Article ID Journal Published Year Pages File Type
10344893 Computer Law & Security Review 2005 10 Pages PDF
Abstract
With the aid of an example case of identity theft used to perpetrate an apparent benefits fraud and consideration of other undesirable online activities, the authors examine the motives and methods of Internet-based identity theft. Consideration is given to how such cases may be detected, investigated and prevented in the future. The problem of trust relationships and validation of identity tokens is discussed and recommendations for the prevention of identity theft are given.
Related Topics
Physical Sciences and Engineering Computer Science Computer Science (General)
Authors
, ,