Academic literature on the topic 'Identity fraud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity fraud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Identity fraud"
McElligott, G. "Identity fraud." British Dental Journal 204, no. 2 (2008): 51–52. http://dx.doi.org/10.1038/bdj.2008.16.
Full textMcNulty, Tracey. "Fighting identity fraud." Working with Older People 8, no. 3 (2004): 25–26. http://dx.doi.org/10.1108/13663666200400039.
Full textSproule, Susan, and Norm Archer. "Measuring identity theft and identity fraud." International Journal of Business Governance and Ethics 5, no. 1/2 (2010): 51. http://dx.doi.org/10.1504/ijbge.2010.029555.
Full textHinde, Steven. "Identity theft & fraud." Computer Fraud & Security 2005, no. 6 (2005): 18–20. http://dx.doi.org/10.1016/s1361-3723(05)70223-2.
Full textLee, Victor. "Biometrics and identity fraud." Biometric Technology Today 16, no. 2 (2008): 7–11. http://dx.doi.org/10.1016/s0969-4765(08)70059-6.
Full textSoomro, Zahoor Ahmed, Javed Ahmed, Mahmood Hussain Shah, and Khalil Khoumbati. "Investigating identity fraud management practices in e-tail sector: a systematic review." Journal of Enterprise Information Management 32, no. 2 (2019): 301–24. http://dx.doi.org/10.1108/jeim-06-2018-0110.
Full textKoops, Bert-Jaap, and Ronald Leenes. "Identity theft, identity fraud and/or identity-related crime." Datenschutz und Datensicherheit - DuD 30, no. 9 (2006): 553–56. http://dx.doi.org/10.1007/s11623-006-0141-2.
Full textGrijpink, Jan. "Biometrics and identity fraud protection." Computer Law & Security Review 21, no. 3 (2005): 249–56. http://dx.doi.org/10.1016/j.clsr.2005.04.009.
Full textFurnell, Steven. "Identity impairment: The problems facing victims of identity fraud." Computer Fraud & Security 2007, no. 12 (2007): 6–11. http://dx.doi.org/10.1016/s1361-3723(07)70168-9.
Full textArcher, Norm. "Consumer identity theft prevention and identity fraud detection behaviours." Journal of Financial Crime 19, no. 1 (2011): 20–36. http://dx.doi.org/10.1108/13590791211190704.
Full textDissertations / Theses on the topic "Identity fraud"
Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.
Full textHolmes, Timothy. "Examination of identity theft and identity fraud and the role of the National Identity Card Scheme." Thesis, Bangor University, 2009. https://research.bangor.ac.uk/portal/en/theses/examination-of-identity-theft-and-identity-fraud-and-the-role-of-the-national-identity-card-scheme(2ea7fafb-d68d-4e1a-9edb-591a1abcf167).html.
Full textBjörnhed, Joakim. "Using a Chatbot to Prevent Identity Fraud By Social Engineering." Thesis, University of Skövde, School of Humanities and Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-3396.
Full textHenry, Kenneth Robert. "Attributes of Identity Document Credibility: A Synthesis of Expert Knowledge." FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/57.
Full textJohnson, Mireille. "Am I who I say I am? a systems analysis into identity fraud in New Zealand." AUT University, 2009. http://hdl.handle.net/10292/828.
Full textBrandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.
Full textClement, Junior V. "Strategies to Prevent and Reduce Medical Identity Theft Resulting in Medical Fraud." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4843.
Full textAllison, Stuart F. H. "A Case Study of Identity Theft." [Tampa, Fla. : s.n.], 2003. http://purl.fcla.edu/fcla/etd/SFE0000093.
Full textPhiri, Jackson. "A digital identity management system." Thesis, UWC, 2007. http://hdl.handle.net/11394/2871.
Full textDowning, Christopher O'Brien Jr. "Developing a Practical Intervention to Prevent Identity Theft: A Behavioral-Science Field Study." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/41968.
Full textBooks on the topic "Identity fraud"
Police, Illinois State. Consumer fraud & identity theft. ISP Central Printing Section, 2007.
Find full textFraud 101: Identity theft, fraud and Internet scams & schemes. General Store Pub. House, 2009.
Find full textOffice, Illinois Attorney General's. Identity theft: We can help. Lisa Madigan, Illinois Attorney General, 2006.
Find full textM, Vieraitis Lynne, ed. Identity thieves: Motives and methods. Northeastern University Press, 2012.
Find full textGillette, Clayton P. Electronic fund transfer fraud protection: From identity theft to wire transfer fraud. Sheshunoff, 2005.
Find full textGordon, Gary R. Identity fraud: A critical national and global threat. Economic Crime Institute, 2003.
Find full textGillette, Clayton P. NAFCU's EFT fraud protection for credit unions: From identity theft to wire transfer fraud. Sheshunoff, 2005.
