Journal articles on the topic 'Identity fraud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identity fraud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
McElligott, G. "Identity fraud." British Dental Journal 204, no. 2 (2008): 51–52. http://dx.doi.org/10.1038/bdj.2008.16.
Full textMcNulty, Tracey. "Fighting identity fraud." Working with Older People 8, no. 3 (2004): 25–26. http://dx.doi.org/10.1108/13663666200400039.
Full textSproule, Susan, and Norm Archer. "Measuring identity theft and identity fraud." International Journal of Business Governance and Ethics 5, no. 1/2 (2010): 51. http://dx.doi.org/10.1504/ijbge.2010.029555.
Full textHinde, Steven. "Identity theft & fraud." Computer Fraud & Security 2005, no. 6 (2005): 18–20. http://dx.doi.org/10.1016/s1361-3723(05)70223-2.
Full textLee, Victor. "Biometrics and identity fraud." Biometric Technology Today 16, no. 2 (2008): 7–11. http://dx.doi.org/10.1016/s0969-4765(08)70059-6.
Full textSoomro, Zahoor Ahmed, Javed Ahmed, Mahmood Hussain Shah, and Khalil Khoumbati. "Investigating identity fraud management practices in e-tail sector: a systematic review." Journal of Enterprise Information Management 32, no. 2 (2019): 301–24. http://dx.doi.org/10.1108/jeim-06-2018-0110.
Full textKoops, Bert-Jaap, and Ronald Leenes. "Identity theft, identity fraud and/or identity-related crime." Datenschutz und Datensicherheit - DuD 30, no. 9 (2006): 553–56. http://dx.doi.org/10.1007/s11623-006-0141-2.
Full textGrijpink, Jan. "Biometrics and identity fraud protection." Computer Law & Security Review 21, no. 3 (2005): 249–56. http://dx.doi.org/10.1016/j.clsr.2005.04.009.
Full textFurnell, Steven. "Identity impairment: The problems facing victims of identity fraud." Computer Fraud & Security 2007, no. 12 (2007): 6–11. http://dx.doi.org/10.1016/s1361-3723(07)70168-9.
Full textArcher, Norm. "Consumer identity theft prevention and identity fraud detection behaviours." Journal of Financial Crime 19, no. 1 (2011): 20–36. http://dx.doi.org/10.1108/13590791211190704.
Full textKiberstis, Paula A. "Evading cancer drugs by identity fraud." Science 355, no. 6320 (2017): 35.16–37. http://dx.doi.org/10.1126/science.355.6320.35-p.
Full textde Vries, Bald. "Describing Identity Fraud: Towards a Common Definition." SCRIPT-ed 5, no. 3 (2008): 482–500. http://dx.doi.org/10.2966/scrip.050308.482.
Full textAmasiatu, Chioma Vivian, and Mahmood Hussain Shah. "First party fraud management: framework for the retail industry." International Journal of Retail & Distribution Management 46, no. 4 (2018): 350–63. http://dx.doi.org/10.1108/ijrdm-10-2016-0185.
Full textBhardwaj, Surbhi, and Sonika Gupta. "Effects of Feature Selection with Machine Learning Algorithms in Detection of Credit Card Fraud." International Journal of Engineering Research in Computer Science and Engineering 9, no. 7 (2022): 46–51. http://dx.doi.org/10.36647/ijercse/09.07.art011.
Full textRuth, Saskia M. van, and Daniel Granato. "Food Identity, Authenticity and Fraud: The Full Spectrum." Foods 6, no. 7 (2017): 49. http://dx.doi.org/10.3390/foods6070049.
Full textEvison, Martin. "DNA database could end problem of identity fraud." Nature 420, no. 6914 (2002): 359. http://dx.doi.org/10.1038/420359c.
Full textPorter, David. "Identity fraud: the stealth threat to UK plc." Computer Fraud & Security 2004, no. 7 (2004): 4–6. http://dx.doi.org/10.1016/s1361-3723(04)00086-7.
Full textHope, Joan. "Implement gesture biometrics to stop online identity fraud." Recruiting & Retaining Adult Learners 17, no. 3 (2014): 8. http://dx.doi.org/10.1002/nsr.30006.
