Search dblp for Publications

export results for "identity theft"

 download as .bib file

@article{DBLP:journals/corr/abs-2401-07205,
  author       = {Shiming Wang and
                  Zhe Ji and
                  Liyao Xiang and
                  Hao Zhang and
                  Xinbing Wang and
                  Chenghu Zhou and
                  Bo Li},
  title        = {Crafter: Facial Feature Crafting against Inversion-based Identity
                  Theft on Deep Models},
  journal      = {CoRR},
  volume       = {abs/2401.07205},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.07205},
  doi          = {10.48550/ARXIV.2401.07205},
  eprinttype    = {arXiv},
  eprint       = {2401.07205},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-07205.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/OkekeE23,
  author       = {Romanus Izuchukwu Okeke and
                  Max Hashem Eiza},
  title        = {The Application of Role-Based Framework in Preventing Internal Identity
                  Theft Related Crimes: {A} Qualitative Case Study of {UK} Retail Companies},
  journal      = {Inf. Syst. Frontiers},
  volume       = {25},
  number       = {2},
  pages        = {451--472},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10796-022-10326-w},
  doi          = {10.1007/S10796-022-10326-W},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/OkekeE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/metacom/LiPCHW23,
  author       = {Pengyu Li and
                  Lei Pan and
                  Feifei Chen and
                  Thuong N. Hoang and
                  Rui Wang},
  title        = {TOTPAuth: {A} Time-based One Time Password Authentication Proof-of-Concept
                  against Metaverse User Identity Theft},
  booktitle    = {{IEEE} International Conference on Metaverse Computing, Networking
                  and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023},
  pages        = {662--665},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MetaCom57706.2023.00117},
  doi          = {10.1109/METACOM57706.2023.00117},
  timestamp    = {Thu, 21 Mar 2024 17:12:49 +0100},
  biburl       = {https://dblp.org/rec/conf/metacom/LiPCHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/OgbanufeP22,
  author       = {Obi Ogbanufe and
                  Robert Pavur},
  title        = {Going through the emotions of regret and fear: Revisiting protection
                  motivation for identity theft protection},
  journal      = {Int. J. Inf. Manag.},
  volume       = {62},
  pages        = {102432},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2021.102432},
  doi          = {10.1016/J.IJINFOMGT.2021.102432},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/OgbanufeP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NgugiHL22,
  author       = {Benjamin K. Ngugi and
                  Kuo{-}Ting Hung and
                  Yuanxiang John Li},
  title        = {Reducing tax identity theft by identifying vulnerability points in
                  the electronic tax filing process},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {173--189},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-05-2021-0056},
  doi          = {10.1108/ICS-05-2021-0056},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NgugiHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/SalamDW22,
  author       = {Al Farooq Salam and
                  Hua Dai and
                  Lei Wang},
  title        = {Online Users' Identity Theft and Coping Strategies, Attribution and
                  Sense of Urgency: {A} Non-Linear Quadratic Effect Assessment},
  journal      = {Inf. Syst. Frontiers},
  volume       = {24},
  number       = {6},
  pages        = {1929--1948},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10796-021-10194-w},
  doi          = {10.1007/S10796-021-10194-W},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/SalamDW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/WangZY22,
  author       = {Cheng Wang and
                  Hangyu Zhu and
                  Bo Yang},
  title        = {Composite Behavioral Modeling for Identity Theft Detection in Online
                  Social Networks},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {9},
  number       = {2},
  pages        = {428--439},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSS.2021.3092007},
  doi          = {10.1109/TCSS.2021.3092007},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcss/WangZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiiot/FairclothHCB22,
  author       = {Christopher Faircloth and
                  Gavin Hartzell and
                  Nathan Callahan and
                  Suman Bhunia},
  title        = {A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking
                  and Identity-Theft},
  booktitle    = {2022 {IEEE} World {AI} IoT Congress (AIIoT), Seattle, WA, USA, June
                  6-9, 2022},
  pages        = {501--507},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AIIoT54504.2022.9817175},
  doi          = {10.1109/AIIOT54504.2022.9817175},
  timestamp    = {Wed, 19 Jul 2023 12:22:41 +0200},
  biburl       = {https://dblp.org/rec/conf/aiiot/FairclothHCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JannettMMS22,
  author       = {Louis Jannett and
                  Vladislav Mladenov and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {{DISTINCT:} Identity Theft using In-Browser Communications in Dual-Window
                  Single Sign-On},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1553--1567},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560692},
  doi          = {10.1145/3548606.3560692},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JannettMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/Rajaram22,
  author       = {Nivedha Rajaram},
  editor       = {Hong Va Leong and
                  Sahra Sedigh Sarvestani and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Hiroki Kashiwazaki and
                  Dave Towey and
                  Ji{-}Jiang Yang and
                  Hossain Shahriar},
  title        = {Online Identity Theft Index Scorer and Recommendation Service},
  booktitle    = {46th {IEEE} Annual Computers, Software, and Applications Conferenc,
                  {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022},
  pages        = {407--408},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COMPSAC54236.2022.00064},
  doi          = {10.1109/COMPSAC54236.2022.00064},
  timestamp    = {Thu, 11 Aug 2022 16:32:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/Rajaram22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/YeGZCLGCWC22,
  author       = {Qiongzan Ye and
                  Yangbo Gao and
                  Zhenhua Zhang and
                  Yu Chen and
                  Yupeng Li and
                  Min Gao and
                  Shutong Chen and
                  Xin Wang and
                  Yang Chen},
  title        = {Modeling Access Environment and Behavior Sequence for Financial Identity
                  Theft Detection in E-Commerce Services},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua,
                  Italy, July 18-23, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IJCNN55064.2022.9892383},
  doi          = {10.1109/IJCNN55064.2022.9892383},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcnn/YeGZCLGCWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vsip/TrabelsiPD22,
  author       = {Anis Trabelsi and
                  Marc Pic and
                  Jean{-}Luc Dugelay},
  title        = {Recapture Detection to Fight Deep Identity Theft},
  booktitle    = {Proceedings of the 4th International Conference on Video, Signal and
                  Image Processing, {VSIP} 2022, Shanghai, China, November 25-27, 2022},
  pages        = {37--42},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3577164.3577170},
  doi          = {10.1145/3577164.3577170},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vsip/TrabelsiPD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijec/Vaithyasubramanian21,
  author       = {S. Vaithyasubramanian and
                  Saravanan Devaraj and
                  C. K. Kirubhashankar},
  title        = {Communal Fraud Detection Algorithm for Establishing Identity Thefts
                  in Online Shopping},
  journal      = {Int. J. e Collab.},
  volume       = {17},
  number       = {3},
  pages        = {75--84},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJeC.2021070105},
  doi          = {10.4018/IJEC.2021070105},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijec/Vaithyasubramanian21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitr/Awuah-OffeiY21,
  author       = {Kwame Awuah{-}Offei and
                  Winfred Yaokumah},
  title        = {Cyber-Identity Theft and Fintech Services},
  journal      = {J. Inf. Technol. Res.},
  volume       = {14},
  number       = {3},
  pages        = {1--19},
  year         = {2021},
  url          = {https://doi.org/10.4018/jitr.2021070101},
  doi          = {10.4018/JITR.2021070101},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jitr/Awuah-OffeiY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/QianT21,
  author       = {Junjie (Henry) Qian and
                  H{\"{u}}seyin Tanriverdi},
  editor       = {Joe S. Valacich and
                  Anitesh Barua and
                  Ryan T. Wright and
                  Atreyi Kankanhalli and
                  Xitong Li and
                  Shaila Miranda},
  title        = {Digital and Physical Mechanisms of Financial Frauds and Identity Theft},
  booktitle    = {Proceedings of the 42nd International Conference on Information Systems,
                  {ICIS} 2021, Building Sustainability and Resilience with {IS:} {A}
                  Call for Action, Austin, TX, USA, December 12-15, 2021},
  publisher    = {Association for Information Systems},
  year         = {2021},
  url          = {https://aisel.aisnet.org/icis2021/cyber\_security/cyber\_security/12},
  timestamp    = {Sun, 16 Apr 2023 13:39:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/QianT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bis/ZaeemB20,
  author       = {Razieh Nokhbeh Zaeem and
                  K. Suzanne Barber},
  editor       = {Witold Abramowicz and
                  Gary Klein},
  title        = {How Much Identity Management with Blockchain Would Have Saved Us?
