another person’s profile to commit a crime.
Full Text Chapter Download: US $37.50 Add to Cart
E-Technology Challenges to Information Privacy
The stealing and use of a person’s identity through the acquisition of personal information without that person’s knowledge or permission.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Security Strategy
The use of another person’s personally identifiable information (e.g., name, social security number, credit card number) to commit a crime.
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
It is a type of cyber-attack in which attacker uses the identity of the legitimate user over the network especially social networking sites. It is done for the purpose of gaining the access to user’s account login credentials and performs some malicious activity involving user and his friends.
Full Text Chapter Download: US $37.50 Add to Cart
Combating Computer Fraud
An activity where a perpetrator uses someone else’s personal information without their permission for financial gain. Examples could be credit card and mortgage fraud, where credit is issued to the perpetrator based upon the financial rating of the victim. Perpetrators steal identities in numerous ways: e-mails, key loggers, impersonations, phone calls, and stealing trash from an individual’s home.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Identity Theft
Identity theft involves the theft of legal identity, manifest in identity tokens such as SSNs, documents or knowledge of factual information that identifies an individual.
Full Text Chapter Download: US $37.50 Add to Cart
Human Factors in Information Security and Privacy
Inappropriately using a person’s identifying information, such as social security number or password, to engage in activities under that person’s name.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy, Security, and Identity Theft Protection: Advances and Trends
The fraudulent use of another person’s personal information.
Full Text Chapter Download: US $37.50 Add to Cart
Key Factors and Implications for E-Government Diffusion in Developed Economies
Full Text Chapter Download: US $37.50 Add to Cart
Dark Web: A Breeding Ground for ID Theft and Financial Crimes
The unauthorized access or stealing of an individual’s personal information, such as Social Security Number, name, or credit card information by an outside party. It is generally used interchangeably with identify fraud.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR