This essay argues that the decline of public identities over the past three decades, combined with increasing secrecy in the process of identification, is the root cause of the burgeoning problem of identity theft. Identity theft is easy because impersonation increasingly takes place in private transactions that are invisible to the victim. The essay compares two proposed solutions: Professor Daniel Soloves\u27 architectural approach and the author\u27s Public Identity System. Both would make the identification process transparent to the person identified, put imposters at risk by requiring personal appearances, and ban the use of social security numbers as passwords. But the two writers take opposing positions with respect to continued sec...
This book chapter was originally written for a conference on privacy and security at Stanford Law Sc...
Many privacy advocates, and scholars, seek to liberate privacy from shame. We need to understand tha...
This is the author accepted manuscript. The final version is available from Wiley via the DOI in thi...
This paper builds on the theory of human identification proposed by Professor Roger Clarke and uses ...
This Article contrasts two models for understanding and protecting against privacy violations. Tradi...
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs whe...
This dissertation includes two essays on identity theft. we developed a modified routine activity th...
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs whe...
Identity theft, defined as the illegal use of someone else's personal information (such as a Social...
This paper examines the relationship between security, surveillance, privacy and identity, both in t...
Despite individuals’ and organizations’ best efforts, many significant information security threats ...
Personal identity and privacy are important topics in information systems in general and data analyt...
With advances in technology and increases in impersonal electronic transactions, identity theft IT) ...
This paper examines identity theft in both the United States and Canada. Various examples of commerc...
Each year identity theft victimizes more people, taking their time, money, and feeling of financial ...
This book chapter was originally written for a conference on privacy and security at Stanford Law Sc...
Many privacy advocates, and scholars, seek to liberate privacy from shame. We need to understand tha...
This is the author accepted manuscript. The final version is available from Wiley via the DOI in thi...
This paper builds on the theory of human identification proposed by Professor Roger Clarke and uses ...
This Article contrasts two models for understanding and protecting against privacy violations. Tradi...
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs whe...
This dissertation includes two essays on identity theft. we developed a modified routine activity th...
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs whe...
Identity theft, defined as the illegal use of someone else's personal information (such as a Social...
This paper examines the relationship between security, surveillance, privacy and identity, both in t...
Despite individuals’ and organizations’ best efforts, many significant information security threats ...
Personal identity and privacy are important topics in information systems in general and data analyt...
With advances in technology and increases in impersonal electronic transactions, identity theft IT) ...
This paper examines identity theft in both the United States and Canada. Various examples of commerc...
Each year identity theft victimizes more people, taking their time, money, and feeling of financial ...
This book chapter was originally written for a conference on privacy and security at Stanford Law Sc...
Many privacy advocates, and scholars, seek to liberate privacy from shame. We need to understand tha...
This is the author accepted manuscript. The final version is available from Wiley via the DOI in thi...