Full textVivian Amasiatu, Chioma, and Mahmood Hussain Shah. "First party fraud: a review of the forms and motives of fraudulent consumer behaviours in e-tailing." International Journal of Retail & Distribution Management 42, no. 9 (2014): 805–17. http://dx.doi.org/10.1108/ijrdm-05-2013-0112.
Full textEkolama, Solomon M., Sunny Orike, and Promise Elechi. "Preventing Cyber-Fraud in Nigeria’s Banking System Using Fraudaeck-AI." European Journal of Electrical Engineering and Computer Science 6, no. 6 (2022): 55–63. http://dx.doi.org/10.24018/ejece.2022.6.6.480.
Full textSmith, Alan D., and Allen R. Lias. "Identity Theft and E-Fraud as Critical CRM Concerns." International Journal of Enterprise Information Systems 1, no. 2 (2005): 17–36. http://dx.doi.org/10.4018/jeis.2005040102.
Full textKendall-Raynor, Petra. "Identity fraud case prompts call for tougher recruitment checks." Nursing Standard 22, no. 36 (2008): 7. http://dx.doi.org/10.7748/ns.22.36.7.s8.
Full textBi, Naheed. "Consumer identity theft: Introduction and fraud sources and detection." South Asian Journal of Marketing & Management Research 11, no. 10 (2021): 156–61. http://dx.doi.org/10.5958/2249-877x.2021.00088.6.
Full textKhan, Gulista. "Investigating identity fraud management practices in E-tail sector." South Asian Journal of Marketing & Management Research 11, no. 10 (2021): 138–43. http://dx.doi.org/10.5958/2249-877x.2021.00086.2.
Full textPap, Andras L. "Ethno-racial identity (politics) by law: “Fraud” and “choice”." Nationalities Papers 45, no. 5 (2017): 968–87. http://dx.doi.org/10.1080/00905992.2017.1311846.
Full textGrijpink, Jan. "Identity fraud as a challenge to the constitutional state." Computer Law & Security Review 20, no. 1 (2004): 29–36. http://dx.doi.org/10.1016/s0267-3649(04)00006-8.
Full textDanquah, Paul, John Amoako Kani, and Dzifa Bibi. "Internet fraud: The influence of Identity Flexibility and Dissociative Anonymity." East African Journal of Information Technology 5, no. 1 (2022): 39–52. http://dx.doi.org/10.37284/eajit.5.1.673.
Full textMathew, Alexander, Gayatri Moindi, Ketan Bende, and Neha Singh. "Credit Card Fraud Prediction System." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 3 (2015): 30–35. http://dx.doi.org/10.53555/nncse.v2i3.481.
Full textSaunders, Kurt M., and Bruce Zucker. "Counteracting Identity Fraud in the Information Age: The Identity Theft and Assumption Deterrence Act." International Review of Law, Computers & Technology 13, no. 2 (1999): 183–92. http://dx.doi.org/10.1080/13600869955134.
Full textLyu, Qiuyun, Hao Li, Renjie Zhou, Jilin Zhang, Nailiang Zhao, and Yan Liu. "BCFDPS: A Blockchain-Based Click Fraud Detection and Prevention Scheme for Online Advertising." Security and Communication Networks 2022 (April 29, 2022): 1–20. http://dx.doi.org/10.1155/2022/3043489.
Full textBerghel, Hal. "Identity Theft and Financial Fraud: Some Strangeness in the Proportions." Computer 45, no. 1 (2012): 86–89. http://dx.doi.org/10.1109/mc.2012.16.
Full textFu, Anthony Y., Xiaotie Deng, and Liu Wenyin. "REGAP: A Tool for Unicode-Based Web Identity Fraud Detection." Journal of Digital Forensic Practice 1, no. 2 (2006): 83–97. http://dx.doi.org/10.1080/15567280600995501.
Full textKenneally, Erin. "Enabling the Enablers: An Identity Fraud Solution for Law Enforcement." Journal of Digital Forensic Practice 1, no. 3 (2006): 157–64. http://dx.doi.org/10.1080/15567280600995758.
Full textMiri‐Lavassani, Kayvan, Vinod Kumar, Bahar Movahedi, and Uma Kumar. "Developing an identity fraud measurement model: a factor analysis approach." Journal of Financial Crime 16, no. 4 (2009): 364–86. http://dx.doi.org/10.1108/13590790910993708.
