Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10344893 | Computer Law & Security Review | 2005 | 10 Pages |
Abstract
With the aid of an example case of identity theft used to perpetrate an apparent benefits fraud and consideration of other undesirable online activities, the authors examine the motives and methods of Internet-based identity theft. Consideration is given to how such cases may be detected, investigated and prevented in the future. The problem of trust relationships and validation of identity tokens is discussed and recommendations for the prevention of identity theft are given.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Science (General)
Authors
Angus M. Marshall, Brian C. Tompsett,