                  {A} Longitudinal Study of Identity Theft},
  booktitle    = {Business Information Systems Workshops - {BIS} 2020 International
                  Workshops, Colorado Springs, CO, USA, June 8-10, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {394},
  pages        = {158--168},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61146-0\_13},
  doi          = {10.1007/978-3-030-61146-0\_13},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bis/ZaeemB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ZouRTSRS20,
  author       = {Yixin Zou and
                  Kevin A. Roundy and
                  Acar Tamersoy and
                  Saurabh Shintre and
                  Johann Roturier and
                  Florian Schaub},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {Examining the Adoption and Abandonment of Security, Privacy, and Identity
                  Theft Protection Practices},
  booktitle    = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems,
                  Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--15},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3313831.3376570},
  doi          = {10.1145/3313831.3376570},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/ZouRTSRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/JibrilKNAPC20,
  author       = {Abdul Bashiru Jibril and
                  Michael Adu Kwarteng and
                  Fortune Nwaiwu and
                  Christina Appiah{-}Nimo and
                  Michal Pilik and
                  Miloslava Chovancova},
  editor       = {Mari{\'{e}} Hattingh and
                  Machdel Matthee and
                  Hanlie Smuts and
                  Ilias O. Pappas and
                  Yogesh K. Dwivedi and
                  Matti M{\"{a}}ntym{\"{a}}ki},
  title        = {Online Identity Theft on Consumer Purchase Intention: {A} Mediating
                  Role of Online Security and Privacy Concern},
  booktitle    = {Responsible Design, Implementation and Use of Information and Communication
                  Technology - 19th {IFIP} {WG} 6.11 Conference on e-Business, e-Services,
                  and e-Society, {I3E} 2020, Skukuza, South Africa, April 6-8, 2020,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12067},
  pages        = {147--158},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45002-1\_13},
  doi          = {10.1007/978-3-030-45002-1\_13},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/JibrilKNAPC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MalderleBMW020,
  author       = {Timo Malderle and
                  Felix Boes and
                  Gina Muuss and
                  Matthias W{\"{u}}bbeling and
                  Michael Meier},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Credential Intelligence Agency: {A} Threat Intelligence Approach to
                  Mitigate Identity Theft},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {115--138},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_6},
  doi          = {10.1007/978-3-030-94900-6\_6},
  timestamp    = {Mon, 21 Mar 2022 16:15:19 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/MalderleBMW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/LiYWR19,
  author       = {Yuan Li and
                  Adel Yazdanmehr and
                  Jingguo Wang and
                  H. Raghav Rao},
  title        = {Responding to identity theft: {A} victimization perspective},
  journal      = {Decis. Support Syst.},
  volume       = {121},
  pages        = {13--24},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.dss.2019.04.002},
  doi          = {10.1016/J.DSS.2019.04.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/LiYWR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejlt/Vettermann19,
  author       = {Oliver Vettermann},
  title        = {Self-made Data Protection - is it Enough? Prevention and After-care
                  of Identity Theft},
  journal      = {Eur. J. Law Technol.},
  volume       = {10},
  number       = {1},
  year         = {2019},
  url          = {http://ejlt.org/index.php/ejlt/article/view/673},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejlt/Vettermann19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/WalshSHHT19,
  author       = {Gianfranco Walsh and
                  Edward Shiu and
                  Louise Hassan and
                  Patrick Hille and
                  Ikuo Takahashi},
  title        = {Fear of Online Consumer Identity Theft: Cross-Country Application
                  and Short Scale Development},
  journal      = {Inf. Syst. Frontiers},
  volume       = {21},
  number       = {6},
  pages        = {1251--1264},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10796-019-09958-2},
  doi          = {10.1007/S10796-019-09958-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/WalshSHHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itl/SaeedISK19,
  author       = {Dawer Saeed and
                  Razi Iqbal and
                  Hafiz Husnain Raza Sherazi and
                  Muhammad Usman Ghani Khan},
  title        = {Evaluating Near-Field Communication tag security for identity theft
                  prevention},
  journal      = {Internet Technol. Lett.},
  volume       = {2},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1002/itl2.123},
  doi          = {10.1002/ITL2.123},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itl/SaeedISK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itp/MaitloAPS19,
  author       = {Abdullah Maitlo and
                  Nisreen Ameen and
                  Hamid Reza Peikari and
                  Mahmood Hussain Shah},
  title        = {Preventing identity theft},
  journal      = {Inf. Technol. People},
  volume       = {32},
  number       = {5},
  pages        = {1184--1214},
  year         = {2019},
  url          = {https://doi.org/10.1108/ITP-05-2018-0255},
  doi          = {10.1108/ITP-05-2018-0255},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itp/MaitloAPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jkm/ShahM0Y19,
  author       = {Mahmood Hussain Shah and
                  Abdullah Maitlo and
                  Paul Jones and
                  Yahaya Y. Yusuf},
  title        = {An investigation into agile learning processes and knowledge sharing
                  practices to prevent identity theft in the online retail organisations},
  journal      = {J. Knowl. Manag.},
  volume       = {23},
  number       = {9},
  pages        = {1857--1884},
  year         = {2019},
  url          = {https://doi.org/10.1108/JKM-06-2018-0370},
  doi          = {10.1108/JKM-06-2018-0370},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jkm/ShahM0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/BoseL19,
  author       = {Indranil Bose and
                  Alvin Chung Man Leung},
  title        = {Adoption of Identity Theft Countermeasures and its Short- and Long-Term
                  Impact on Firm Value},
  journal      = {{MIS} Q.},
  volume       = {43},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.25300/misq/2019/14192},
  doi          = {10.25300/MISQ/2019/14192},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/BoseL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/WangYCW19,
  author       = {Cheng Wang and
                  Bo Yang and
                  Jipeng Cui and
                  Chaodong Wang},
  title        = {Fusing Behavioral Projection Models for Identity Theft Detection in
                  Online Social Networks},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {6},
  number       = {4},
  pages        = {637--648},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSS.2019.2917003},
  doi          = {10.1109/TCSS.2019.2917003},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/WangYCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/see/DadkhahLB18,
  author       = {Mehdi Dadkhah and
                  Mohammad Lagzian and
                  Glenn Borchardt},
  title        = {Identity Theft in the Academic World Leads to Junk Science},
  journal      = {Sci. Eng. Ethics},
  volume       = {24},
  number       = {1},
  pages        = {287--290},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11948-016-9867-x},
  doi          = {10.1007/S11948-016-9867-X},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/see/DadkhahLB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LiYWR18,
  author       = {Yuan Li and
                  Adel Yazdanmehr and
                  Jingguo Wang and
                  H. Raghav Rao},
  title        = {How Do You Cope: Individuals' Responses to Identity Theft Victimization},
  booktitle    = {24th Americas Conference on Information Systems, {AMCIS} 2018, New
                  Orleans, LA, USA, August 16-18, 2018},
  publisher    = {Association for Information Systems},
  year         = {2018},
  url          = {https://aisel.aisnet.org/amcis2018/Security/Presentations/42},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/LiYWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/egose/KalvetTU18,
  author       = {Tarmo Kalvet and
                  Marek Tiits and
                  Pille Ubakivi{-}Hadachi},
  editor       = {Andrei V. Chugunov and
                  Yuri Misnikov and
                  Evgeny Roshchin and
                  Dmitrii Trutnev},
  title        = {Risks and Societal Implications of Identity Theft},
  booktitle    = {Electronic Governance and Open Society: Challenges in Eurasia - 5th
                  International Conference, {EGOSE} 2018, St. Petersburg, Russia, November
                  14-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {947},
  pages        = {67--81},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-13283-5\_6},
  doi          = {10.1007/978-3-030-13283-5\_6},
  timestamp    = {Mon, 06 Apr 2020 18:35:38 +0200},
  biburl       = {https://dblp.org/rec/conf/egose/KalvetTU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/Shaikh18,
  author       = {Asif Shaikh},
  editor       = {Constantine Stephanidis},
  title        = {Shadow-IT System and Insider Threat: An Assessment of an Opportunity
                  Dimension for the Identity Theft},
  booktitle    = {{HCI} International 2018 - Posters' Extended Abstracts - 20th International
                  Conference, {HCI} International 2018, Las Vegas, NV, USA, July 15-20,
                  2018, Proceedings, Part {III}},
  series       = {Communications in Computer and Information Science},
  volume       = {852},
  pages        = {314--317},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92285-0\_44},
  doi          = {10.1007/978-3-319-92285-0\_44},
  timestamp    = {Mon, 09 Jul 2018 16:15:21 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/Shaikh18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/WalshHSHT18,
  author       = {Gianfranco Walsh and
                  Patrick Hille and
                  Edward Shiu and
                  Louise Hassan and
                  Ikuo Takahashi},
  editor       = {Jan Pries{-}Heje and
                  Sudha Ram and
                  Michael Rosemann},
  title        = {Cross-Cultural Fear of Online Identity Theft: {A} Comparison Study
                  and Scale Refinement},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Bridging the Internet of People, Data, and Things, {ICIS} 2018,
                  San Francisco, CA, USA, December 13-16, 2018},
  publisher    = {Association for Information Systems},
  year         = {2018},
  url          = {https://aisel.aisnet.org/icis2018/security/Presentations/1},
  timestamp    = {Tue, 22 Jan 2019 10:41:07 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/WalshHSHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/obd/Concepcion-Sanchez18,
  author       = {Jos{\'{e}} {\'{A}}ngel Concepci{\'{o}}n{-}S{\'{a}}nchez and
                  Jezabel Molina{-}Gil and
                  Pino Caballero{-}Gil and
                  Iv{\'{a}}n Santos{-}Gonz{\'{a}}lez},
  title        = {Fuzzy Logic System for Identity Theft Detection in Social Networks},
  booktitle    = {4th International Conference on Big Data Innovations and Applications,
                  Innovate-Data 2018, Barcelona, Spain, August 6-8, 2018},
  pages        = {65--70},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/Innovate-Data.2018.00017},
  doi          = {10.1109/INNOVATE-DATA.2018.00017},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/obd/Concepcion-Sanchez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-06825,
  author       = {Cheng Wang and
                  Bo Yang},
  title        = {Composite Behavioral Modeling for Identity Theft Detection in Online
                  Social Networks},
  journal      = {CoRR},
  volume       = {abs/1801.06825},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.06825},
  eprinttype    = {arXiv},
  eprint       = {1801.06825},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-06825.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZaeemMYB17,
  author       = {Razieh Nokhbeh Zaeem and
                  Monisha Manoharan and
                  Yongpeng Yang and
                  K. Suzanne Barber},
  title        = {Modeling and analysis of identity threat behaviors through text mining
                  of identity theft stories},
  journal      = {Comput. Secur.},
  volume       = {65},
  pages        = {50--63},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.11.002},
  doi          = {10.1016/J.COSE.2016.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZaeemMYB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel17i,
  author       = {Hal Berghel},
  title        = {Equifax and the Latest Round of Identity Theft Roulette},
  journal      = {Computer},
  volume       = {50},
  number       = {12},
  pages        = {72--76},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.4451227},
  doi          = {10.1109/MC.2017.4451227},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel17i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globalsip/LorimerDK17,
  author       = {Philip A. K. Lorimer and
                  Victor Ming{-}Fai Diec and
                  Burak Kantarci},
  title        = {Participatory detection of identity theft on mobile social platforms},
  booktitle    = {2017 {IEEE} Global Conference on Signal and Information Processing,
                  GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017},
  pages        = {833--837},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GlobalSIP.2017.8309077},
  doi          = {10.1109/GLOBALSIP.2017.8309077},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globalsip/LorimerDK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/WangYLR17,
  author       = {Jingguo Wang and
                  Adel Yazdanmehr and
                  Yuan Li and
                  H. Raghav Rao},
  editor       = {Yong Jin Kim and
                  Ritu Agarwal and
                  Jae Kyu Lee},
  title        = {Opting for Identity Theft Protection Services: The Role of Anticipated
                  Distress},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Transforming Society with Digital Innovation, {ICIS} 2017, Seoul,
                  South Korea, December 10-13, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/icis2017/Security/Presentations/14},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/WangYLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istas/GoodeL17,
  author       = {Sigi Goode and
                  David Lacey},
  title        = {Designing and evaluating two interventions to improve identity theft
                  recovery outcomes},
  booktitle    = {2017 {IEEE} International Symposium on Technology and Society, {ISTAS}
                  2017, Sydney, Australia, August 10-11, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISTAS.2017.8318976},
  doi          = {10.1109/ISTAS.2017.8318976},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/istas/GoodeL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/WangLYJ17,
  author       = {Cheng Wang and
                  Jing Luo and
                  Bo Yang and
                  Changjun Jiang},
  editor       = {Liehuang Zhu and
                  Sheng Zhong},
  title        = {On Complementary Effect of Blended Behavioral Analysis for Identity
                  Theft Detection in Mobile Social Networks},
  booktitle    = {Mobile Ad-hoc and Sensor Networks - 13th International Conference,
                  {MSN} 2017, Beijing, China, December 17-20, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {747},
  pages        = {32--44},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-8890-2\_3},
  doi          = {10.1007/978-981-10-8890-2\_3},
  timestamp    = {Sun, 03 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/WangLYJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcomp/WangYL17,
  author       = {Cheng Wang and
                  Bo Yang and
                  Jing Luo},
  title        = {Identity Theft Detection in Mobile Social Networks Using Behavioral
                  Semantics},
  booktitle    = {2017 {IEEE} International Conference on Smart Computing, {SMARTCOMP}
                  2017, Hong Kong, China, May 29-31, 2017},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SMARTCOMP.2017.7947016},
  doi          = {10.1109/SMARTCOMP.2017.7947016},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartcomp/WangYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/Villar-Rodriguez16,
  author       = {Esther Villar{-}Rodriguez and
                  Javier Del Ser and
                  Ana I. Torre{-}Bastida and
                  Miren Nekane Bilbao and
                  Sancho Salcedo{-}Sanz},
  title        = {A novel machine learning approach to the detection of identity theft
                  in social networks based on emulated attack instances and support
                  vector machines},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {28},
  number       = {4},
  pages        = {1385--1395},
  year         = {2016},
  url          = {https://doi.org/10.1002/cpe.3633},
  doi          = {10.1002/CPE.3633},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/Villar-Rodriguez16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/AbubakarZJH16,
  author       = {Aisha Abubakar and
                  Pooneh Bagheri Zadeh and
                  Helge Janicke and
                  Richard Howley},
  title        = {Root cause analysis {(RCA)} as a preliminary tool into the investigation
                  of identity theft},
  booktitle    = {2016 International Conference On Cyber Security And Protection Of
                  Digital Services (Cyber Security), London, United Kingdom, June 13-14,
                  2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CyberSecPODS.2016.7502349},
