Academic literature on the topic 'Identity theft'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity theft.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Identity theft"

1

Helser, Susan, and Mark I. Hwang. "Identity Theft." International Journal of Cyber Research and Education 3, no. 1 (January 2021): 65–77. http://dx.doi.org/10.4018/ijcre.2021010107.

Full text
Abstract:
Identity theft is a serious crime growing rapidly due to the ever-tighter integration of technology into people's lives. The psychological and financial loss to individual victims is devastating, and its costs to society at large staggering. In order to better understand the problem and to combat the crime more effectively, a comprehensive review of issues related to identity theft is performed in this paper. The human element of the crime is examined, along with the exploits used by perpetrators and countermeasures that have been developed. The findings highlight areas in need of continued research and guidelines that should benefit individuals and organizations in their pursuit of potential solutions.
APA, Harvard, Vancouver, ISO, and other styles
2

Seton, Margaret. "Identity Theft." Annals of Internal Medicine 152, no. 12 (June 15, 2010): 820. http://dx.doi.org/10.7326/0003-4819-152-12-201006150-00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sadiku, Matthew N. O., Mahamadou Tembely, and Sarhan M. Musa. "Identity Theft." International Journal of Engineering Research 6, no. 9 (2017): 422. http://dx.doi.org/10.5958/2319-6890.2017.00052.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bosworth, Martin. "Identity theft." Men in Nursing 2, no. 4 (August 2007): 10–13. http://dx.doi.org/10.1097/01.min.0000284797.69465.88.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vikbladh, O. "Identity theft." Science 352, no. 6281 (March 31, 2016): 46. http://dx.doi.org/10.1126/science.aaf6089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Garber, Marjorie. "Identity theft." International Forum of Psychoanalysis 27, no. 2 (January 30, 2018): 76–81. http://dx.doi.org/10.1080/0803706x.2017.1387283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dwan, Berni. "Identity theft." Computer Fraud & Security 2004, no. 4 (April 2004): 14–17. http://dx.doi.org/10.1016/s1361-3723(04)00055-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anderson, Keith B., Erik Durbin, and Michael A. Salinger. "Identity Theft." Journal of Economic Perspectives 22, no. 2 (March 1, 2008): 171–92. http://dx.doi.org/10.1257/jep.22.2.171.

Full text
Abstract:
Identity theft is made possible by the nature of modern payment systems. In the modern economy, sellers are willing to offer goods and services to strangers in exchange for a promise to pay, provided the promise is backed up by data that link the buyer to a specific account or credit history. Identity theft involves acquiring enough data about another person to counterfeit this link, enabling the thief to acquire goods while attributing the charge to another person's account. In this article, we discuss what is (and is not) known about the prevalence and cost of identity theft, describe the institutional framework in which identity theft takes place, and consider some of the main policy issues associated with the problem.
APA, Harvard, Vancouver, ISO, and other styles
9

Domino Rudolph, Jennifer. "Identity Theft." Aztlán: A Journal of Chicano Studies 34, no. 1 (2009): 65–91. http://dx.doi.org/10.1525/azt.2009.34.1.65.

Full text
Abstract:
Released by Mattel in 2005, American Girl doll Marisol Luna quickly provoked controversy. The doll’s accompanying narrative depicts her Chicago neighborhood of Pilsen as “dangerous” and recounts her family’s move to the suburbs. Pilsen, located just south and west of downtown Chicago, has a long history as a Mexican (im)migrant port of entry. Many Latinos, particularly in Pilsen, perceive the doll and her narrative as a misrepresentation of their community that obscures the economic reality of gentrification and the displacement of poor residents of color. The resulting protest against the doll both exemplifies the contested nature of ownership of space and serves as a lens through which to examine the potential benefits and limitations of latinidad, or unity among Latinos, in Chicago and elsewhere. Marisol Luna functions as a cultural text on which Latinos, as individuals and as a group, can articulate contestatory ethnic identities and negotiate their place and relationship with each other and with the city at large.
APA, Harvard, Vancouver, ISO, and other styles
10

Sullivan, Clare. "Is identity theft really theft?" International Review of Law, Computers & Technology 23, no. 1-2 (July 2009): 77–87. http://dx.doi.org/10.1080/13600860902742596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Identity theft"

1

Ruppar, Carrie Aliene. "Identity theft prevention in CyberCIEGE." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FRuppar.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunter, Harry A. "Computer crime and identity theft." [Denver, Colo.] : Regis University, 2010. http://adr.coalliance.org/codr/fez/view/codr:144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.

