Detection and Response of Identity Theft within a Company Utilizing Location Information

Yucheol Cho, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Accidents of information leakage and system hacking caused by identity theft in the organization/company have happened frequently. Many companies make a lot of efforts to prevent account theft such as access control, multi-factor authentication, encryption, and response to malicious code. It is not easy to apply them to the company because of less efficiency and inconvenience. In this paper, countermeasure against the threat of hacking is presented with the methods which is low-cost and with low false detection. The methods do not infringe privacy and decrease the efficiency of work through detection of identity theft by utilizing the physical information of employees.

Original languageEnglish
Title of host publication2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467386852
DOIs
Publication statusPublished - 2016 Apr 19
Event3rd International Conference on Platform Technology and Service, PlatCon 2016 - Jeju, Korea, Republic of
Duration: 2016 Feb 152016 Feb 17

Other

Other3rd International Conference on Platform Technology and Service, PlatCon 2016
CountryKorea, Republic of
CityJeju
Period16/2/1516/2/17

Fingerprint

Industry
Access control
Authentication
Cryptography
Accidents
Personnel
Costs

Keywords

  • detection and response hacking and information leakage
  • identity theft
  • physical information of employee

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Cite this

Cho, Y., & Lee, S. (2016). Detection and Response of Identity Theft within a Company Utilizing Location Information. In 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings [7456790] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/PlatCon.2016.7456790

Detection and Response of Identity Theft within a Company Utilizing Location Information. / Cho, Yucheol; Lee, Sangjin.

2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2016. 7456790.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cho, Y & Lee, S 2016, Detection and Response of Identity Theft within a Company Utilizing Location Information. in 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings., 7456790, Institute of Electrical and Electronics Engineers Inc., 3rd International Conference on Platform Technology and Service, PlatCon 2016, Jeju, Korea, Republic of, 16/2/15. https://doi.org/10.1109/PlatCon.2016.7456790
Cho Y, Lee S. Detection and Response of Identity Theft within a Company Utilizing Location Information. In 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2016. 7456790 https://doi.org/10.1109/PlatCon.2016.7456790
Cho, Yucheol ; Lee, Sangjin. / Detection and Response of Identity Theft within a Company Utilizing Location Information. 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2016.
@inproceedings{753793d760e94a98b12d6d650ab72f57,
title = "Detection and Response of Identity Theft within a Company Utilizing Location Information",
abstract = "Accidents of information leakage and system hacking caused by identity theft in the organization/company have happened frequently. Many companies make a lot of efforts to prevent account theft such as access control, multi-factor authentication, encryption, and response to malicious code. It is not easy to apply them to the company because of less efficiency and inconvenience. In this paper, countermeasure against the threat of hacking is presented with the methods which is low-cost and with low false detection. The methods do not infringe privacy and decrease the efficiency of work through detection of identity theft by utilizing the physical information of employees.",
keywords = "detection and response hacking and information leakage, identity theft, physical information of employee",
author = "Yucheol Cho and Sangjin Lee",
year = "2016",
month = "4",
day = "19",
doi = "10.1109/PlatCon.2016.7456790",
language = "English",
booktitle = "2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Detection and Response of Identity Theft within a Company Utilizing Location Information

AU - Cho, Yucheol

AU - Lee, Sangjin

PY - 2016/4/19

Y1 - 2016/4/19

N2 - Accidents of information leakage and system hacking caused by identity theft in the organization/company have happened frequently. Many companies make a lot of efforts to prevent account theft such as access control, multi-factor authentication, encryption, and response to malicious code. It is not easy to apply them to the company because of less efficiency and inconvenience. In this paper, countermeasure against the threat of hacking is presented with the methods which is low-cost and with low false detection. The methods do not infringe privacy and decrease the efficiency of work through detection of identity theft by utilizing the physical information of employees.

AB - Accidents of information leakage and system hacking caused by identity theft in the organization/company have happened frequently. Many companies make a lot of efforts to prevent account theft such as access control, multi-factor authentication, encryption, and response to malicious code. It is not easy to apply them to the company because of less efficiency and inconvenience. In this paper, countermeasure against the threat of hacking is presented with the methods which is low-cost and with low false detection. The methods do not infringe privacy and decrease the efficiency of work through detection of identity theft by utilizing the physical information of employees.

KW - detection and response hacking and information leakage

KW - identity theft

KW - physical information of employee

UR - http://www.scopus.com/inward/record.url?scp=84968623978&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84968623978&partnerID=8YFLogxK

U2 - 10.1109/PlatCon.2016.7456790

DO - 10.1109/PlatCon.2016.7456790

M3 - Conference contribution

AN - SCOPUS:84968623978

BT - 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -