Identity Theft through the Web

Author(s):  
Thomas M. Chen

Most people recognize there are risks to online privacy but may not be fully aware of the various ways that personal information about them can be stolen through the Web. People can be lured to malicious Web sites designed to deceive them into revealing their personal information or unknowingly download malicious software to their computer. Even worse, legitimate sites can be compromised to host attacks called drive-by downloads. This chapter describes the online risks to identity theft and the technological means for protecting individuals from losing their personal information while surfing the Web.

Cyber Crime ◽  
2013 ◽  
pp. 37-51
Author(s):  
Thomas M. Chen

Most people recognize there are risks to online privacy but may not be fully aware of the various ways that personal information about them can be stolen through the Web. People can be lured to malicious Web sites designed to deceive them into revealing their personal information or unknowingly download malicious software to their computer. Even worse, legitimate sites can be compromised to host attacks called drive-by downloads. This chapter describes the online risks to identity theft and the technological means for protecting individuals from losing their personal information while surfing the Web.


2006 ◽  
Vol 4 (1) ◽  
pp. 64-74 ◽  
Author(s):  
Nsele Mengi Nsuangani ◽  
Miguel A. Pérez

This study explored college students’ online activities at health Web sites, their perceptions of the quality and accuracy of Internet medical information, and their concerns about Internet privacy and security. The research took place at a medium sized university in central California during the Fall 2002 semester with a sample of 136 students. The study found that 67% of the sampled students had sought health information on the Internet; 12% had used Internet medical consultations services; 7% had bought pharmaceutical products online; 2% had joined Internet health support groups; 7% had used e-mail to communicate with healthcare providers; 18% had sought second opinions online; 35% expressed serious concern about the accuracy of health information posted on the Web; and 53% were concerned about the privacy and security of personal information posted on the Web. Gender and age were identified as influential in some of the issues raised in the research.


Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


Author(s):  
Ioannis Iglezakis

In this chapter, a specific issue is addressed that concerns the protection of privacy vis-à-vis the efforts to combat identity theft and protect personal identifying information. There are, in particular, measures undertaken by legislators that involve penal sanctions and the introduction of new technological means for identity verification. Also, identity management schemes are introduced, which are utilized by service providers, mainly in the e-business sector, in order to support controlled access to resources. The solutions undertaken to protect identity are seen as measures enhancing privacy, which is endangered by identity theft. Personal information is largely available in the information society and its collection by identity fraudsters is also possible. Therefore, an effective protection of information protection should also include the protection of identity. The downside of the identity protection approach is that identity management actually presents risks to privacy, since the processing of personal data takes place in this context and it is argued that there are certain implications concerning the lawfulness of the processing. The use of electronic authentication through electronic cards or biometrics on passports and identity cards pose privacy issues, too. Subsequently, the legislation concerning identity theft and identity related crime is outlined. This is followed by specific analysis of privacy issues concerning identity management and identity verification methods, with particular reference to biometrics.


2013 ◽  
Vol 479-480 ◽  
pp. 916-922
Author(s):  
Chuan Sheng Wang ◽  
Fu Hau Hsu ◽  
Shih Jen Chen ◽  
Yan Ling Hwang ◽  
Min Hao Wu

Phishing is the malicious behavior of stealing personal information from computer users. It is a very popular account-theft-method among cyber criminals. Hence, developing a new approach to solve phishing attacks becomes an important issue. This paper proposes a router-based solution, called Shark, to phishing attacks. The router-based property allows Shark to protect a whole network without the need to install or maintain any software in any internal host. Based on the URLs collected from emails and the properties of the web pages pointed by these URLs, Shark quickly and automatically identifies phishing web pages. Experimental results demonstrate that Shark installed on a Linux edge router can accurately detect and attack phishing sites with low false positives and false negatives. And even though a false positive occurs, erroneous counterattacks do not influence the normal operations of legal web sites.


Cyber Crime ◽  
2013 ◽  
pp. 83-100
Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


2003 ◽  
Vol 1 (1) ◽  
pp. 70-86
Author(s):  
Christine Rzepka

One of the top reasons given for use of the internet is the ability to search for health information. However, much of the planning for web-based health information often fails to consider accessibility issues. If health care organizations and community agencies’ web sites have the latest, most wellresearched information on the health topics of the day, it is useless to those who cannot access it because of invisible technological barriers. Many flashy, high-tech sites were designed only to appeal to the needs of the mainstream population, with no consideration given to how people with disabilities must adapt their use of the web in order to access information. This article addresses issues of access specific to web site development, and will explore barriers to accessibility frequently experienced by web users with disabilities, requirements for ADA compliance, and how people with disabilities use the web. Web site accessibility guidelines, as well as simple evaluation tools, will be discussed. A thorough review of the article will enable even the least tech-savvy of health educators to enhance their skills in planning and evaluating web sites to promote access for people with disabilities.


Water Policy ◽  
2003 ◽  
Vol 5 (3) ◽  
pp. 203-212
Author(s):  
J. Lisa Jorgensona

This paper discusses a series of discusses how web sites now report international water project information, and maps the combined donor investment in more than 6000 water projects, active since 1995. The maps show donor investment:  • has addressed water scarcity,  • has improved access to improvised water resources,  • correlates with growth in GDP,  • appears to show a correlation with growth in net private capital flow,  • does NOT appear to correlate with growth in GNI. Evaluation indicates problems in the combined water project portfolios for major donor organizations: •difficulties in grouping projects over differing Sector classifications, food security, or agriculture/irrigation is the most difficult.  • inability to map donor projects at the country or river basin level because 60% of the donor projects include no location data (town, province, watershed) in the title or abstracts available on the web sites.  • no means to identify donor projects with utilization of water resources from training or technical assistance.  • no information of the source of water (river, aquifer, rainwater catchment).  • an identifiable quantity of water (withdrawal amounts, or increased water efficiency) is not provided.  • differentiation between large scale verses small scale projects. Recommendation: Major donors need to look at how the web harvests and combines their information, and look at ways to agree on a standard template for project titles to include more essential information. The Japanese (JICA) and the Asian Development Bank provide good models.


2014 ◽  
Vol 31 (4) ◽  
pp. 10-13 ◽  
Author(s):  
Sharon Q. Yang

Purpose – This study aims to ascertain the trends and changes of how academic libraries market and deliver information literacy (IL) on the web. Design/methodology/approach – The author compares the findings from two separate studies that scanned the Web sites for IL-related activities in 2009 and 2012, respectively. Findings – Academic libraries intensified their efforts to promote and deliver IL on the web between 2009 and 2012. There was a significant increase in IL-related activities on the web in the three-year period. Practical implications – The findings describe the status quo and changes in IL-related activities on the libraries’ Web sites. This information may help librarians to know what they have been doing and if there is space for improvement. Originality/value – This is the only study that spans three years in measuring the progress librarians made in marketing and delivering IL on the Web.


Sign in / Sign up

Export Citation Format

Share Document