Full text
Abstract:
ID-theft survival kit -- Book From victim to victor -- ID theft FAQ -- Audiocassettes -- Identity theft resources -- Testimonials -- ID theft action letters -- About the author -- Media appearances -- Identity theft laws -- Theft Deterrence Act.
Title from opening screen, December 28, 1999.
APA, Harvard, Vancouver, ISO, and other styles
4

Allison, Stuart F. H. "A Case Study of Identity Theft." [Tampa, Fla. : s.n.], 2003. http://purl.fcla.edu/fcla/etd/SFE0000093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Whitmer, Evelyn, and Linda Block. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/146292.

Full text
Abstract:
3 pp.
The publication covers protecting yourself from identity theft. It covers how identity theft happens and ways to protect yourself from identity theft. It also gives you some steps to take if you are a victim of identity theft as well as identity theft contact information.
APA, Harvard, Vancouver, ISO, and other styles
6

Whitmer, Evelyn. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2012. http://hdl.handle.net/10150/239593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Minniti, Robert K. "Identifying Business Risk Factors of Identity Theft." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2935.

Full text
Abstract:
Businesses are under pressure to identify and control risks affecting profitability, including the risk of fraud. Identity theft, a type of fraud, costs businesses, governments, and individuals in excess of $56 billion a year. In order to develop good internal controls to help prevent and detect fraud, it is necessary to identify the risks to the business, but business owners are not always aware of what risk factors relate to identity theft. A nonexperimental research design formed the basis of this research study. The population for this study was data from all 50 U.S. states, represented via government databases maintained by the Federal Trade Commission, the U.S. Census Bureau, and the Department of Labor from all 50 U.S. states from 2008 until 2014. The fraud triangle theory formed the theoretical framework for this study. Regression analysis determined the significance of relationships between state-specific instances of international immigration, state-specific unemployment rates, and state-specific instances of identity theft. Both state-specific instances of international immigration and state-specific unemployment rates demonstrated a significant and positive relationship with instances of identity theft. The implications for positive social change include improved understanding of risk factors for identity theft, which could lead to lower costs of operation for businesses and lower prices for consumers.
APA, Harvard, Vancouver, ISO, and other styles
8

Klockars, Karl. "Governing the e-subject through identity theft discourses." Thesis, University of Ottawa (Canada), 2011. http://hdl.handle.net/10393/28909.

Full text
Abstract:
This study explores the social construction of identity theft, including its meanings, risk factors, specific causes and accompanying solutions, articulated in policy documents published by the Consumer Measures Committee (a sub-committee of Industry Canada) and the Royal Bank of Canada. A qualitative analysis of the documents indicates that identity theft is predominately constructed within the documents as an individualized consumer concern. This is in keeping with the shift to neoliberalism identified by Monahan (2009) and Caeton (2007). Within this, individuals are constructed as buying into the electronic marketplace, aligning their own motivations with larger political and economic objectives, while trusting in the advice of experts to overcome manageable risks.
APA, Harvard, Vancouver, ISO, and other styles
9

Angelopoulou, Olga. "Analysis of digital evidence in identity theft investigations." Thesis, University of South Wales, 2010. https://pure.southwales.ac.uk/en/studentthesis/analysis-of-digital-evidence-in-identity-theft-investigations(87649de4-e445-49c3-bcba-8297ee5ef684).html.

Full text
Abstract:
Identity Theft could be currently considered as a significant problem in the modern internet driven era. This type of computer crime can be achieved in a number of different ways; various statistical figures suggest it is on the increase. It intimidates individual privacy and self assurance, while efforts for increased security and protection measures appear inadequate to prevent it. A forensic analysis of the digital evidence should be able to provide precise findings after the investigation of Identity Theft incidents. At present, the investigation of Internet based Identity Theft is performed on an ad hoc and unstructured basis, in relation to the digital evidence. This research work aims to construct a formalised and structured approach to digital Identity Theft investigations that would improve the current computer forensic investigative practice. The research hypothesis is to create an analytical framework to facilitate the investigation of Internet Identity Theft cases and the processing of the related digital evidence. This research work makes two key contributions to the subject: a) proposing the approach of examining different computer crimes using a process specifically based on their nature and b) to differentiate the examination procedure between the victim’s and the fraudster’s side, depending on the ownership of the digital media. The background research on the existing investigation methods supports the need of moving towards an individual framework that supports Identity Theft investigations. The presented investigation framework is designed based on the structure of the existing computer forensic frameworks. It is a flexible, conceptual tool that will assist the investigator’s work and analyse incidents related to this type of crime. The research outcome has been presented in detail, with supporting relevant material for the investigator. The intention is to offer a coherent tool that could be used by computer forensics investigators. Therefore, the research outcome will not only be evaluated from a laboratory experiment, but also strengthened and improved based on an evaluation feedback by experts from law enforcement. While personal identities are increasingly being stored and shared on digital media, the threat of personal and private information that is used fraudulently cannot be eliminated. However, when such incidents are precisely examined, then the nature of the problem can be more clearly understood.
APA, Harvard, Vancouver, ISO, and other styles
10

Celikbag, Yusuf El Mogahzy Yehia. "Developing methods for detecting cotton fiber identity theft." Auburn, Ala., 2009. http://hdl.handle.net/10415/1768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Identity theft"

1

Keene, Carolyn. Identity theft. New York, NY: Aladdin Paperbacks, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bugeja, Michael J. Identity theft. New York, NY: Aladdin Paperbacks, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Institute, Pennsylvania Bar. Identity theft. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stewart, Gail B. Identity theft. Detroit: Lucent Books, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Institute, Pennsylvania Bar, ed. Identity theft. [Mechanicsburg, Pa.]: Pennsylvania Bar Institute, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Institute, Pennsylvania Bar. Identity theft. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kiesbye, Stefan. Identity theft. Detroit: Greenhaven Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Institute, Pennsylvania Bar, ed. Identity theft. Mechanisburg, PA (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Institute, Pennsylvania Bar. Identity theft. Mechanicsburg, PA: Pennsylvania Bar Institute, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bugeja, Michael J. Identity theft. New York, NY: Aladdin Paperbacks, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Identity theft"

1

Camp, L. Jean, and M. Eric Johnson. "Identity Theft." In The Economics of Financial and Medical Identity Theft, 17–30. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-1918-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pontell, Henry N., and Gilbert Geis. "Identity Theft." In The Handbook of Security, 302–20. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1007/978-1-349-67284-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Salomon, David. "Identity Theft." In Elements of Computer Security, 255–71. London: Springer London, 2010. http://dx.doi.org/10.1007/978-0-85729-006-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vieraitis, Lynne, Heith Copes, and Ivan Birch. "Identity Theft." In Encyclopedia of Criminology and Criminal Justice, 2419–29. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-5690-2_320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walters, Robert. "Theft [Identity]." In Cybersecurity and Data Laws of the Commonwealth, 297–306. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3935-0_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fennelly, Lawrence J., and Marianna A. Perry. "Identity Theft." In Security Officers and Supervisors, 294–96. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.4324/9781003402718-123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chapman, Robert James. "Identity theft fraud." In The SME Business Guide to Fraud Risk Management, 139–56. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003200383-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Camp, L. Jean, and M. Eric Johnson. "Identity Theft in Healthcare." In The Economics of Financial and Medical Identity Theft, 61–67. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-1918-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pavlicek, Bruno. "Operation: Overnight Identity Theft." In Computer Fraud Casebook, 219–29. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119197416.ch23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

van Schijndel, Peter. "Identity Theft and Fraud." In Information Technology and Law Series, 401–16. The Hague, The Netherlands: T. M. C. Asser Press, 2011. http://dx.doi.org/10.1007/978-90-6704-731-9_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Identity theft"

1

Sproule, Susan, and Norm Archer. "Defining Identity Theft." In 2007 World Congress of the Management of e-Business. IEEE, 2007. http://dx.doi.org/10.1109/wcmeb.2007.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lacey, David, Jim Zaiss, and K. Suzanne Barber. "Understanding victim-enabled identity theft." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Newman, Robert C. "Cybercrime, identity theft, and fraud." In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Herrigel, Alexander, and Jian Zhao. "RFID identity theft and countermeasures." In Electronic Imaging 2006, edited by Rudolf L. van Renesse. SPIE, 2006. http://dx.doi.org/10.1117/12.643310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moskovitch, Robert, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Ahmet Camtepe, Bernhard Lohlein, et al. "Identity theft, computers and behavioral biometrics." In 2009 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2009. http://dx.doi.org/10.1109/isi.2009.5137288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Loibl, Timothy R. "Identity theft, spyware and the law." In the 2nd annual conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1107622.1107650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Luong, Kim. "The other side of identity theft." In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Turville, Kylie, John Yearwood, and Charlynn Miller. "Understanding Victims of Identity Theft: Preliminary Insights." In 2010 Second Cybercrime and Trustworthy Computing Workshop (CTC). IEEE, 2010. http://dx.doi.org/10.1109/ctc.2010.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aimeur, E., and D. Schonfeld. "The ultimate invasion of privacy: Identity theft." In 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Trabelsi, Anis, Marc Pic, and Jean-Luc Dugelay. "Recapture Detection to Fight Deep Identity Theft." In VSIP 2022: 2022 4th International Conference on Video, Signal and Image Processing. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3577164.3577170.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Identity theft"

1

Anderson, G. Oscar. Identity Theft: Who's At Risk? AARP Research, September 2014. http://dx.doi.org/10.26419/res.00087.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Anderson, G. Oscar. Identity Theft: Who's At Risk?: Annotated Questionnaire. AARP Research, September 2014. http://dx.doi.org/10.26419/res.00087.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bean, Todd A. Identity Theft and Protecting Service Member's Social Security Numbers. Fort Belvoir, VA: Defense Technical Information Center, April 2009. http://dx.doi.org/10.21236/ada538876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Etu, Egbe-Etu, Asha Weinstein Agrawal, Imokhai Tenebe, Jordan Larot, and Dang Minh Nhu Nguyen. Misconduct on Public Transit: An Exploratory Analysis Using the Comments Formerly Known as Tweets. Mineta Transportation Institute, November 2023. http://dx.doi.org/10.31979/mti.2023.2317.

Full text
Abstract:
This project developed a simple methodology for using Twitter data to explore public perceptions about misconduct on public transit in California. The methodology allows future researchers to analyze tweets to answer questions such as: How frequent are tweets related to assault, abuse, or other misconduct on public transit? What concerns arise most frequently? What are the types of behaviors discussed? We collected and analyzed data from Twitter posts in California about various types of public transit misconduct from January 2020 to March 2023 to identify the nature and frequency of reported misconduct. Our findings reveal that harassment, uncivil behavior, and assault are the commonly reported concerns; far fewer tweets mention obscene behavior, threats, or theft. It appears that at times the victims had been targeted on the basis of their race, gender, or sexual identity, or because they were transit employees. The tweets indicate that both genders are victimized, though women were targeted more often than men (57.5% vs. 42.5%). As for the alleged perpetrators of transit misconduct, more than three-quarters were male (78%). Transit agencies and researchers can use the results of these analyses to strategically improve safety measures for the benefit of passengers and transit operators.
APA, Harvard, Vancouver, ISO, and other styles
5

Murray, Chris, Keith Williams, Norrie Millar, Monty Nero, Amy O'Brien, and Damon Herd. A New Palingenesis. University of Dundee, November 2022. http://dx.doi.org/10.20933/100001273.