  doi          = {10.1109/CYBERSECPODS.2016.7502349},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecpods/AbubakarZJH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/WalshHC16,
  author       = {Gianfranco Walsh and
                  Patrick Hille and
                  Mark Cleveland},
  title        = {Fearing Online Identity Theft: a Segmentation Study of Online Customers},
  booktitle    = {24th European Conference on Information Systems, {ECIS} 2016, Istanbul,
                  Turkey, June 12-15, 2016},
  pages        = {Research--in--Progress Paper 10},
  year         = {2016},
  url          = {http://aisel.aisnet.org/ecis2016\_rip/10},
  timestamp    = {Sat, 12 Nov 2016 17:38:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/WalshHC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdse/AlbarracinDP16,
  author       = {Camilo Albarracin and
                  Brayan S. Reyes Daza and
                  Octavio J. Salcedo Parra},
  editor       = {Tran Khanh Dang and
                  Roland R. Wagner and
                  Josef K{\"{u}}ng and
                  Nam Thoai and
                  Makoto Takizawa and
                  Erich J. Neuhold},
  title        = {Information and Identity Theft Without {ARP} Spoofing in {LAN} Environments},
  booktitle    = {Future Data and Security Engineering - Third International Conference,
                  {FDSE} 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10018},
  pages        = {164--171},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48057-2\_11},
  doi          = {10.1007/978-3-319-48057-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fdse/AlbarracinDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/AlashoorBZ16,
  author       = {Tawfiq Alashoor and
                  Richard L. Baskerville and
                  Ruilin Zhu},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Privacy and Identity Theft Recovery Planning: An Onion Skin Model},
  booktitle    = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
                  Koloa, HI, USA, January 5-8, 2016},
  pages        = {3696--3705},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HICSS.2016.461},
  doi          = {10.1109/HICSS.2016.461},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/AlashoorBZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/KimK16,
  author       = {A.{-}Young Kim and
                  Tae{-}Sung Kim},
  editor       = {Ting{-}Peng Liang and
                  Shin{-}Yuan Hung and
                  Patrick Y. K. Chau and
                  She{-}I Chang},
  title        = {Factors Influencing the Intention to Adopt Identity Theft Protection
                  Services: severity vs Vulnerability},
  booktitle    = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016,
                  Chiayi, Taiwan, June 27 - July 1, 2016},
  pages        = {68},
  year         = {2016},
  url          = {http://aisel.aisnet.org/pacis2016/68},
  timestamp    = {Tue, 08 Nov 2016 09:28:09 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/KimK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LaceyZB16,
  author       = {David Lacey and
                  Jim Zaiss and
                  K. Suzanne Barber},
  title        = {Understanding victim-enabled identity theft},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {196--202},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906926},
  doi          = {10.1109/PST.2016.7906926},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/LaceyZB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid16b,
  author       = {Gideon Samid},
  title        = {Cyber Passport: Preventing Massive Identity Theft},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istas/Helser15,
  author       = {Susan Helser},
  title        = {{FIT:} Identity theft education: Study of text-based versus game-based
                  learning},
  booktitle    = {2015 {IEEE} International Symposium on Technology and Society, {ISTAS}
                  2015, Dublin, Ireland, November 11-12, 2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISTAS.2015.7439437},
  doi          = {10.1109/ISTAS.2015.7439437},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/istas/Helser15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/SchroersT15,
  author       = {Jessica Schroers and
                  Pagona Tsormpatzoudi},
  editor       = {David Aspinall and
                  Jan Camenisch and
                  Marit Hansen and
                  Simone Fischer{-}H{\"{u}}bner and
                  Charles D. Raab},
  title        = {Identity-Theft Through e-Government Services - Government to Pay the
                  Bill?},
  booktitle    = {Privacy and Identity Management. Time for a Revolution? - 10th {IFIP}
                  {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer
                  School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {476},
  pages        = {253--264},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-41763-9\_17},
  doi          = {10.1007/978-3-319-41763-9\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/SchroersT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BrenzaPP15,
  author       = {Sebastian Brenza and
                  Andre Pawlowski and
                  Christina P{\"{o}}pper},
  title        = {A practical investigation of identity theft vulnerabilities in Eduroam},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {14:1--14:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766512},
  doi          = {10.1145/2766498.2766512},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/BrenzaPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/HeCSS14,
  author       = {Bing{-}Zhe He and
                  Chien{-}Ming Chen and
                  Yi{-}Ping Su and
                  Hung{-}Min Sun},
  title        = {A defence scheme against Identity Theft Attack based on multiple social
                  networks},
  journal      = {Expert Syst. Appl.},
  volume       = {41},
  number       = {5},
  pages        = {2345--2352},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.eswa.2013.09.032},
  doi          = {10.1016/J.ESWA.2013.09.032},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/HeCSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/Mohan14,
  author       = {Apurva Mohan},
  title        = {A medical domain collaborative anomaly detection framework for identifying
                  medical identity theft},
  booktitle    = {2014 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2014, Minneapolis, MN, USA, May 19-23, 2014},
  pages        = {428--435},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CTS.2014.6867600},
  doi          = {10.1109/CTS.2014.6867600},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/Mohan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YangMB14,
  author       = {Yongpeng Yang and
                  Monisha Manoharan and
                  K. Suzanne Barber},
  title        = {Modelling and Analysis of Identity Threat Behaviors through Text Mining
                  of Identity Theft Stories},
  booktitle    = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC}
                  2014, The Hague, The Netherlands, 24-26 September, 2014},
  pages        = {184--191},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/JISIC.2014.35},
  doi          = {10.1109/JISIC.2014.35},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YangMB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/RosoffCJ14,
  author       = {Heather Rosoff and
                  Jinshu Cui and
                  Richard S. John},
  editor       = {Lorrie Faith Cranor and
                  Lujo Bauer and
                  Robert Biddle},
  title        = {Behavioral Experiments Exploring Victims' Response to Cyber-based
                  Financial Fraud and Identity Theft Scenario Simulations},
  booktitle    = {Tenth Symposium on Usable Privacy and Security, {SOUPS} 2014, Menlo
                  Park, CA, USA, July 9-11, 2014},
  pages        = {175--186},
  publisher    = {{USENIX} Association},
  year         = {2014},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/RosoffCJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Richter13,
  author       = {Wolfgang Richter},
  title        = {The scary reality of identity theft},
  journal      = {{XRDS}},
  volume       = {20},
  number       = {2},
  pages        = {16},
  year         = {2013},
  url          = {https://doi.org/10.1145/2542650},
  doi          = {10.1145/2542650},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/Richter13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/BoseL13,
  author       = {Indranil Bose and
                  Alvin Chung Man Leung},
  title        = {The impact of adoption of identity theft countermeasures on firm value},
  journal      = {Decis. Support Syst.},
  volume       = {55},
  number       = {3},
  pages        = {753--763},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.dss.2013.03.001},
  doi          = {10.1016/J.DSS.2013.03.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/BoseL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwa/BrionesCC13,
  author       = {Jose Maria Briones and
                  Mario Alejandro Coronel and
                  Patricia Chavez{-}Burbano},
  title        = {Case of Study: Identity Theft in a University WLAN, Evil Twin and
                  Cloned Authentication Web Interface},
  journal      = {Int. J. Web Appl.},
  volume       = {5},