Full textVerma, Pradeep, and Poornima Tyagi. "Analysis of Supervised Machine Learning Algorithms in the Context of Fraud Detection." ECS Transactions 107, no. 1 (2022): 7189–200. http://dx.doi.org/10.1149/10701.7189ecst.
Full textBush, Sarah Sunn, and Lauren Prather. "Who's There? Election Observer Identity and the Local Credibility of Elections." International Organization 72, no. 3 (2018): 659–92. http://dx.doi.org/10.1017/s0020818318000140.
Full textSharpe, Alex. "Queering Judgment." Journal of Criminal Law 81, no. 5 (2017): 417–35. http://dx.doi.org/10.1177/0022018317728828.
Full textRamkumar, M., R. Supriya, K. Chaithanya, J. Veena, and A. SnehaLatha. "“Credit Card Fraud” Detection Using Data Analytics A Comparative Analysis." 1 8, no. 1 (2022): 24–29. http://dx.doi.org/10.46632/jemm/8/1/4.
Full textChoi, Dahee, and Kyungho Lee. "An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation." Security and Communication Networks 2018 (September 25, 2018): 1–15. http://dx.doi.org/10.1155/2018/5483472.
Full textOmotubora, Adekemi. "Old Wine in New Bottles? Critical and Comparative Perspectives on Identity Crimes under the Nigerian Cybercrime Act 2015." African Journal of International and Comparative Law 27, no. 4 (2019): 609–28. http://dx.doi.org/10.3366/ajicl.2019.0293.
Full textVaithyasubramanian S., Saravanan D., and Kirubhashankar C. K. "Communal Fraud Detection Algorithm for Establishing Identity Thefts in Online Shopping." International Journal of e-Collaboration 17, no. 3 (2021): 75–84. http://dx.doi.org/10.4018/ijec.2021070105.
Full textS, Shalini. "Behavioral Based Credit Card Fraud Detection." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 3556–61. http://dx.doi.org/10.22214/ijraset.2021.37134.
Full textSavirimuthu, Joseph. "Identity Theft and Systems Theory: The Fraud Act 2006 in Perspective." SCRIPT-ed 4, no. 4 (2007): 436–61. http://dx.doi.org/10.2966/scrip.040407.436.
Full textZajac, Jeffrey D. "Medical identity fraud in the United States: could it happen here?" Medical Journal of Australia 192, no. 3 (2010): 119. http://dx.doi.org/10.5694/j.1326-5377.2010.tb03447.x.
Full textZhang, Zhaohui, Xinxin Zhou, Xiaobo Zhang, Lizhi Wang, and Pengwei Wang. "A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection." Security and Communication Networks 2018 (August 6, 2018): 1–9. http://dx.doi.org/10.1155/2018/5680264.
Full textSupriyadi, Heri, Dominicus Savio Priyarsono, Noer Azam Achsani, and Trias Andati. "Preventing Internal Fraud in Microlending Business Processes with Machine Learning Models: Confirmatory Factor Analysis (CFA) and Extreme Gradient Boosting (XGBoost)." Asia Proceedings of Social Sciences 8, no. 1 (2021): 34–37. http://dx.doi.org/10.31580/apss.v8i1.1943.
Full textLewis, Patrick J. "A story of identity: a cautionary tale." AlterNative: An International Journal of Indigenous Peoples 13, no. 2 (2017): 114–21. http://dx.doi.org/10.1177/1177180117695417.
Full textBulatov, K. B., P. V. Bezmaternykh, D. P. Nikolaev, and V. V. Arlazarov. "Towards a unified framework for identity documents analysis and recognition." Computer Optics 46, no. 3 (2022): 436–54. http://dx.doi.org/10.18287/2412-6179-co-1024.
Full textDzomira, Shewangu. "Plastic Money and Electronic Banking Services Espousal vis-a-viz Financial Identity Theft Fraud Risk Awareness in a Developing Country." Journal of Economics and Behavioral Studies 9, no. 5 (2017): 255–64. http://dx.doi.org/10.22610/jebs.v9i5.1928.
Full textChohan, Dr Rozina, Engr Murk Chohan, Irfan Mir Chohan, and Farhana Mir Chohan. "Overcoming Trusting Barriers in Inter-organizational Identity Theft Prevention in Knowledge Sharing: A Case of UK Retailing Industry." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 4946–74. http://dx.doi.org/10.47059/revistageintec.v11i4.2515.
Full text