Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal information. Leakage of such information can facilitate large-scale identity theft. This paper determines how personal information leaks from online systems of national importance, discusses proof of concept software to demonstrate the seriousness of the problem, and suggests how to improve the situation. © 2008 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Klingsheim, A. N., & Hole, K. J. (2008). Identity theft: Much too easy? A study of online systems in Norway. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5143 LNCS, pp. 192–196). https://doi.org/10.1007/978-3-540-85230-8_17
Mendeley helps you to discover research relevant for your work.