Identity Theft

  • David Salomon
Part of the Undergraduate Topics in Computer Science book series (UTICS)


Identity theft is the crime of pretending to be someone else. The thief goes to the trouble of obtaining someone’s identity in order to gain financially from fraud, leaving the victim to sort out the resulting mess as best they can. Identity thieves use three main methods to obtain personal information:


Personal Information Credit Card Smart Card Proxy Server Social Security Number 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  1. annualcreditreport (2010) is
  2. Calif-gov (2005) “Your Social Security Number: Controlling the Key to Identity Theft,” online at
  3. creditexpert (2005) is
  4. creditreporting (2005) is
  5. dodgeit (2004) is
  6. equifax (2005) is
  7. homograph (2005) is the PDF document at˜gabr/papers/homograph_full.pdf.
  8. idtheftcenter (2004) is
  9. knowyourloanrate (2005) is
  10. mailinator (2004) is
  11. qspace (2005) is
  12. SaftLite (2005) is
  13. spambob (2004) is
  14. spamgourmet (2004) is
  15. ssa-stat (2005) is Scholar
  16. TransUnion (2005) is

Copyright information

© Springer London 2010

Authors and Affiliations

  1. 1.Computer Science Dept.California State University, NorthridgeNorthridgeUSA

Personalised recommendations