Academic literature on the topic 'Identity fraud'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity fraud.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Identity fraud"

1

McElligott, G. "Identity fraud." British Dental Journal 204, no. 2 (2008): 51–52. http://dx.doi.org/10.1038/bdj.2008.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

McNulty, Tracey. "Fighting identity fraud." Working with Older People 8, no. 3 (2004): 25–26. http://dx.doi.org/10.1108/13663666200400039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sproule, Susan, and Norm Archer. "Measuring identity theft and identity fraud." International Journal of Business Governance and Ethics 5, no. 1/2 (2010): 51. http://dx.doi.org/10.1504/ijbge.2010.029555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hinde, Steven. "Identity theft & fraud." Computer Fraud & Security 2005, no. 6 (2005): 18–20. http://dx.doi.org/10.1016/s1361-3723(05)70223-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Victor. "Biometrics and identity fraud." Biometric Technology Today 16, no. 2 (2008): 7–11. http://dx.doi.org/10.1016/s0969-4765(08)70059-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Soomro, Zahoor Ahmed, Javed Ahmed, Mahmood Hussain Shah, and Khalil Khoumbati. "Investigating identity fraud management practices in e-tail sector: a systematic review." Journal of Enterprise Information Management 32, no. 2 (2019): 301–24. http://dx.doi.org/10.1108/jeim-06-2018-0110.

Full text
Abstract:
PurposeIdentity fraud is a growing issue for online retail organisations. The literature on this issue is scattered, and none of the studies presents a holistic view of identity fraud management practices in the online retail context. Therefore, the purpose of this paper is to investigate the identity fraud management practices and present a comprehensive set of practices for e-tail sector.Design/methodology/approachA systematic literature review approach was adopted, and the articles were selected through pre-set inclusion criteria. The authors synthesised existing literature to investigate identity fraud management in e-tail sector.FindingsThe research finds that literature on practices for identity fraud management is scattered. The findings also reveal that firms assume identity fraud issues as a technological challenge, which is one of the major reasons for a gap in effective management of identity frauds. This research suggests e-tailers to deal this issue as a management challenge and counter strategies should be developed in technological, human and organisational aspects.Research limitations/implicationsThis study is limited to the published sources of data. Studies, based on empirical data, will be helpful to support the argument of this study; additionally, future studies are recommended to include a wide number of databases.Practical implicationsThis research will help e-tail organisations to understand the whole of identity fraud management and help them develop and implement a comprehensive set of practices at each stage, for effective management identity frauds.Originality/valueThis research makes unique contributions by synthesising existing literature at each stage of fraud management and encompasses social, organisational and technological aspects. It will also help academicians understanding a holistic view of available research and opens new lines for future research.
APA, Harvard, Vancouver, ISO, and other styles
7

Koops, Bert-Jaap, and Ronald Leenes. "Identity theft, identity fraud and/or identity-related crime." Datenschutz und Datensicherheit - DuD 30, no. 9 (2006): 553–56. http://dx.doi.org/10.1007/s11623-006-0141-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grijpink, Jan. "Biometrics and identity fraud protection." Computer Law & Security Review 21, no. 3 (2005): 249–56. http://dx.doi.org/10.1016/j.clsr.2005.04.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Furnell, Steven. "Identity impairment: The problems facing victims of identity fraud." Computer Fraud & Security 2007, no. 12 (2007): 6–11. http://dx.doi.org/10.1016/s1361-3723(07)70168-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Archer, Norm. "Consumer identity theft prevention and identity fraud detection behaviours." Journal of Financial Crime 19, no. 1 (2011): 20–36. http://dx.doi.org/10.1108/13590791211190704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Identity fraud"

1

Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.

Full text
Abstract:
ID-theft survival kit -- Book From victim to victor -- ID theft FAQ -- Audiocassettes -- Identity theft resources -- Testimonials -- ID theft action letters -- About the author -- Media appearances -- Identity theft laws -- Theft Deterrence Act.<br>Title from opening screen, December 28, 1999.
APA, Harvard, Vancouver, ISO, and other styles
2

Holmes, Timothy. "Examination of identity theft and identity fraud and the role of the National Identity Card Scheme." Thesis, Bangor University, 2009. https://research.bangor.ac.uk/portal/en/theses/examination-of-identity-theft-and-identity-fraud-and-the-role-of-the-national-identity-card-scheme(2ea7fafb-d68d-4e1a-9edb-591a1abcf167).html.

Full text
Abstract:
Since the start of the 21st century the terms identity theft and identity fraud have been used to describe a variety of crimes which appear both new and unique to the 21st century. So much so, that the government is in the process of re-introducing a National Identity Card Scheme to tackle the problem. But are identity theft and identity fraud uniquely 21st century problems, and is a new Identity Card Scheme going to prevent these crimes? The study seeks to examine identity theft and identity fraud and determine what these crimes are, and to distinguish between the two. In order to do this, the study will examine the different definitions used in America, Australia and the U.K. as well as the history of identity related crime. The use of identity theft and identity fraud by organised crime, illegal immigration and terrorism will also be discussed. This examination of identity theft and identity fraud includes an explanation of the differences between modern and traditional identity related crimes and the various methods used to gather information on people's identities. The study also looks at ways of researching identity related crime. As part of the research process, simulated identity theft was developed as a research approach. The use of this research method and the ethical and legal consideration associated with it are discussed at length as is the use of the internet as a source of information. The study concludes with an analysis of the role of the National Identity Card Scheme in preventing identity related crime, and the potential benefits and drawbacks of reintroducing a National Identity Card Scheme.
APA, Harvard, Vancouver, ISO, and other styles
3

Björnhed, Joakim. "Using a Chatbot to Prevent Identity Fraud By Social Engineering." Thesis, University of Skövde, School of Humanities and Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-3396.

Full text
Abstract:
<p>Social engineering is a threat that is expanding and threatens organisations existence. A social engineer can get hold of crucial business information that is vital for the organisation and by this threaten the organisation. To prevent successful fraud attempts the organisations need to educate their employees about social engineering fraud techniques that can be used for gaining information. Hence, information security education needs new educational approaches to cope with the threats.</p><p>A solution to the problem is the use of an automated chatbot that gives the employees knowledge about a threat that is difficult to spot. To understand if an automated chatbot is a possible solution to educate the users, an investigation about the applicability is conducted. The investigation is based on a survey that compares traditional security education that is based on reading a written informational text and the use of an automated chatbot that simulates a fraud attempt with the purpose to steal an identity. The education with the automated chatbot is to be exposed to an identity fraud attempt in a controlled environment and then get an explanation of what have happened and way.</p><p>The automated chatbot is developed with a fraud attempt that looks like a normal market research approach, the market research where conducted with question that gather information that is important for identity thefts.</p><p>The result of the investigation shows that it may be possible to use an automated chatbot for educating in social engineering fraud attacks. However there is still a need to solve several major problems before there are possible to make sure the concept is fully feasible.</p><p> </p>
APA, Harvard, Vancouver, ISO, and other styles
4

Henry, Kenneth Robert. "Attributes of Identity Document Credibility: A Synthesis of Expert Knowledge." FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/57.

Full text
Abstract:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.
APA, Harvard, Vancouver, ISO, and other styles
5

Johnson, Mireille. "Am I who I say I am? a systems analysis into identity fraud in New Zealand." AUT University, 2009. http://hdl.handle.net/10292/828.

