Economics of Identity Theft Avoidance, Causes and Possible Cures /

Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy....

Full description

Main Author: Camp, L. Jean. (Author, http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: New York, NY : Springer US : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Subjects:
Online Access:https://doi.org/10.1007/978-0-387-68614-1
LEADER 04431nam a22005895i 4500
001 978-0-387-68614-1
003 DE-He213
005 20210619165812.0
007 cr nn 008mamaa
008 100301s2007 xxu| s |||| 0|eng d
020 |a 9780387686141  |9 978-0-387-68614-1 
024 7 |a 10.1007/978-0-387-68614-1  |2 doi 
050 4 |a QH323.5 
072 7 |a UYQP  |2 bicssc 
072 7 |a COM016000  |2 bisacsh 
072 7 |a UYQP  |2 thema 
072 7 |a UYQV  |2 thema 
082 0 4 |a 570.15195  |2 23 
100 1 |a Camp, L. Jean.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Economics of Identity Theft  |h [electronic resource] :  |b Avoidance, Causes and Possible Cures /  |c by L. Jean Camp. 
250 |a 1st ed. 2007. 
264 1 |a New York, NY :  |b Springer US :  |b Imprint: Springer,  |c 2007. 
300 |a XV, 184 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Identity in Economics, and in Context -- Modern Technological and Traditional Social Identities -- Identity Theft -- Who Owns You? -- Defeating the Greatest Masquerade -- Secrecy, Privacy, Identity -- Security and Privacy as Market Failures -- Trusting Code and Trusting Hardware -- Technologies of Identity -- Anonymous Identifiers -- Digital Signatures -- Strengths and Weaknesses of Biometrics -- Reputation -- Scenario I: Your Credentials Please -- Scenario II: Universal National Identifier -- Scenario III: Sets of attributes -- Scenario IV: Ubiquitous Identity Theft -- Closing. 
520 |a Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information. Together, these points illustrate that the near-term search for cheap identity management is a formula for long-term fraud resulting in ever-increasing identity theft. The Economics of Identity Theft: Avoidance, Causes and Possible Cures, a professional book, discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and the placement of biometric security in an economically broken system, which results in a broken biometric system. The final chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status. In conclusion, four startling previews of the future are written as scenarios. The Economics of Identity Theft: Avoidance, Causes and Possible Cures is designed for a professional audience composed of practitioners and researchers. This book is also suitable as a secondary text for advanced-level students in computer science, economics and several other disciplines. . 
650 0 |a Biometrics (Biology). 
650 0 |a Data encryption (Computer science). 
650 0 |a Economics. 
650 0 |a Management science. 
650 0 |a Computer security. 
650 0 |a Business. 
650 0 |a Computer communication systems. 
650 1 4 |a Biometrics.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I22040 
650 2 4 |a Cryptology.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020 
650 2 4 |a Economics, general.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/W00000 
650 2 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
650 2 4 |a Business and Management, general.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/500000 
650 2 4 |a Computer Communication Networks.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781441941824 
776 0 8 |i Printed edition:  |z 9780387514338 
776 0 8 |i Printed edition:  |z 9780387345895 
856 4 0 |u https://doi.org/10.1007/978-0-387-68614-1 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)