  number       = {2},
  pages        = {66--73},
  year         = {2013},
  url          = {http://www.dline.info/ijwa/fulltext/v5n2/2.pdf},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwa/BrionesCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0029553,
  author       = {L. Jean Camp and
                  M. Eric Johnson},
  title        = {The Economics of Financial and Medical Identity Theft},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-1-4614-1918-1},
  doi          = {10.1007/978-1-4614-1918-1},
  isbn         = {978-1-4614-1917-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0029553.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Mik12,
  author       = {Eliza Mik},
  title        = {Mistaken identity, identity theft and problems of remote authentication
                  in e-commerce},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {28},
  number       = {4},
  pages        = {396--402},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.clsr.2012.03.009},
  doi          = {10.1016/J.CLSR.2012.03.009},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/clsr/Mik12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel12,
  author       = {Hal Berghel},
  title        = {Identity Theft and Financial Fraud: Some Strangeness in the Proportions},
  journal      = {Computer},
  volume       = {45},
  number       = {1},
  pages        = {86--89},
  year         = {2012},
  url          = {https://doi.org/10.1109/MC.2012.16},
  doi          = {10.1109/MC.2012.16},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/LaiLH12,
  author       = {Fujun Lai and
                  Dahui Li and
                  Chang{-}Tseh Hsieh},
  title        = {Fighting identity theft: The coping perspective},
  journal      = {Decis. Support Syst.},
  volume       = {52},
  number       = {2},
  pages        = {353--363},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.dss.2011.09.002},
  doi          = {10.1016/J.DSS.2011.09.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/LaiLH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eg/SmithS12,
  author       = {Amber A. Smith and
                  Alan D. Smith},
  title        = {{CRM} and identity theft issues associated with e-ticketing of sports
                  and entertainment},
  journal      = {Electron. Gov. an Int. J.},
  volume       = {9},
  number       = {1},
  pages        = {1--26},
  year         = {2012},
  url          = {https://doi.org/10.1504/EG.2012.044776},
  doi          = {10.1504/EG.2012.044776},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eg/SmithS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irmj/ShareefK12,
  author       = {Mahmud Akhter Shareef and
                  Vinod Kumar},
  title        = {Prevent/Control Identity Theft: Impact on Trust and Consumers' Purchase
                  Intention in {B2C} {EC}},
  journal      = {Inf. Resour. Manag. J.},
  volume       = {25},
  number       = {3},
  pages        = {30--60},
  year         = {2012},
  url          = {https://doi.org/10.4018/irmj.2012070102},
  doi          = {10.4018/IRMJ.2012070102},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/irmj/ShareefK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GhazizadehZMKT12,
  author       = {Eghbal Ghazizadeh and
                  Mazdak Zamani and
                  Jamalul{-}lail Ab Manan and
                  Reza Khaleghparast and
                  Ali Taherian},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A trust based model for federated identity architecture to mitigate
                  identity theft},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {376--381},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470834/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/GhazizadehZMKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Biri11,
  author       = {Aroua Biri},
  title        = {Proposition de nouveaux m{\'{e}}canismes de protection contre
                  l'usurpation d'identit{\'{e}} pour les fournisseurs de services
                  Internet. (Proposal for new protections against identity theft for
                  ISPs)},
  school       = {Telecom {\&} Management SudParis, {\'{E}}vry, Essonne, France},
  year         = {2011},
  url          = {https://tel.archives-ouvertes.fr/tel-01166537},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Biri11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/GroverBC11,
  author       = {Amit Grover and
                  Hal Berghel and
                  Dennis Cobb},
  title        = {The State of the Art in Identity Theft},
  journal      = {Adv. Comput.},
  volume       = {83},
  pages        = {1--50},
  year         = {2011},
  url          = {https://doi.org/10.1016/B978-0-12-385510-7.00001-1},
  doi          = {10.1016/B978-0-12-385510-7.00001-1},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/GroverBC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbdcn/Smith11,
  author       = {Alan D. Smith},
  title        = {Linking the Popularity of Online Trading with Consumers' Concerns
                  for Reputation and Identity Theft},
  journal      = {Int. J. Bus. Data Commun. Netw.},
  volume       = {7},
  number       = {1},
  pages        = {1--35},
  year         = {2011},
  url          = {https://doi.org/10.4018/jbdcn.2011010101},
  doi          = {10.4018/JBDCN.2011010101},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbdcn/Smith11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Helser11,
  author       = {S. Helser},
  title        = {An interdisciplinary approach to address identity theft education},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {41},
  number       = {2},
  pages        = {38--50},
  year         = {2011},
  url          = {https://doi.org/10.1145/2095272.2095276},
  doi          = {10.1145/2095272.2095276},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Helser11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/PodhradskyDC11,
  author       = {Ashley L. Podhradsky and
                  Rob D'Ovidio and
                  Cindy Casey},
  editor       = {Vallabh Sambamurthy and
                  Mohan Tanniru},
  title        = {Identity Theft and Used Gaming Consoles: Recovering Personal Information
                  from Xbox 360 Hard Drives},
  booktitle    = {A Renaissance of Information Technology for Sustainability and Global
                  Competitiveness. 17th Americas Conference on Information Systems,
                  {AMCIS} 2011, Detroit, Michigan, USA, August 4-8 2011},
  publisher    = {Association for Information Systems},
  year         = {2011},
  url          = {http://aisel.aisnet.org/amcis2011\_submissions/54},
  timestamp    = {Thu, 11 Apr 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/PodhradskyDC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/ShahO11,
  author       = {Mahmood Hussain Shah and
                  Romanus Izuchukwu Okeke},
  title        = {A Framework for Internal Identity Theft Prevention in Retail Industry},
  booktitle    = {European Intelligence and Security Informatics Conference, {EISIC}
                  2011, Athens, Greece, September 12-14, 2011},
  pages        = {366--371},
  publisher    = {{IEEE} Computer Soecity},
  year         = {2011},
  url          = {https://doi.org/10.1109/EISIC.2011.29},
  doi          = {10.1109/EISIC.2011.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/ShahO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MeucciPP11,
  author       = {Filippo Meucci and
                  Laura Pierucci and
                  Neeli R. Prasad},
  title        = {Identity Theft Detection Based on Neural Network Non-Linearity Identification
                  in {OFDM} System},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/icc.2011.5963091},
  doi          = {10.1109/ICC.2011.5963091},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MeucciPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istas/Helser11,
  author       = {Susan Helser},
  title        = {An interdisciplinary approach to address identity theft education},
  booktitle    = {2011 {IEEE} International Symposium on Technology and Society, {ISTAS}
                  2011, Chicago, IL, USA, May 23-25, 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISTAS.2011.7160601},
  doi          = {10.1109/ISTAS.2011.7160601},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/istas/Helser11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AimeurS11,
  author       = {Esma A{\"{\i}}meur and
                  David Sch{\"{o}}nfeld},
  title        = {The ultimate invasion of privacy: Identity theft},
  booktitle    = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011,
                  19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {24--31},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PST.2011.5971959},
  doi          = {10.1109/PST.2011.5971959},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/AimeurS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/Tiller11,
  author       = {James S. Tiller},
  editor       = {Rebecca Herold},
  title        = {Identity Theft},
  booktitle    = {Encyclopedia of Information Assurance},
  publisher    = {Taylor {\&} Francis},
  year         = {2011},
  url          = {https://doi.org/10.1081/E-EIA-120046290},
  doi          = {10.1081/E-EIA-120046290},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/Tiller11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijuc/NagyNA10,
  author       = {Naya Nagy and
                  Marius Nagy and
                  Selim G. Akl},
  title        = {Hypercomputation in a Cryptographic Setting: Solving the Identity
                  Theft Problem Using Quantum Memories?},
  journal      = {Int. J. Unconv. Comput.},
  volume       = {6},
  number       = {5},
  pages        = {375--398},
  year         = {2010},
  url          = {http://www.oldcitypublishing.com/journals/ijuc-home/ijuc-issue-contents/ijuc-volume-6-number-5-2010/ijuc-6-5-p-375-398/},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijuc/NagyNA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ciechanowicz10a,
  author       = {Chez Ciechanowicz},
  title        = {Identity Theft and Reconstruction},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {15},
  number       = {2},
  pages        = {41},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.istr.2010.12.001},
  doi          = {10.1016/J.ISTR.2010.12.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ciechanowicz10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eva/Sporton10,
  author       = {Gregory Sporton},
  editor       = {Alan Seal and
                  Jonathan P. Bowen and
                  Kia Ng},
  title        = {Creative identity theft: issues for artists in collaborative online
                  environments},
  booktitle    = {Electronic Visualisation and the Arts, {EVA} 2010, London, UK, 5-7
                  July 2010},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2010},
  url          = {http://ewic.bcs.org/content/ConWebDoc/36086},
  timestamp    = {Fri, 27 Aug 2021 10:57:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eva/Sporton10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/RomanoskySA10,
  author       = {Sasha Romanosky and
                  Richard Sharp and
                  Alessandro Acquisti},
  title        = {Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal?},
  booktitle    = {9th Annual Workshop on the Economics of Information Security, {WEIS}
                  2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010},
  year         = {2010},
  url          = {http://weis2010.econinfosec.org/papers/session1/weis2010\_romanosky.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:46 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/RomanoskySA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/forensics/Chen10,
  author       = {Thomas M. Chen},
  editor       = {Chang{-}Tsun Li},
  title        = {Identity Theft through the Web},
  booktitle    = {Handbook of Research on Computational Forensics, Digital Crime, and
                  Investigation: Methods and Solutions},
  pages        = {379--395},
  publisher    = {{IGI} Global},
  year         = {2010},
  url          = {https://doi.org/10.4018/978-1-60566-836-9.ch016},
  doi          = {10.4018/978-1-60566-836-9.CH016},
  timestamp    = {Tue, 16 May 2017 14:01:55 +0200},
  biburl       = {https://dblp.org/rec/reference/forensics/Chen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eg/RyooOSC09,
  author       = {Jungwoo Ryoo and
                  Tae Hwan Oh and
                  Seungjae Shin and
                  Young B. Choi},
  title        = {A comprehensive readiness assessment framework for identity theft
                  safeguards in web-based electronic government systems},
  journal      = {Electron. Gov. an Int. J.},
  volume       = {6},
  number       = {1},
  pages        = {19--40},
  year         = {2009},
  url          = {https://doi.org/10.1504/EG.2009.022591},
  doi          = {10.1504/EG.2009.022591},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eg/RyooOSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MoirW09,
  author       = {Iain Moir and
                  George R. S. Weir},
  title        = {Contact centres and identity theft},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {2},
  number       = {1},
  pages        = {92--100},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJESDF.2009.023879},
  doi          = {10.1504/IJESDF.2009.023879},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MoirW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/interactions/Whitson09,
  author       = {Jennifer R. Whitson},
  title        = {Feature - Identity theft and the challenges of caring for your virtual
                  self},
  journal      = {Interactions},
  volume       = {16},
  number       = {2},
  pages        = {41--45},
  year         = {2009},
  url          = {https://doi.org/10.1145/1487632.1487642},
  doi          = {10.1145/1487632.1487642},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/interactions/Whitson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aciids/Kolaczek09,
  author       = {Grzegorz Kolaczek},
  editor       = {Ngoc Thanh Nguyen and
                  Huynh Phan Nguyen and
                  Adam Grzech},
  title        = {An Approach to Identity Theft Detection Using Social Network Analysis},
  booktitle    = {First Asian Conference on Intelligent Information and Database Systems,
                  {ACIIDS} 2009, Dong hoi, Quang binh, Vietnam, April 1-3, 2009},
  pages        = {78--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACIIDS.2009.44},
  doi          = {10.1109/ACIIDS.2009.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aciids/Kolaczek09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/KlenkKEC09,
  author       = {Andreas Klenk and
                  Holger Kinkelin and
                  Christoph Eunicke and
                  Georg Carle},
  editor       = {Evangelos P. Markatos and
                  Manuel Costa},
  title        = {Preventing identity theft with electronic identity cards and the trusted
                  platform module},
  booktitle    = {Proceedings of the Second European Workshop on System Security, {EUROSEC}
                  2009, Nuremburg, Germany, March 31, 2009},
  pages        = {44--51},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1519144.1519151},
  doi          = {10.1145/1519144.1519151},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/KlenkKEC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/SchulzeS09,
  author       = {Marion Schulze and
                  Mahmood Hussain Shah},
  editor       = {Claude Godart and
                  Norbert Gronau and
                  Sushil K. Sharma and
                  G{\'{e}}r{\^{o}}me Canals},
  title        = {The Step Method - Battling Identity Theft Using E-Retailers' Websites},
  booktitle    = {Software Services for e-Business and e-Society, 9th {IFIP} {WG} 6.1
                  Conference on e-Business, e-Services and e-Society, {I3E} 2009, Nancy,
                  France, September 23-25, 2009. Proceedings},
  series       = {{IFIP}},
  volume       = {305},
  pages        = {173--183},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04280-5\_15},
  doi          = {10.1007/978-3-642-04280-5\_15},
  timestamp    = {Tue, 14 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/i3e/SchulzeS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MoskovitchFMKMCLHMRE09,
  author       = {Robert Moskovitch and
                  Clint Feher and
                  Arik Messerman and
                  Niklas Kirschnick and
                  Tarik Mustafic and
                  Seyit Ahmet {\c{C}}amtepe and
                  Bernhard L{\"{o}}hlein and
                  Ulrich Heister and
                  Sebastian M{\"{o}}ller and
                  Lior Rokach and
                  Yuval Elovici},
  title        = {Identity theft, computers and behavioral biometrics},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings},
  pages        = {155--160},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISI.2009.5137288},
  doi          = {10.1109/ISI.2009.5137288},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MoskovitchFMKMCLHMRE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/RoberdsS09,
  author       = {William Roberds and
                  Stacey L. Schreft},
  title        = {Data Breaches and Identity Theft},
  booktitle    = {8th Annual Workshop on the Economics of Information Security, {WEIS}
                  2009, University College London, England, UK, June 24-25, 2009},
  year         = {2009},
  url          = {http://weis09.infosecon.net/files/121/index.html},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/RoberdsS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/BilgeSBK09,
  author       = {Leyla Bilge and
                  Thorsten Strufe and
                  Davide Balzarotti and
                  Engin Kirda},
  editor       = {Juan Quemada and
                  Gonzalo Le{\'{o}}n and
                  Yo{\"{e}}lle S. Maarek and
                  Wolfgang Nejdl},
  title        = {All your contacts are belong to us: automated identity theft attacks
                  on social networks},
  booktitle    = {Proceedings of the 18th International Conference on World Wide Web,
                  {WWW} 2009, Madrid, Spain, April 20-24, 2009},
  pages        = {551--560},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1526709.1526784},
  doi          = {10.1145/1526709.1526784},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/BilgeSBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/bio/X09qi,
  editor       = {Stan Z. Li and
                  Anil K. Jain},
  title        = {Identity Theft Reduction},
  booktitle    = {Encyclopedia of Biometrics},
  pages        = {715},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-73003-5\_2265},
  doi          = {10.1007/978-0-387-73003-5\_2265},
  timestamp    = {Fri, 27 Oct 2017 15:34:05 +0200},
  biburl       = {https://dblp.org/rec/reference/bio/X09qi.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/KoongLBL08,
  author       = {Kai S. Koong and
                  Lai C. Liu and
                  Shuming Bai and
                  Binshan Lin},
  title        = {Identity theft in the {USA:} evidence from 2002 to 2006},
  journal      = {Int. J. Mob. Commun.},
  volume       = {6},
  number       = {2},
  pages        = {199--216},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJMC.2008.016577},
  doi          = {10.1504/IJMC.2008.016577},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmc/KoongLBL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KlingsheimH08,
  author       = {Andr{\'{e}} N. Klingsheim and
                  Kjell J{\o}rgen Hole},
  editor       = {Gene Tsudik},
  title        = {Identity Theft: Much Too Easy? {A} Study of Online Systems in Norway},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {192--196},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_17},
  doi          = {10.1007/978-3-540-85230-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KlingsheimH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isips/Crescenzo08,
  author       = {Giovanni Di Crescenzo},
  editor       = {Cecilia S. Gal and
                  Paul B. Kantor and
                  Michael E. Lesk},
  title        = {On the Statistical Dependency of Identity Theft on Demographics},
  booktitle    = {Protecting Persons While Protecting the People, Second Annual Workshop
                  on Information Privacy and National Security, {ISIPS} 2008, New Brunswick,
                  NJ, USA, May 12, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5661},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-10233-2\_12},
  doi          = {10.1007/978-3-642-10233-2\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/isips/Crescenzo08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/Tallon08,
  author       = {Mar{\'{\i}}a Luisa Garc{\'{\i}}a Tall{\'{o}}n},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Identity Theft in Electronic Financial Transactions The experience
                  of the Central Bank of Spain},
  booktitle    = {{ISSE} 2008 - Securing Electronic Busines Processes, Highlights of
                  the Information Security Solutions Europe 2008 Conference, 7-9 October
                  2008, Madrid, Spain},
  pages        = {307--312},
  publisher    = {Vieweg+Teubner},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-8348-9283-6\_32},
  doi          = {10.1007/978-3-8348-9283-6\_32},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/Tallon08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/RomanoskyTA08,
  author       = {Sasha Romanosky and
                  Rahul Telang and
                  Alessandro Acquisti},
  title        = {Do Data Breaches Disclosure Laws Reduce Identity Theft?},
  booktitle    = {7th Annual Workshop on the Economics of Information Security, {WEIS}
                  2008, Dartmouth College, Hanover, NH, USA, June 25-28, 2008},
  year         = {2008},
  url          = {http://weis2008.econinfosec.org/papers/Romanosky.pdf},
  timestamp    = {Thu, 22 Jul 2021 16:15:45 +0200},
  biburl       = {https://dblp.org/rec/conf/weis/RomanoskyTA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0029552,
  author       = {L. Jean Camp},
  title        = {Economics of Identity Theft - Avoidance, Causes and Possible Cures},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-68614-1},
  doi          = {10.1007/978-0-387-68614-1},
  isbn         = {978-0-387-34589-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0029552.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bliss/LinYQ07,
  author       = {Kun Lin and
                  Lin Yuan and
                  Gang Qu},
  editor       = {Adrian Stoica and
                  Tughrul Arslan and
                  Daniel Howard and
                  Tai{-}Hoon Kim and
                  Ahmed O. El{-}Rayis},
  title        = {SecureGo: {A} Hardware-Software Co-Protection against Identity Theft
                  in Online Transaction},
  booktitle    = {2007 {ECSIS} Symposium on Bio-inspired, Learning, and Intelligent
                  Systems for Security, {BLISS} 2007, Edinburgh, United Kingdom, 9-10
                  August 2007},
  pages        = {59--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/BLISS.2007.30},
  doi          = {10.1109/BLISS.2007.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bliss/LinYQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SteynKD07,
  author       = {Tjaart Steyn and
                  Hennie A. Kruger and
                  Lynette Drevin},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {Identity Theft - Empirical evidence from a Phishing Exercise},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {193--203},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_17},
  doi          = {10.1007/978-0-387-72367-9\_17},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SteynKD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/ethics/BeckerSJ07,
  author       = {Reggie Becker and
                  Mark B. Schmidt and
                  Allen C. Johnston},
  editor       = {Marian Quigley},
  title        = {Mitigation of Identity Theft in the Information Age},
  booktitle    = {Encyclopedia of Information Ethics and Security},
  pages        = {451--456},
  publisher    = {{IGI} Global},
  year         = {2007},
  url          = {http://www.igi-global.com/Bookstore/chapter.aspx?titleid=13510},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/ethics/BeckerSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/ethics/Mahmood07,
  author       = {Omer Mahmood},
  editor       = {Marian Quigley},
  title        = {Dilemmas of Online Identity Theft},
  booktitle    = {Encyclopedia of Information Ethics and Security},
  pages        = {143--149},
  publisher    = {{IGI} Global},
  year         = {2007},
  url          = {http://www.igi-global.com/Bookstore/chapter.aspx?titleid=13465},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/ethics/Mahmood07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Mercuri06,
  author       = {Rebecca T. Mercuri},
  title        = {Scoping identity theft},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {5},
  pages        = {17--21},
  year         = {2006},
  url          = {https://doi.org/10.1145/1125944.1125961},
  doi          = {10.1145/1125944.1125961},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Mercuri06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KoopsL06,
  author       = {Bert{-}Jaap Koops and
                  Ronald Leenes},
  title        = {Identity theft, identity fraud and/or identity-related crime - Definitions
                  matter},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {30},
  number       = {9},
  pages        = {553--556},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11623-006-0141-2},
  doi          = {10.1007/S11623-006-0141-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KoopsL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/WangYA06,
  author       = {Wenjie Wang and
                  Yufei Yuan and
                  Norman P. Archer},
  title        = {A Contextual Framework for Combating Identity Theft},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {2},
  pages        = {30--38},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.31},
  doi          = {10.1109/MSP.2006.31},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/WangYA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Sweeney06,
  author       = {Latanya Sweeney},
  title        = {Protecting Job Seekers from Identity Theft},
  journal      = {{IEEE} Internet Comput.},
  volume       = {10},
  number       = {2},
  pages        = {74--78},
  year         = {2006},
  url          = {https://doi.org/10.1109/MIC.2006.40},
  doi          = {10.1109/MIC.2006.40},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Sweeney06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/ChenH06,
  author       = {Thomas Chen and
                  Peter Henry},
  title        = {A Review of: "\emph{Phishing and Countermeasures: Understanding the
                  Increasing Problem of Electronic Identity Theft}. By Markus Jakobsson
                  and Steven Myers, Editors"},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {147--149},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601044580},
  doi          = {10.1080/15567280601044580},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/ChenH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Emigh06,
  author       = {Aaron Emigh},
  title        = {The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {245--260},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601049985},
  doi          = {10.1080/15567280601049985},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Emigh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Henry06,
  author       = {Peter Henry},
  title        = {A Review of: "\emph{Phishing Exposed: Uncover Secrets from the Dark
                  Side}. By Lance James \emph{Phishing: Cutting the Identity Theft Line}.