Find full textThe identity theft protection guide: Safeguard your family, protect your privacy, recover a stolen identity. St. Martin's Press, 2004.
Find full textBook chapters on the topic "Identity fraud"
Chapman, Robert James. "Identity theft fraud." In The SME Business Guide to Fraud Risk Management. Routledge, 2022. http://dx.doi.org/10.4324/9781003200383-11.
Full textPavlicek, Bruno. "Operation: Overnight Identity Theft." In Computer Fraud Casebook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119197416.ch23.
Full textvan Schijndel, Peter. "Identity Theft and Fraud." In Information Technology and Law Series. T. M. C. Asser Press, 2011. http://dx.doi.org/10.1007/978-90-6704-731-9_22.
Full textLohr, Sharon. "Fraud and Identity Theft." In Measuring Crime. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9780429201189-9.
Full textSommariva, Brian, and James Martin. "Identity Theft and Privacy Protection." In The Handbook of Fraud Deterrence. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119202165.ch19.
Full textGrijpink, Jan. "Public Information Infrastructures and Identity Fraud." In Information Technology and Law Series. T. M. C. Asser Press, 2011. http://dx.doi.org/10.1007/978-90-6704-731-9_20.
Full textYang, Jie, Yingying Chen, Wade Trappe, and Jerry Cheng. "Detecting Mobile Agents Using Identity Fraud." In SpringerBriefs in Computer Science. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07356-9_5.
Full textThomas, Paula, and Theodore Tryfonas. "Hard-drive Disposal and Identity Fraud." In New Approaches for Security, Privacy and Trust in Complex Environments. Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-72367-9_41.
Full textZaeem, Razieh Nokhbeh, and K. Suzanne Barber. "Economics of Cybercrime: Identity Theft and Fraud." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1613-1.
Full textGebhardt, Christiane. "Corporate non-compliance and corporate identity building – A management dilemma. Early indicators of organizationally driven deviance traps." In Bribery, Fraud, Cheating. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29062-7_15.
Full textConference papers on the topic "Identity fraud"
Newman, Robert C. "Cybercrime, identity theft, and fraud." In the 3rd annual conference. ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231064.
Full textWagner, Nicole. "Identity Fraud Profiles: Victims and Offenders." In 2007 World Congress of the Management of e-Business. IEEE, 2007. http://dx.doi.org/10.1109/wcmeb.2007.50.
Full textBose, R. "Intelligent Technologies for Managing Fraud and Identity Theft." In Third International Conference on Information Technology: New Generations (ITNG'06). IEEE, 2006. http://dx.doi.org/10.1109/itng.2006.78.
Full textBouma, Henri, Jelle van Mil, Johan-Martijn ten Hove, et al. "Combatting fraud on travel, identity and breeder documents." In Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies VI, edited by Henri Bouma, Robert J. Stokes, Yitzhak Yitzhaky, and Radhakrishna Prabhu. SPIE, 2022. http://dx.doi.org/10.1117/12.2637416.
Full textTalburt, John, and Chia Chiang. "Attributed Identity Resolution for Fraud Detection and Prevention." In 2009 International Conference on Computing, Engineering and Information (ICC). IEEE, 2009. http://dx.doi.org/10.1109/icc.2009.6.
Full textJamieson, Rodger, Donald Winchester, and Stephen Smith. "Development of a Conceptual Framework for Managing Identity Fraud." In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07). IEEE, 2007. http://dx.doi.org/10.1109/hicss.2007.172.
Full textWu, Shan-Hung, Man-Ju Chou, Chun-Hsiung Tseng, Yuh-Jye Lee, and Kuan-Ta Chen. "Detecting in-situ identity fraud on social network services." In the 23rd International Conference. ACM Press, 2014. http://dx.doi.org/10.1145/2567948.2577308.
Full textLu, Xin-An, Jun Yang, Leena Mikkola, and Mikko Jakala. "Panel on: Maintaining Identity in the Virtual World." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2730.
Full textAbdelhalim, Amany, and Issa Traore. "The Impact of Google Hacking on Identity and Application Fraud." In 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/pacrim.2007.4313220.
Full textWang, Hongxia, and Jing Sang. "Speaker Identity Tracing Using Fingerprint Data Hiding against Telecommunications Fraud." In 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, 2018. http://dx.doi.org/10.23919/apsipa.2018.8659749.
Full textReports on the topic "Identity fraud"
Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Alaska: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.001.
Full textBonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Alabama: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.002.
Full textBonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Arkansas: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.003.
Full textBonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Arizona: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.004.
Full textBonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in California: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.005.
Full textBonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Colorado: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.006.
Full textBonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Connecticut: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.007.
Full textBonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Delaware: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.009.
Full textBonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Florida: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.010.
Full textBonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Georgia: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.011.
Full text