Journal articles on the topic 'Identity theft'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identity theft.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Helser, Susan, and Mark I. Hwang. "Identity Theft." International Journal of Cyber Research and Education 3, no. 1 (January 2021): 65–77. http://dx.doi.org/10.4018/ijcre.2021010107.
Full textSeton, Margaret. "Identity Theft." Annals of Internal Medicine 152, no. 12 (June 15, 2010): 820. http://dx.doi.org/10.7326/0003-4819-152-12-201006150-00013.
Full textSadiku, Matthew N. O., Mahamadou Tembely, and Sarhan M. Musa. "Identity Theft." International Journal of Engineering Research 6, no. 9 (2017): 422. http://dx.doi.org/10.5958/2319-6890.2017.00052.6.
Full textBosworth, Martin. "Identity theft." Men in Nursing 2, no. 4 (August 2007): 10–13. http://dx.doi.org/10.1097/01.min.0000284797.69465.88.
Full textVikbladh, O. "Identity theft." Science 352, no. 6281 (March 31, 2016): 46. http://dx.doi.org/10.1126/science.aaf6089.
Full textGarber, Marjorie. "Identity theft." International Forum of Psychoanalysis 27, no. 2 (January 30, 2018): 76–81. http://dx.doi.org/10.1080/0803706x.2017.1387283.
Full textDwan, Berni. "Identity theft." Computer Fraud & Security 2004, no. 4 (April 2004): 14–17. http://dx.doi.org/10.1016/s1361-3723(04)00055-7.
Full textAnderson, Keith B., Erik Durbin, and Michael A. Salinger. "Identity Theft." Journal of Economic Perspectives 22, no. 2 (March 1, 2008): 171–92. http://dx.doi.org/10.1257/jep.22.2.171.
Full textDomino Rudolph, Jennifer. "Identity Theft." Aztlán: A Journal of Chicano Studies 34, no. 1 (2009): 65–91. http://dx.doi.org/10.1525/azt.2009.34.1.65.
Full textSullivan, Clare. "Is identity theft really theft?" International Review of Law, Computers & Technology 23, no. 1-2 (July 2009): 77–87. http://dx.doi.org/10.1080/13600860902742596.
Full textHinde, Stephen. "Identity theft: theft, loss and giveaways." Computer Fraud & Security 2005, no. 5 (May 2005): 18–20. http://dx.doi.org/10.1016/s1361-3723(05)70215-3.
Full textFromer, Margot J. "Medical Identity Theft." Oncology Times 29, no. 2 (January 2007): 8. http://dx.doi.org/10.1097/01.cot.0000265637.51520.93.
Full textCopes, Heith, and Lynne M. Vieraitis. "Understanding Identity Theft." Criminal Justice Review 34, no. 3 (January 26, 2009): 329–49. http://dx.doi.org/10.1177/0734016808330589.
Full textSOVERN, JEFF. "Stopping Identity Theft." Journal of Consumer Affairs 38, no. 2 (December 2004): 233–43. http://dx.doi.org/10.1111/j.1745-6606.2004.tb00866.x.
Full textSanchez, Cesar. "NLR identity theft." Nature Reviews Microbiology 9, no. 3 (February 16, 2011): 149. http://dx.doi.org/10.1038/nrmicro2530.
Full textMonahan, Torin. "Identity theft vulnerability." Theoretical Criminology 13, no. 2 (May 2009): 155–76. http://dx.doi.org/10.1177/1362480609102877.
Full textMaitlo, Abdullah, Nisreen Ameen, Hamid Reza Peikari, and Mahmood Shah. "Preventing identity theft." Information Technology & People 32, no. 5 (October 7, 2019): 1184–214. http://dx.doi.org/10.1108/itp-05-2018-0255.
Full textMercuri, Rebecca T. "Scoping identity theft." Communications of the ACM 49, no. 5 (May 2006): 17–21. http://dx.doi.org/10.1145/1125944.1125961.
Full textAmerican Optometric Association. "Medical identity theft." Optometry - Journal of the American Optometric Association 82, no. 5 (May 2011): 326–28. http://dx.doi.org/10.1016/j.optm.2011.03.009.
Full textMcCarty, B. "Automated identity theft." IEEE Security & Privacy 1, no. 5 (September 2003): 89–92. http://dx.doi.org/10.1109/msecp.2003.1236244.