                  By Rachel Lininger and Russell Dean Uines"},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {261--262},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601047492},
  doi          = {10.1080/15567280601047492},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Henry06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Delaitre06,
  author       = {Sabine Dela{\^{\i}}tre},
  title        = {Risk Management approach on identity theft in biometric systems context},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {982},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.113},
  doi          = {10.1109/ARES.2006.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Delaitre06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Luong06,
  author       = {Kim Luong},
  title        = {The other side of identity theft: not just a financial concern},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {152--155},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231081},
  doi          = {10.1145/1231047.1231081},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Luong06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Newman06,
  author       = {Robert C. Newman},
  title        = {Cybercrime, identity theft, and fraud: practicing safe internet -
                  network security threats and vulnerabilities},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {68--78},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231064},
  doi          = {10.1145/1231047.1231064},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Newman06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/Bose06,
  author       = {Ranjit Bose},
  title        = {Intelligent Technologies for Managing Fraud and Identity Theft},
  booktitle    = {Third International Conference on Information Technology: New Generations
                  {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}},
  pages        = {446--451},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ITNG.2006.78},
  doi          = {10.1109/ITNG.2006.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/Bose06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/MarshallT05,
  author       = {Angus M. Marshall and
                  Brian C. Tompsett},
  title        = {Identity theft in an online world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {21},
  number       = {2},
  pages        = {128--137},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.clsr.2005.02.004},
  doi          = {10.1016/J.CLSR.2005.02.004},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/clsr/MarshallT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsonline/Goth05h,
  author       = {Greg Goth},
  title        = {Identity Theft Solutions Disagree on Problem},
  journal      = {{IEEE} Distributed Syst. Online},
  volume       = {6},
  number       = {8},
  year         = {2005},
  url          = {https://doi.org/10.1109/MDSO.2005.41},
  doi          = {10.1109/MDSO.2005.41},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsonline/Goth05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eg/Smith05a,
  author       = {Alan D. Smith},
  title        = {Identity theft as a threat to {CRM} and e-commerce},
  journal      = {Electron. Gov. an Int. J.},
  volume       = {2},
  number       = {2},
  pages        = {219--246},
  year         = {2005},
  url          = {https://doi.org/10.1504/EG.2005.007096},
  doi          = {10.1504/EG.2005.007096},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eg/Smith05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijeis/SmithL05,
  author       = {Alan D. Smith and
                  Allen R. Lias},
  title        = {Identity Theft and E-Fraud as Critical {CRM} Concerns},
  journal      = {Int. J. Enterp. Inf. Syst.},
  volume       = {1},
  number       = {2},
  pages        = {17--36},
  year         = {2005},
  url          = {https://doi.org/10.4018/jeis.2005040102},
  doi          = {10.4018/JEIS.2005040102},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijeis/SmithL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tasm/Elbirt05,
  author       = {Adam J. Elbirt},
  title        = {Who are you? How to protect against identity theft},
  journal      = {{IEEE} Technol. Soc. Mag.},
  volume       = {24},
  number       = {2},
  pages        = {5--8},
  year         = {2005},
  url          = {https://doi.org/10.1109/MTAS.2005.1442375},
  doi          = {10.1109/MTAS.2005.1442375},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tasm/Elbirt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/Sweeney05,
  author       = {Latanya Sweeney},
  title        = {{AI} Technologies to Defeat Identity Theft Vulnerabilities},
  booktitle    = {{AI} Technologies for Homeland Security, Papers from the 2005 {AAAI}
                  Spring Symposium, Technical Report SS-05-01, Stanford, California,
                  USA, March 21-23, 2005},
  pages        = {136--138},
  publisher    = {{AAAI}},
  year         = {2005},
  url          = {http://www.aaai.org/Library/Symposia/Spring/2005/ss05-01-024.php},
  timestamp    = {Sat, 18 Feb 2012 12:25:28 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaiss/Sweeney05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/YurcikL05,
  author       = {William Yurcik and
                  Chao Liu},
  title        = {A first step toward detecting {SSH} identity theft in {HPC} cluster
                  environments: discriminating masqueraders based on command behavior},
  booktitle    = {5th International Symposium on Cluster Computing and the Grid (CCGrid
                  2005), 9-12 May, 2005, Cardiff, {UK}},
  pages        = {111--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CCGRID.2005.1558542},
  doi          = {10.1109/CCGRID.2005.1558542},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/YurcikL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/MadsenKT05,
  author       = {Paul Madsen and
                  Yuzo Koga and
                  Kenji Takahashi},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Atsuhiro Goto},
  title        = {Federated identity management for protecting users from {ID} theft},
  booktitle    = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax,
                  VA, USA, November 11, 2005},
  pages        = {77--83},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102486.1102500},
  doi          = {10.1145/1102486.1102500},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/MadsenKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/MoustakasDR05,
  author       = {Evangelos Moustakas and
                  Penny Duquenoy and
                  C. Ranganathan},
  title        = {Phish or Treat? Understanding the Tactics and Responses to Electronic
                  Identity Theft on the Internet},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {239--248},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Thu, 23 Jun 2016 15:53:29 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/MoustakasDR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/OorschotS05,
  author       = {Paul C. van Oorschot and
                  Stuart G. Stubblebine},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking,
                  and Funneling},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {31--43},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_3},
  doi          = {10.1007/11507840\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/OorschotS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/human/KwonM05,
  author       = {Taekyoung Kwon and
                  Hyeonjoon Moon},
  editor       = {Shinji Shimojo and
                  Shingo Ichii and
                  Tok Wang Ling and
                  Kwan Ho Song},
  title        = {Multi-modal Techniques for Identity Theft Prevention},
  booktitle    = {Web and Communication Technologies and Internet-Related Social Issues
                  - {HSI} 2005, 3rd International Conference on Human.Society@Internet,
                  Tokyo, Japan, July 27-29, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3597},
  pages        = {291--300},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11527725\_30},
  doi          = {10.1007/11527725\_30},
  timestamp    = {Sat, 19 Oct 2019 20:10:03 +0200},
  biburl       = {https://dblp.org/rec/conf/human/KwonM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/SohV04,
  author       = {Gim Hiong Soh and
                  Timo Vuori},
  title        = {New Form of Identity {(ID)} Theft Crime: Acquiring Personal Information
                  from Your Online Newsletter Providers},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {27--36},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 09:42:27 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/SohV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LuA04,
  author       = {HongQian Karen Lu and
                  Asad M. Ali},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Prevent Online Identity Theft - Using Network Smart Cards for Secure
                  Online Transactions},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {342--353},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_29},
  doi          = {10.1007/978-3-540-30144-8\_29},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/LuA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChouLTM04,
  author       = {Neil Chou and
                  Robert Ledesma and
                  Yuka Teraguchi and
                  John C. Mitchell},
  title        = {Client-Side Defense Against Web-Based Identity Theft},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2004, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2004},
  url          = {https://www.ndss-symposium.org/ndss2004/client-side-defense-against-web-based-identity-theft/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChouLTM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ShostackS04,
  author       = {Adam Shostack and
                  Paul Syverson},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {What Price Privacy? - and why identity theft is about neither identity
                  nor theft},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_10},
  doi          = {10.1007/1-4020-8090-5\_10},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ShostackS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/McCarty03a,
  author       = {Bill McCarty},
  title        = {Automated Identity Theft},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {5},
  pages        = {89--92},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1236244},
  doi          = {10.1109/MSECP.2003.1236244},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/McCarty03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Fichtman01,
  author       = {Paul Fichtman},
  title        = {Preventing Credit Card Fraud and Identity Theft: {A} Primer for Online
                  Merchants},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {10},
  number       = {5},
  pages        = {1--8},
  year         = {2001},
  url          = {https://doi.org/10.1201/1086/43315.10.5.20011101/31721.8},
  doi          = {10.1201/1086/43315.10.5.20011101/31721.8},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Fichtman01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Poore01b,
  author       = {Ralph Spencer Poore},
  title        = {Identity Theft: Who Are You Anyway?},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {10},
  number       = {3},
  pages        = {1--6},
  year         = {2001},
  url          = {https://doi.org/10.1201/1086/43316.10.3.20010701/31724.3},
  doi          = {10.1201/1086/43316.10.3.20010701/31724.3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Poore01b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Berghel00,
  author       = {Hal Berghel},
  title        = {Identity Theft, Social Security Numbers, and the Web},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {2},
  pages        = {17--21},
  year         = {2000},
  url          = {https://doi.org/10.1145/328236.328114},
  doi          = {10.1145/328236.328114},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Berghel00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics