Logo - springer
Slogan - springer

Computer Science - Image Processing | Economics of Identity Theft - Avoidance, Causes and Possible Cures

Economics of Identity Theft

Avoidance, Causes and Possible Cures

Camp, L. Jean

2007, XV, 184 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$59.99

(net) price for USA

ISBN 978-0-387-68614-1

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Hardcover
Information

Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$79.99

(net) price for USA

ISBN 978-0-387-34589-5

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$79.99

(net) price for USA

ISBN 978-1-4419-4182-4

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • Covers both the technical and economic side of identify theft
  • Identifies systematic problems and presents practical individual strategies for preventing identity theft
  • Includes the method "Identity Papers"—the technology that underlies assumptions in many digital systems

Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information. Together, these points illustrate that the near-term search for cheap identity management is a formula for long-term fraud resulting in ever-increasing identity theft.

The Economics of Identity Theft: Avoidance, Causes and Possible Cures, a professional book, discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and the placement of biometric security in an economically broken system, which results in a broken biometric system. The final chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status. In conclusion, four startling previews of the future are written as scenarios.

The Economics of Identity Theft: Avoidance, Causes and Possible Cures is designed for a professional audience composed of practitioners and researchers. This book is also suitable as a secondary text for advanced-level students in computer science, economics and several other disciplines.

 

Content Level » Professional/practitioner

Keywords » Camp - Economics - Good name - Identity - Information - Signatur - communication - cryptology - data encryption - data structure - identity management - information theory - networks - privacy - value

Related subjects » Communication Networks - Economics - Image Processing - Security and Cryptology

Table of contents 

Identity in Economics, and in Context.- Modern Technological and Traditional Social Identities.- Identity Theft.- Who Owns You?.- Defeating the Greatest Masquerade.- Secrecy, Privacy, Identity.- Security and Privacy as Market Failures.- Trusting Code and Trusting Hardware.- Technologies of Identity.- Anonymous Identifiers.- Digital Signatures.- Strengths and Weaknesses of Biometrics.- Reputation.- Scenario I: Your Credentials Please.- Scenario II: Universal National Identifier.- Scenario III: Sets of attributes.- Scenario IV: Ubiquitous Identity Theft.- Closing.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Biometrics.