Review
Version 1
Preserved in Portico This version is not peer-reviewed
Online Identity Theft, Security Issues, and Reputational Damage
Version 1
: Received: 1 February 2021 / Approved: 2 February 2021 / Online: 2 February 2021 (10:31:24 CET)
How to cite: A/P Sinnathamby Sehgar, S.; Zukarnain, Z. A. Online Identity Theft, Security Issues, and Reputational Damage. Preprints 2021, 2021020082. https://doi.org/10.20944/preprints202102.0082.v1 A/P Sinnathamby Sehgar, S.; Zukarnain, Z. A. Online Identity Theft, Security Issues, and Reputational Damage. Preprints 2021, 2021020082. https://doi.org/10.20944/preprints202102.0082.v1
Abstract
Online identity-based theft is known to be one of the most serious and growing threats to victims, such as individuals and organizations, over the last 10 years due to the enormous economic damage these crimes have caused. The availability of personal information on the Internet has increased the chances of this cyber-crime. Online identity theft crime is the result of a combination of cyber-crimes on the one hand and lack of awareness and training of users on the other hand to protect personal data on the other. Education and awareness, which also contributes to early detection, is the strongest tool for consumers to safeguard themselves from online identity fraud. This paper provides a comprehensive explanation of online identity theft, the various approaches that thieves use to attack individuals and organizations and the types of fraud involved in this cyber-crime. The aim of this research is to evaluate the need for a reformulation of the concept of identity theft in order to be compatible with the evolution of behaviors and fraud.
Keywords
identity theft; cyber-crime; identity fraud; types; techniques
Subject
Computer Science and Mathematics, Security Systems
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment