Academic literature on the topic 'Identity theft'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity theft.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Identity theft"
Helser, Susan, and Mark I. Hwang. "Identity Theft." International Journal of Cyber Research and Education 3, no. 1 (January 2021): 65–77. http://dx.doi.org/10.4018/ijcre.2021010107.
Full textSeton, Margaret. "Identity Theft." Annals of Internal Medicine 152, no. 12 (June 15, 2010): 820. http://dx.doi.org/10.7326/0003-4819-152-12-201006150-00013.
Full textSadiku, Matthew N. O., Mahamadou Tembely, and Sarhan M. Musa. "Identity Theft." International Journal of Engineering Research 6, no. 9 (2017): 422. http://dx.doi.org/10.5958/2319-6890.2017.00052.6.
Full textBosworth, Martin. "Identity theft." Men in Nursing 2, no. 4 (August 2007): 10–13. http://dx.doi.org/10.1097/01.min.0000284797.69465.88.
Full textVikbladh, O. "Identity theft." Science 352, no. 6281 (March 31, 2016): 46. http://dx.doi.org/10.1126/science.aaf6089.
Full textGarber, Marjorie. "Identity theft." International Forum of Psychoanalysis 27, no. 2 (January 30, 2018): 76–81. http://dx.doi.org/10.1080/0803706x.2017.1387283.
Full textDwan, Berni. "Identity theft." Computer Fraud & Security 2004, no. 4 (April 2004): 14–17. http://dx.doi.org/10.1016/s1361-3723(04)00055-7.
Full textAnderson, Keith B., Erik Durbin, and Michael A. Salinger. "Identity Theft." Journal of Economic Perspectives 22, no. 2 (March 1, 2008): 171–92. http://dx.doi.org/10.1257/jep.22.2.171.
Full textDomino Rudolph, Jennifer. "Identity Theft." Aztlán: A Journal of Chicano Studies 34, no. 1 (2009): 65–91. http://dx.doi.org/10.1525/azt.2009.34.1.65.
Full textSullivan, Clare. "Is identity theft really theft?" International Review of Law, Computers & Technology 23, no. 1-2 (July 2009): 77–87. http://dx.doi.org/10.1080/13600860902742596.
Full textDissertations / Theses on the topic "Identity theft"
Ruppar, Carrie Aliene. "Identity theft prevention in CyberCIEGE." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FRuppar.pdf.
Full textHunter, Harry A. "Computer crime and identity theft." [Denver, Colo.] : Regis University, 2010. http://adr.coalliance.org/codr/fez/view/codr:144.
Full textFrank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.
Full textTitle from opening screen, December 28, 1999.
Allison, Stuart F. H. "A Case Study of Identity Theft." [Tampa, Fla. : s.n.], 2003. http://purl.fcla.edu/fcla/etd/SFE0000093.
Full textWhitmer, Evelyn, and Linda Block. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/146292.
Full textThe publication covers protecting yourself from identity theft. It covers how identity theft happens and ways to protect yourself from identity theft. It also gives you some steps to take if you are a victim of identity theft as well as identity theft contact information.
Whitmer, Evelyn. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2012. http://hdl.handle.net/10150/239593.
Full textMinniti, Robert K. "Identifying Business Risk Factors of Identity Theft." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2935.
Full textKlockars, Karl. "Governing the e-subject through identity theft discourses." Thesis, University of Ottawa (Canada), 2011. http://hdl.handle.net/10393/28909.
Full textAngelopoulou, Olga. "Analysis of digital evidence in identity theft investigations." Thesis, University of South Wales, 2010. https://pure.southwales.ac.uk/en/studentthesis/analysis-of-digital-evidence-in-identity-theft-investigations(87649de4-e445-49c3-bcba-8297ee5ef684).html.
Full textCelikbag, Yusuf El Mogahzy Yehia. "Developing methods for detecting cotton fiber identity theft." Auburn, Ala., 2009. http://hdl.handle.net/10415/1768.
Full textBooks on the topic "Identity theft"
Institute, Pennsylvania Bar. Identity theft. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2006.
Find full textInstitute, Pennsylvania Bar, ed. Identity theft. [Mechanicsburg, Pa.]: Pennsylvania Bar Institute, 2008.
Find full textInstitute, Pennsylvania Bar. Identity theft. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2005.
Find full textInstitute, Pennsylvania Bar, ed. Identity theft. Mechanisburg, PA (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2004.
Find full textInstitute, Pennsylvania Bar. Identity theft. Mechanicsburg, PA: Pennsylvania Bar Institute, 2007.
Find full textBook chapters on the topic "Identity theft"
Camp, L. Jean, and M. Eric Johnson. "Identity Theft." In The Economics of Financial and Medical Identity Theft, 17–30. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-1918-1_3.
Full textPontell, Henry N., and Gilbert Geis. "Identity Theft." In The Handbook of Security, 302–20. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1007/978-1-349-67284-4_14.
Full textSalomon, David. "Identity Theft." In Elements of Computer Security, 255–71. London: Springer London, 2010. http://dx.doi.org/10.1007/978-0-85729-006-9_10.
Full textVieraitis, Lynne, Heith Copes, and Ivan Birch. "Identity Theft." In Encyclopedia of Criminology and Criminal Justice, 2419–29. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-5690-2_320.
Full textWalters, Robert. "Theft [Identity]." In Cybersecurity and Data Laws of the Commonwealth, 297–306. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3935-0_20.
Full textFennelly, Lawrence J., and Marianna A. Perry. "Identity Theft." In Security Officers and Supervisors, 294–96. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.4324/9781003402718-123.
Full textChapman, Robert James. "Identity theft fraud." In The SME Business Guide to Fraud Risk Management, 139–56. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003200383-11.
Full textCamp, L. Jean, and M. Eric Johnson. "Identity Theft in Healthcare." In The Economics of Financial and Medical Identity Theft, 61–67. Boston, MA: Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-1918-1_7.
Full textPavlicek, Bruno. "Operation: Overnight Identity Theft." In Computer Fraud Casebook, 219–29. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119197416.ch23.
Full textvan Schijndel, Peter. "Identity Theft and Fraud." In Information Technology and Law Series, 401–16. The Hague, The Netherlands: T. M. C. Asser Press, 2011. http://dx.doi.org/10.1007/978-90-6704-731-9_22.
Full textConference papers on the topic "Identity theft"
Sproule, Susan, and Norm Archer. "Defining Identity Theft." In 2007 World Congress of the Management of e-Business. IEEE, 2007. http://dx.doi.org/10.1109/wcmeb.2007.5.
Full textLacey, David, Jim Zaiss, and K. Suzanne Barber. "Understanding victim-enabled identity theft." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906926.
Full textNewman, Robert C. "Cybercrime, identity theft, and fraud." In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231064.
Full textHerrigel, Alexander, and Jian Zhao. "RFID identity theft and countermeasures." In Electronic Imaging 2006, edited by Rudolf L. van Renesse. SPIE, 2006. http://dx.doi.org/10.1117/12.643310.
Full textMoskovitch, Robert, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafic, Ahmet Camtepe, Bernhard Lohlein, et al. "Identity theft, computers and behavioral biometrics." In 2009 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2009. http://dx.doi.org/10.1109/isi.2009.5137288.
Full textLoibl, Timothy R. "Identity theft, spyware and the law." In the 2nd annual conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1107622.1107650.
Full textLuong, Kim. "The other side of identity theft." In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231081.
Full textTurville, Kylie, John Yearwood, and Charlynn Miller. "Understanding Victims of Identity Theft: Preliminary Insights." In 2010 Second Cybercrime and Trustworthy Computing Workshop (CTC). IEEE, 2010. http://dx.doi.org/10.1109/ctc.2010.12.
Full textAimeur, E., and D. Schonfeld. "The ultimate invasion of privacy: Identity theft." In 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971959.
Full textTrabelsi, Anis, Marc Pic, and Jean-Luc Dugelay. "Recapture Detection to Fight Deep Identity Theft." In VSIP 2022: 2022 4th International Conference on Video, Signal and Image Processing. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3577164.3577170.
Full textReports on the topic "Identity theft"
Anderson, G. Oscar. Identity Theft: Who's At Risk? AARP Research, September 2014. http://dx.doi.org/10.26419/res.00087.001.
Full textAnderson, G. Oscar. Identity Theft: Who's At Risk?: Annotated Questionnaire. AARP Research, September 2014. http://dx.doi.org/10.26419/res.00087.002.
Full textBean, Todd A. Identity Theft and Protecting Service Member's Social Security Numbers. Fort Belvoir, VA: Defense Technical Information Center, April 2009. http://dx.doi.org/10.21236/ada538876.
Full textEtu, Egbe-Etu, Asha Weinstein Agrawal, Imokhai Tenebe, Jordan Larot, and Dang Minh Nhu Nguyen. Misconduct on Public Transit: An Exploratory Analysis Using the Comments Formerly Known as Tweets. Mineta Transportation Institute, November 2023. http://dx.doi.org/10.31979/mti.2023.2317.
Full textMurray, Chris, Keith Williams, Norrie Millar, Monty Nero, Amy O'Brien, and Damon Herd. A New Palingenesis. University of Dundee, November 2022. http://dx.doi.org/10.20933/100001273.
Full textEastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, July 2022. http://dx.doi.org/10.4271/epr2022016.
Full text