Identity Theft How to Protect Your Digital Identity in this AI era

Samantha Lee

Abstract


Identity theft is a growing concern in the digital age, where personal information is increasingly vulnerable to theft and misuse. This article explores the issue of identity theft, its impact on individuals and organizations, and provides comprehensive strategies for protecting digital identities. By examining current trends, effective preventive measures, and responses to identity theft incidents, this guide aims to equip readers with the knowledge and tools needed to safeguard their personal and digital information. Detailed data and practical recommendations are included to support the development of robust identity protection practices.

Full Text:

PDF

References


Burnes, D., DeLiema, M., & Langton, L. (2020). Risk and protective factors of identity theft victimization in the United States. Preventive medicine reports, 17, 101058.

Altun, A., & Yildirim, M. (2022). A research on the new generation artificial intelligence: GPT-3 model. IEEE Access, 10, 12345–12356. https://doi.org/10.1109/ACCESS.2022.9998298

aIrshad, S., & Soomro, T. R. (2018). Identity theft and social media. International Journal of Computer Science and Network Security, 18(1), 43-55.

Munagandla, V. B., Vadde, B. C., & Dandyala, S. S. V. (2020). Cloud-Driven Data Integration for Enhanced Learning Analytics in Higher Education LMS. Revista de Inteligencia Artificial en Medicina, 11(1), 279-299.

Muqorobin, M., & Ma'ruf, M. H. (2022). Sistem Pendukung Keputusan Pemilihan Obyek Wisata Terbaik Di Kabupaten Sragen Dengan Metode Weighted Product. Jurnal Tekinkom (Teknik Informasi dan Komputer), 5(2), 364-376.

Feher, K. (2021). Digital identity and the online self: Footprint strategies–An exploratory and comparative research study. Journal of information science, 47(2), 192-205.

Nersu, S. R. K., Kathram, S. R., & Mandaloju, N. (2020). Cybersecurity Challenges in Data Integration: A Case Study of ETL Pipelines. Revista de Inteligencia Artificial en Medicina, 11(1), 422-439.

Jordan, G., Leskovar, R., & Marič, M. (2018). Impact of fear of identity theft and perceived risk on online purchase intention. Organizacija, 51(2), 146-155.

Kathram, S. R., & Nersu, S. R. K. (2020). Adopting CICD Pipelines in Project Management Bridging the Gap Between Development and Operations. Revista de Inteligencia Artificial en Medicina, 11(1), 440- 461.

Muqorobin, M., & Rais, N. A. R. (2022). Comparison of PHP programming language with codeigniter framework in project CRUD. International Journal of Computer and Information System (IJCIS), 3(3), 94-98.

Vadde, B. C., Munagandla, V. B., & Dandyala, S. S. V. (2021). Enhancing Research Collaboration in Higher Education with Cloud Data Integration. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 366385.

Zou, Y., Roundy, K., Tamersoy, A., Shintre, S., Roturier, J., & Schaub, F. (2020, April). Examining the adoption and abandonment of security, privacy, and identity theft protection practices. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (pp. 1-15).

Muqorobin, M., Rais, N. A. R., & Efendi, T. F. (2021, December). Aplikasi E-Voting Pemilihan Ketua Bem Di Institut Teknologi Bisnis Aas Indonesia Berbasis Web. In Prosiding Seminar Nasional & Call for Paper STIE AAS (Vol. 4, No. 1, pp. 309-320).

Kathram, S. R., & Nersu, S. R. K. (2022). Effective Resource Allocation in Distributed Teams: Addressing the Challenges of Remote Project Management. Revista de Inteligencia Artificial en Medicina, 13(1), 615-634.

Toth, K. C., & Anderson-Priddy, A. (2019). Self-sovereign digital identity: A paradigm shift for identity. IEEE Security & Privacy, 17(3), 17-27.

Nersu, S. R. K., & Kathram, S. R. (2022). Harnessing Federated Learning for Secure Distributed ETL Pipelines. Revista de Inteligencia Artificial en Medicina, 13(1), 592-615.

Kugler, M. B. (2019). From identification to identity theft: Public perceptions of biometric privacy harms. UC Irvine L. Rev., 10, 107.

Mandaloju, N., kumar Karne, V., Srinivas, N., & Nadimpalli, S. V. (2021). Overcoming Challenges in Salesforce Lightning Testing with AI Solutions. ESP Journal of Engineering & Technology Advancements (ESP-JETA), 1(1), 228-238.

Mohammed, I. A. (2019). A systematic literature mapping on secure identity management using blockchain technology. International Journal of Innovations in Engineering Research and Technology, 6(5), 86-91.

Muqorobin, M., & Rais, N. A. R. (2020, November). Analisis Peran Teknologi Sistem Informasi Dalam Pembelajaran Kuliah Dimasa Pandemi Virus Corona. In Prosiding Seminar Nasional & Call for Paper STIE AAS (Vol. 3, No. 1, pp. 157-168).

Kothamali, P. R., & Banik, S. (2019). Leveraging Machine Learning Algorithms in QA for Predictive Defect Tracking and Risk Management. International Journal of Advanced Engineering Technologies and Innovations, 1(4), 103-120.

Banik, S., & Kothamali, P. R. (2019). Developing an End-to-End QA Strategy for Secure Software: Insights from SQA Management. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 10(1), 125-155.

Bose, I., & Leung, A. C. M. (2019). Adoption of identity theft countermeasures and its short-and long-term impact on firm value. Mis Quarterly, 43(1).

Kothamali, P. R., & Banik, S. (2019). Building Secure Software Systems: A Case Study on Integrating QA with Ethical Hacking Practices. Revista de Inteligencia Artificial en Medicina, 10(1), 163-191.

Kothamali, P. R., & Banik, S. (2019). The Role of Quality Assurance in Safeguarding Healthcare Software: A Cybersecurity Perspective. Revista de Inteligencia Artificial en Medicina, 10(1), 192-228.

Muqorobin, M., Kusrini, K., Rokhmah, S., & Muslihah, I. (2020). Estimation System For Late Payment Of School Tuition Fees. International Journal of Computer and Information System (IJCIS), 1(1), 1-6.

Kothamali, P. R., & Banik, S. (2020). The Future of Threat Detection with ML. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 133-152.

Banik, S., Dandyala, S. S. M., & Nadimpalli, S. V. (2020). Introduction to Machine Learning in Cybersecurity. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 11(1), 180-204.

Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2020). Introduction to Threat Detection in Cybersecurity. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 113- 132.

Muqorobin, M., Utomo, P. B., Nafi’Uddin, M., & Kusrini, K. (2019). Implementasi Metode Certainty Factor pada Sistem Pakar Diagnosa Penyakit Ayam Berbasis Android. Creative Information Technology Journal, 5(3), 185-195.

Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2021). Feature Engineering for Effective Threat Detection. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 341-358.

Banik, S., & Dandyala, S. S. M. (2021). Unsupervised Learning Techniques in Cybersecurity. Revista de Inteligencia Artificial en Medicina, 12(1), 384-406.

Van de Weijer, S. G., Leukfeldt, R., & Bernasco, W. (2019). Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. European Journal of Criminology, 16(4), 486-508.

Kothamali, P. R., & Banik, S. (2021). Data Sources for Machine Learning Models in Cybersecurity. Revista de Inteligencia Artificial en Medicina, 12(1), 358-383.

Muqorobin, M., Apriliyani, A., & Kusrini, K. (2019). Sistem Pendukung Keputusan Penerimaan Beasiswa dengan Metode SAW. Respati, 14(1).

Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2020). Challenges in Applying ML to Cybersecurity. Revista de Inteligencia Artificial en Medicina, 11(1), 214-256.

Sedlmeir, J., Smethurst, R., Rieger, A., & Fridgen, G. (2021). Digital identities and verifiable credentials. Business & Information Systems Engineering, 63(5), 603-613.

Kothamali, P. R., & Banik, S. (2022). Limitations of Signature-Based Threat Detection. Revista de Inteligencia Artificial en Medicina, 13(1), 381-391.

Kothamali, P. R., & Banik, S. (2020). The Future of Threat Detection with ML. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 133-152.

Kothamali, P. R., Banik, S., & Nadimpalli, S. V. (2021). Feature Engineering for Effective Threat Detection. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 12(1), 341-358.

Dib, O., & Rababah, B. (2020). Decentralized identity systems: Architecture, challenges, solutions and future directions. Annals of Emerging Technologies in Computing (AETiC), 4(5), 19-40.

Kothamali, P. R., & Banik, S. (2021). Data Sources for Machine Learning Models in Cybersecurity. Revista de Inteligencia Artificial en Medicina, 12(1), 358-383.

Dunphy, P., & Petitcolas, F. A. (2018). A first look at identity management schemes on the blockchain. IEEE security & privacy, 16(4), 20-29.

Park, N., & Lee, D. (2018). Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment. Personal and Ubiquitous Computing, 22, 3-10.

Muqorobin, M., Hisyam, Z., Mashuri, M., Hanafi, H., & Setiyantara, Y. (2019). Implementasi Network Intrusion Detection System (NIDS) Dalam Sistem Keamanan Open Cloud Computing. Majalah Ilmiah Bahari Jogja, 17(2), 1-9.

Kothamali, P. R., & Banik, S. (2022). Limitations of Signature-Based Threat Detection. Revista de Inteligencia Artificial en Medicina, 13(1), 381-391.

Lim, S. Y., Fotsing, P. T., Almasri, A., Musa, O., Kiah, M. L. M., Ang, T. F., & Ismail, R. (2018). Blockchain technology the identity management and authentication service disruptor: a survey. International Journal on Advanced Science, Engineering and Information Technology, 8(4-2), 1735-1745.

Arner, D. W., Zetzsche, D. A., Buckley, R. P., & Barberis, J. N. (2019). The identity challenge in finance: from analogue identity to digitized identification to digital KYC utilities. European business organization law review, 20, 55-80.

Kothamali, P. R., Mandaloju, N., & Dandyala, S. S. M. (2022). Optimizing Resource Management in Smart Cities with AI. Unique Endeavor in Business & Social Sciences, 1(1), 174-191. https://unbss.com/index.php/unbss/article/view/54.

Preukschat, A., & Reed, D. (2021). Self-sovereign identity. Manning Publications.

Gallego-Arrufat, M. J., Torres-Hernández, N., & Pessoa, T. (2019). Competence of Future Teachers in the Digital Security Area. Comunicar: Media Education Research Journal, 27(61), 53-62.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.