L. Jean Camp 
Economics of Identity Theft [PDF ebook] 
Avoidance, Causes and Possible Cures

Dukung

Anyone who has ever bought a car, rented an apartment, had a job or conversation that they would rather not see in their employee review may find this book of interest. There is a collision occurring in identity management. Identity technologies are problematic, and many see light at the end of the identity theft tunnel. Yet the innovation is driven by individual tendencies to seek convenience and business imperatives to minimize risk with maximized profit. The light is an oncoming identity train wreck of maximum individual exposure, social risk and minimal privacy. The primary debate over identity technologies is happening on the issue of centralization. Real ID is effectively a centralized standard with a slightly distributed back-end (e.g., fifty servers). Real ID is a national ID card. Many mechanisms for federated identities, such as Open ID or the Liberty Alliance, imagine a network of identifiers shared on an as-needed or ad-hoc process. These systems accept the limits of human information processing, and thus use models that work on paper. Using models that work on paper results in systematic risk of identity theft in this information economy. There are alternatives to erosions of privacy and increasing fraud. There is an ideal where individuals have multiple devices, including computers, smart cards, and cell phones. Smart cards are credit card devices that are cryptographically secure. This may be shared and misused, or secure and privacy enhancing. Yet such a system requires coordinated investment.

€53.49
cara pembayaran

Daftar Isi

Identity in Economics, and in Context.- Modern Technological and Traditional Social Identities.- Identity Theft.- Who Owns You?.- Defeating the Greatest Masquerade.- Secrecy, Privacy, Identity.- Security and Privacy as Market Failures.- Trusting Code and Trusting Hardware.- Technologies of Identity.- Anonymous Identifiers.- Digital Signatures.- Strengths and Weaknesses of Biometrics.- Reputation.- Scenario I: Your Credentials Please.- Scenario II: Universal National Identifier.- Scenario III: Sets of attributes.- Scenario IV: Ubiquitous Identity Theft.- Closing.

Beli ebook ini dan dapatkan 1 lagi GRATIS!
Bahasa Inggris ● Format PDF ● Halaman 184 ● ISBN 9780387686141 ● Ukuran file 2.0 MB ● Penerbit Springer US ● Kota NY ● Negara US ● Diterbitkan 2007 ● Diunduh 24 bulan ● Mata uang EUR ● ID 2145400 ● Perlindungan salinan DRM sosial

Ebook lainnya dari penulis yang sama / Editor

16,614 Ebooks dalam kategori ini