Full text
Abstract:
Robert Duncan Milne (1844-99), from Cupar, Fife, was a pioneering author of science fiction stories, most of which appeared in San Francisco’s Argonaut magazine in the 1880s and ’90s. SF historian Sam Moskowitz credits Milne with being the first full-time SF writer, and his contribution to the genre is arguably greater than anyone else including Stevenson and Conan Doyle, yet it has all but disappeared into oblivion. Milne was fascinated by science. He drew on the work of Scottish physicists and inventors such as James Clark Maxwell and Alexander Graham Bell into the possibilities of electromagnetic forces and new communications media to overcome distances in space and time. Milne wrote about visual time-travelling long before H.G. Wells. He foresaw virtual ‘tele-presencing’, remote surveillance, mobile phones and worldwide satellite communications – not to mention climate change, scientific terrorism and drone warfare, cryogenics and molecular reengineering. Milne also wrote on alien life forms, artificial immortality, identity theft and personality exchange, lost worlds and the rediscovery of extinct species. ‘A New Palingenesis’, originally published in The Argonaut on July 7th 1883, and adapted in this comic, is a secular version of the resurrection myth. Mary Shelley was the first scientiser of the occult to rework the supernatural idea of reanimating the dead through the mysterious powers of electricity in Frankenstein (1818). In Milne’s story, in which Doctor S- dissolves his terminally ill wife’s body in order to bring her back to life in restored health, is a striking, further modernisation of Frankenstein, to reflect late-nineteenth century interest in electromagnetic science and spiritualism. In particular, it is a retelling of Shelley’s narrative strand about Frankenstein’s aborted attempt to shape a female mate for his creature, but also his misogynistic ambition to bypass the sexual principle in reproducing life altogether. By doing so, Milne interfused Shelley’s updating of the Promethean myth with others. ‘A New Palingenesis’ is also a version of Pygmalion and his male-ordered, wish-fulfilling desire to animate his idealised female sculpture, Galatea from Ovid’s Metamorphoses, perhaps giving a positive twist to Orpheus’s attempt to bring his corpse-bride Eurydice back from the underworld as well? With its basis in spiritualist ideas about the soul as a kind of electrical intelligence, detachable from the body but a material entity nonetheless, Doctor S- treats his wife as an ‘intelligent battery’. He is thus able to preserve her personality after death and renew her body simultaneously because that captured electrical intelligence also carries a DNA-like code for rebuilding the individual organism itself from its chemical constituents. The descriptions of the experiment and the body’s gradual re-materialisation are among Milne’s most visually impressive, anticipating the X-raylike anatomisation and reversal of Griffin’s disappearance process in Wells’s The Invisible Man (1897). In the context of the 1880s, it must have been a compelling scientisation of the paranormal, combining highly technical descriptions of the Doctor’s system of electrically linked glass coffins with ghostly imagery. It is both dramatic and highly visual, even cinematic in its descriptions, and is here brought to life in the form of a comic.
APA, Harvard, Vancouver, ISO, and other styles
6

Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, July 2022. http://dx.doi.org/10.4271/epr2022016.

Full text
Abstract:
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality. Legal Issues Facing Automated Vehicles, Facial Recognition, and Individual Rights seeks to highlight the benefits of using FRS in public and private transportation technology and addresses some of the legitimate concerns regarding its use by private corporations and government entities, including law enforcement, in public transportation hubs and traffic stops. Constitutional questions, including First, Forth, and Ninth Amendment issues, also remain unanswered. FRS is now a permanent part of transportation technology and society; with meaningful legislation and conscious engineering, it can make future transportation safer and more convenient.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography