The social security number: A small device underpinning big systems

2017 ◽  
Vol 70 (1) ◽  
pp. 3-17
Author(s):  
Paul-Anthelme Adèle
Author(s):  
Rajarshi Chakraborthy ◽  
Haricharan Rengamani ◽  
Ponnurangam Kumaraguru ◽  
Raghav Rao

The Indian government has undertaken a major effort to issue Unique Identification Numbers (UID) to its citizens. This chapter examines the Social Security Number system in the US, and investigates other UID projects in Europe. Based on these understanding and other information around UID systems, the authors discuss possible issues that are expected to arise in the implementation of UID system in India. They articulate how biometrics is being advocated by the proponents of the system in India for unique identification. The authors elucidate the social, ethical, cultural, technical, and legal implications / challenges around the implementation of a unique identification project in India.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Benjamin K. Ngugi ◽  
Kuo-Ting Hung ◽  
Yuanxiang John Li

Purpose Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The victim is the real owner of the social security number who will have difficulties getting a tax refund, as the offender has already taken a refund for the year in question. This paper aims to investigate whether the increased use and adoption of electronic tax filing (i.e. E-Filing) technologies has inadvertently resulted in a corresponding growth in Tax Identity Theft. Design/methodology/approach Multiple regressions are used to analyze the data that is extracted from the Identity Theft complaint reports (maintained by the Federal Trade Commission) and the tax filing statistics (retrieved from the Internal Revenue Service). Findings The results indicate that E-Filing can indirectly but significantly increase Tax Identity Theft through the full mediation effects of individual Self-E-Filing and Direct Deposit adoption, after controlling for general Identity Theft, the number of Individual Tax Returns and Total Refunds. Originality/value The authors explore the association between the adoption of tax e-filing technologies and Tax Identity Theft. The findings suggest that the key loopholes in the Tax Identity Theft process are at the Self-E-Filing and the Direct Deposit points. Several practical recommendations for patching these loopholes are provided and discussed.


Twin Research ◽  
1998 ◽  
Vol 1 (3) ◽  
pp. 150-153
Author(s):  
William F Page ◽  
Linda Corey

AbstractAt least two twin registries in the United States have been or are being assembled using the similarity of Social Security Numbers in computerized records to help identify possible twin pairs. While the success of such enterprises depends directly on a high probability of twinness given Social Security Numbers, there are theoretical and practical reasons to study the probability of Social Security Number similarity given twinness. For example, the number of twin pairs with similar Social Security Numbers obviously determines the maximum number of twin pairs that can be discovered by similarity algorithms. To study this issue, we examined the similarity of known Social Security Numbers in twin pairs from the Virginia Twin Registry by age, sex, race, and zygosity of the pair. We found that similarity between the Social Security Numbers of twin pairs varies markedly by age, and MZ twin pairs have significantly more similar Social Security Numbers than DZ pairs at all ages. Among older twins, there are also significant differences by sex and race. For younger twins, algorithms that identify putative twin pairs on the basis of the similarity of their Social Security Numbers hold the promise of being able to identify a large proportion of all true twin pairs. Such algorithms will be substantially less successful, however, in identifying a large proportion of older twin pairs.


2008 ◽  
Vol 2008 ◽  
pp. 1-5 ◽  
Author(s):  
Catherine Quantin ◽  
François-André Allaert ◽  
Paul Avillach ◽  
Maniane Fassa ◽  
Benoît Riandey ◽  
...  

We propose a method utilizing a derived social security number with the same reliability as the social security number. We show the anonymity techniques classically based on unidirectional hash functions (such as the secure hash algorithm (SHA-2) function that can guarantee the security, quality, and reliability of information if these techniques are applied to the Social Security Number). Hashing produces a strictly anonymous code that is always the same for a given individual, and thus enables patient data to be linked. Different solutions are developed and proposed in this article. Hashing the social security number will make it possible to link the information in the personal medical file to other national health information sources with the aim of completing or validating the personal medical record or conducting epidemiological and clinical research. This data linkage would meet the anonymous data requirements of the European directive on data protection.


Sign in / Sign up

Export Citation Format

Share Document