Full text
Abstract:
The purpose of this thesis was to research the systems issues surrounding identity fraud in New Zealand. There is only limited published research on the topic, either at an academic or industry level. The New Zealand Government has been conducting work in identity fraud in recent times but New Zealand appears to be lagging behind other similar westernised countries in terms of developing specific identity fraud policy or legislative provisions. The research showed that New Zealand does have serious problems in its systems, which in some cases facilitate identity fraud. There is a lack of synchronicity between New Zealand Government systems which undermines a whole of government approach to minimising the risk of identity fraud. Issues in the private sector with identity fraud are just as serious, with financial advantage being one of the main reasons that identity fraud is committed. However, the lack of information sharing between the public and private sectors does not help stem the flow of identity fraud that is currently occurring. Finding policy solutions to combat identity fraud is far from being simplistic. Public policy in this area is fraught with social, political and financial implications. Identity fraud is committed with speed while public policy faces a slow battle with red tape. Nonetheless, the New Zealand Government does not even appear to categorically know what is happening on its own door step with respect to identity fraud. There are no statistics on identity fraud and no concrete figures as to the cost of identity fraud to New Zealand. To compound problems, identity fraud is not even an official offence classification so even when it is occurring, it is not always being recorded. The damage resulting from identity fraud can be catastrophic. Identity fraud is a breeder crime for other offences. It can enable an act of terrorism to occur, women and children to be trafficked, and organisations and individuals to suffer serious financial loss. In New Zealand however, the benefits of identity fraud can be great while the deterrents are weak. New Zealand faces potential harm to its international reputation if its systems are not strengthened to fight identity fraud. In order for this to occur, New Zealand needs to develop a specific identity fraud policy so that it has the basic knowledge in place to allocate the necessary resources to this problem.
APA, Harvard, Vancouver, ISO, and other styles
6

Brandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.

Full text
Abstract:
Detta examensarbete undersöker riskerna med elektronisk identifiering, mer specifikt säkerhetsrisker kring enheten BankID i Sverige. Idag används BankID i stor utsträckning, men elektronisk identifiering kommer också med vissa risker när det gäller identitetsrelaterade brott. I Sverige var brottstypen som ökade mest det senaste året mätt i anmälda brott, bedrägerier som huvudsakligen begåtts genom informationsteknik. Arbetet syftar därför till att undersöka vilka säkerhetsrisker som finns med den elektroniska identifieringen BankID, och hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott på detta område. Resultatet visar att den största säkerhetsrisken med BankID är användare/kunder som kan luras. Gärningsmän använder olika metoder för att få tillgång till andra personer BankID. Vad gäller hur Polismyndigheten och Ekobrottsmyndigheten bekämpar brott riktade mot elektronisk identifiering är resultatet delvis bristfälligt på grund av att Ekobrottsmyndigheten inte är representerade. Utifrån polisens perspektiv så undersöker de bedrägeri avseende BankID så som de gör med alla andra brott, men brottet har generellt en lägre prioritet inom myndigheten. Polisen samarbetar med olika aktörer samt bidrar båda till att utveckla produktens säkerhet och informera kunderna om säkerhet och risker avseende BankID.<br>This thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
APA, Harvard, Vancouver, ISO, and other styles
7

Clement, Junior V. "Strategies to Prevent and Reduce Medical Identity Theft Resulting in Medical Fraud." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4843.

Full text
Abstract:
Medical identity fraud is a byproduct of identity theft; it enables imposters to procure medical treatment, thus defrauding patients, insurers, and government programs through forged prescriptions, falsified medical records, and misuse of victim's health insurance. In 2014, for example, the United States Government lost $14.1 billion in improper payments. The purpose of this multiple case study, grounded by the Health Insurance Portability and Accountability Act as the conceptual framework, was to explore the strategies 5 healthcare leaders used to prevent identity theft and medical identity fraud and thus improve business performance in the state of New York. Data were collected using telephone interviews and open-ended questions. The data were analyzed using Yin's 5 step process. Based on data analysis, 5 themes emerged including: training and education (resulting to sub-themes: train employees, train patients, and educate consumers), technology (which focused on Kiosk, cloud, off-site storage ending with encryption), protective measures, safeguarding personally identifiable information, and insurance. Recommendations calls for leaders of large, medium, and small healthcare organizations and other industries to educate employees and victims of identity theft because the problems resulting from fraud travel beyond the borders of medical facilities: they flow right into consumers' residences. Findings from this study may contribute to social change through improved healthcare services and reduced medical costs, leading to more affordable healthcare.
APA, Harvard, Vancouver, ISO, and other styles
8

Allison, Stuart F. H. "A Case Study of Identity Theft." [Tampa, Fla. : s.n.], 2003. http://purl.fcla.edu/fcla/etd/SFE0000093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Phiri, Jackson. "A digital identity management system." Thesis, UWC, 2007. http://hdl.handle.net/11394/2871.

Full text
Abstract:
>Magister Scientiae - MSc<br>The recent years have seen an increase in the number of users accessing online services using communication devices such as computers, mobile phones and cards based credentials such as credit cards. This has prompted most governments and business organizations to change the way they do business and manage their identity information. The coming of the online services has however made most Internet users vulnerable to identity fraud and theft. This has resulted in a subsequent increase in the number of reported cases of identity theft and fraud, which is on the increase and costing the global industry excessive amounts. Today with more powerful and effective technologies such as artificial intelligence, wireless communication, mobile storage devices and biometrics, it should be possible to come up with a more effective multi-modal authentication system to help reduce the cases of identity fraud and theft. A multi-modal digital identity management system is proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft seen on most online services today. The proposed system thus uses technologies such as artificial intelligence and biometrics on the current unsecured networks to maintain the security and privacy of users and service providers in a transparent, reliable and efficient way. In order to be authenticated in the proposed multi-modal authentication system, a user is required to submit more than one credential attribute. An artificial intelligent technology is used to implement a technique of information fusion to combine the user’s credential attributes for optimum recognition. The information fusion engine is then used to implement the required multi-modal authentication system.
APA, Harvard, Vancouver, ISO, and other styles
10

Downing, Christopher O'Brien Jr. "Developing a Practical Intervention to Prevent Identity Theft: A Behavioral-Science Field Study." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/41968.

Full text
Abstract:
Cashiers' identification-checking behaviors were observed at two grocery stores with the aim to actively involve cashiers in decreasing credit-card fraud. After baseline observations, cashiers at one store received a participative goal-setting and feedback intervention, whereby they collaboratively set a store goal for checking customers' identification. Over 23 days, the cashiers received one-to-one verbal feedback on their store's identification-checking percentages. The percentage of identification-checked purchases at the intervention store increased from 0.2 percent at Baseline to 9.7 percent during the Intervention. Then, it declined to 2.3 percent during Withdrawal, showing functional control of the intervention over the cashiers' target behavior. The cashiers at the other store served as the control group, and their percentage of identification-checked purchases were 0.3 percent, 0.4 percent, and 0.7 percent respectively during each of the A-B-A phases at the intervention store. It was also found the intervention affected male cashiers more than female cashiers. The present study also assessed the social validity of the current intervention by surveying both customers and cashiers from the intervention store. The results showed that customers do not mind getting their ID checked, while cashiers consider it important to check a customer for identification during a credit purchase.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Identity fraud"

1

Police, Illinois State. Consumer fraud & identity theft. ISP Central Printing Section, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fraud 101: Identity theft, fraud and Internet scams & schemes. General Store Pub. House, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Office, Illinois Attorney General's. Identity theft: We can help. Lisa Madigan, Illinois Attorney General, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

M, Vieraitis Lynne, ed. Identity thieves: Motives and methods. Northeastern University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gillette, Clayton P. Electronic fund transfer fraud protection: From identity theft to wire transfer fraud. Sheshunoff, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kiesbye, Stefan. Identity theft. Greenhaven Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kiesbye, Stefan. Identity theft. Greenhaven Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gordon, Gary R. Identity fraud: A critical national and global threat. Economic Crime Institute, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gillette, Clayton P. NAFCU's EFT fraud protection for credit unions: From identity theft to wire transfer fraud. Sheshunoff, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

The identity theft protection guide: Safeguard your family, protect your privacy, recover a stolen identity. St. Martin's Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Identity fraud"

1

Chapman, Robert James. "Identity theft fraud." In The SME Business Guide to Fraud Risk Management. Routledge, 2022. http://dx.doi.org/10.4324/9781003200383-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pavlicek, Bruno. "Operation: Overnight Identity Theft." In Computer Fraud Casebook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119197416.ch23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

van Schijndel, Peter. "Identity Theft and Fraud." In Information Technology and Law Series. T. M. C. Asser Press, 2011. http://dx.doi.org/10.1007/978-90-6704-731-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lohr, Sharon. "Fraud and Identity Theft." In Measuring Crime. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9780429201189-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sommariva, Brian, and James Martin. "Identity Theft and Privacy Protection." In The Handbook of Fraud Deterrence. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119202165.ch19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grijpink, Jan. "Public Information Infrastructures and Identity Fraud." In Information Technology and Law Series. T. M. C. Asser Press, 2011. http://dx.doi.org/10.1007/978-90-6704-731-9_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Jie, Yingying Chen, Wade Trappe, and Jerry Cheng. "Detecting Mobile Agents Using Identity Fraud." In SpringerBriefs in Computer Science. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07356-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thomas, Paula, and Theodore Tryfonas. "Hard-drive Disposal and Identity Fraud." In New Approaches for Security, Privacy and Trust in Complex Environments. Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-72367-9_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zaeem, Razieh Nokhbeh, and K. Suzanne Barber. "Economics of Cybercrime: Identity Theft and Fraud." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1613-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gebhardt, Christiane. "Corporate non-compliance and corporate identity building – A management dilemma. Early indicators of organizationally driven deviance traps." In Bribery, Fraud, Cheating. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29062-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Identity fraud"

1

Newman, Robert C. "Cybercrime, identity theft, and fraud." In the 3rd annual conference. ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wagner, Nicole. "Identity Fraud Profiles: Victims and Offenders." In 2007 World Congress of the Management of e-Business. IEEE, 2007. http://dx.doi.org/10.1109/wcmeb.2007.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bose, R. "Intelligent Technologies for Managing Fraud and Identity Theft." In Third International Conference on Information Technology: New Generations (ITNG'06). IEEE, 2006. http://dx.doi.org/10.1109/itng.2006.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bouma, Henri, Jelle van Mil, Johan-Martijn ten Hove, et al. "Combatting fraud on travel, identity and breeder documents." In Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies VI, edited by Henri Bouma, Robert J. Stokes, Yitzhak Yitzhaky, and Radhakrishna Prabhu. SPIE, 2022. http://dx.doi.org/10.1117/12.2637416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Talburt, John, and Chia Chiang. "Attributed Identity Resolution for Fraud Detection and Prevention." In 2009 International Conference on Computing, Engineering and Information (ICC). IEEE, 2009. http://dx.doi.org/10.1109/icc.2009.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jamieson, Rodger, Donald Winchester, and Stephen Smith. "Development of a Conceptual Framework for Managing Identity Fraud." In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07). IEEE, 2007. http://dx.doi.org/10.1109/hicss.2007.172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Shan-Hung, Man-Ju Chou, Chun-Hsiung Tseng, Yuh-Jye Lee, and Kuan-Ta Chen. "Detecting in-situ identity fraud on social network services." In the 23rd International Conference. ACM Press, 2014. http://dx.doi.org/10.1145/2567948.2577308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lu, Xin-An, Jun Yang, Leena Mikkola, and Mikko Jakala. "Panel on: Maintaining Identity in the Virtual World." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2730.

Full text
Abstract:
Being able to establish and maintain an identity on the virtual world is becoming an increasingly important issue in the twenty-first century. These presentations address this critical issue from three perspectives: virtual identity fraud, virtual social support, and access to virtual communication technologies.
APA, Harvard, Vancouver, ISO, and other styles
9

Abdelhalim, Amany, and Issa Traore. "The Impact of Google Hacking on Identity and Application Fraud." In 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/pacrim.2007.4313220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Hongxia, and Jing Sang. "Speaker Identity Tracing Using Fingerprint Data Hiding against Telecommunications Fraud." In 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, 2018. http://dx.doi.org/10.23919/apsipa.2018.8659749.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Identity fraud"

1

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Alaska: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Alabama: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Arkansas: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Arizona: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in California: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Colorado: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Connecticut: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Delaware: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Florida: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bonner Cozad, Aisha, and Kadeem Thorpe. Consumer Fraud in Georgia: Is Your Identity at Risk? AARP Research, 2017. http://dx.doi.org/10.26419/res.00171.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!