Full textKirk, David. "Identifying Identity Theft." Journal of Criminal Law 78, no. 6 (December 2014): 448–50. http://dx.doi.org/10.1177/0022018314557418.
Full textNavarro, John C., and George E. Higgins. "Familial Identity Theft." American Journal of Criminal Justice 42, no. 1 (July 22, 2016): 218–30. http://dx.doi.org/10.1007/s12103-016-9357-3.
Full textSproule, Susan, and Norm Archer. "Measuring identity theft and identity fraud." International Journal of Business Governance and Ethics 5, no. 1/2 (2010): 51. http://dx.doi.org/10.1504/ijbge.2010.029555.
Full textShareef, Mahmud A., and Vinod Kumar. "Prevent/Control Identity Theft." Information Resources Management Journal 25, no. 3 (July 2012): 30–60. http://dx.doi.org/10.4018/irmj.2012070102.
Full textChoo, Kyung-Seok. "Book Review: Identity Theft." Criminal Justice Review 31, no. 4 (December 2006): 376–79. http://dx.doi.org/10.1177/0734016806295601.
Full textJougleux, Philippe. "Identity theft and internet." International Journal of Liability and Scientific Enquiry 5, no. 1 (2012): 37. http://dx.doi.org/10.1504/ijlse.2012.045529.
Full textHauhart, Robert C. "Perspectives on Identity Theft." Contemporary Sociology: A Journal of Reviews 38, no. 3 (May 2009): 235–36. http://dx.doi.org/10.1177/009430610903800313.
Full textKuzmin, Yury A. "IDENTITY THEFT (CRIMINOLOGICAL ASPECT)." Oeconomia et Jus, no. 3 (September 28, 2020): 48–57. http://dx.doi.org/10.47026/2499-9636-2020-3-48-57.
Full textRouse, Anne, and David Watson. "Cyberfraud and identity theft." Monash Business Review 1, no. 2 (December 2005): 30–33. http://dx.doi.org/10.2104/mbr05018.
Full textCopes, Heith, Lynne M. Vieraitis, Stephanie M. Cardwell, and Arthur Vasquez. "Accounting for Identity Theft." Journal of Contemporary Criminal Justice 29, no. 3 (July 23, 2013): 351–68. http://dx.doi.org/10.1177/1043986213496174.
Full textKahn, Charles M., and William Roberds. "Credit and identity theft." Journal of Monetary Economics 55, no. 2 (March 2008): 251–64. http://dx.doi.org/10.1016/j.jmoneco.2007.08.001.
Full textHinde, Stephen. "Identity theft: the fight." Computer Fraud & Security 2004, no. 9 (September 2004): 6–7. http://dx.doi.org/10.1016/s1361-3723(04)00110-1.
Full textHinde, Steven. "Identity theft & fraud." Computer Fraud & Security 2005, no. 6 (June 2005): 18–20. http://dx.doi.org/10.1016/s1361-3723(05)70223-2.
Full textCiechanowicz, Chez. "Identity Theft and Reconstruction." Information Security Technical Report 15, no. 2 (May 2010): 41. http://dx.doi.org/10.1016/j.istr.2010.12.001.
Full textMerrell, Ronald C., and Charles R. Doarn. "Identity Theft, a Reprise." Telemedicine and e-Health 23, no. 8 (August 2017): 619–20. http://dx.doi.org/10.1089/tmj.2017.29010.crd.
Full textMcKee, G. "Biometric identity theft [Letters]." Computer 33, no. 5 (May 2000): 5–10. http://dx.doi.org/10.1109/mc.2000.841773.
Full textAgrawal, Shantanu, and Peter Budetti. "Physician Medical Identity Theft." JAMA 307, no. 5 (February 1, 2012): 459. http://dx.doi.org/10.1001/jama.2012.78.
Full textGupta, Chander Mohan, and Devesh Kumar. "Identity theft: a small step towards big financial crimes." Journal of Financial Crime 27, no. 3 (May 1, 2020): 897–910. http://dx.doi.org/10.1108/jfc-01-2020-0014.
Full textKoops, Bert-Jaap, and Ronald Leenes. "Identity theft, identity fraud and/or identity-related crime." Datenschutz und Datensicherheit - DuD 30, no. 9 (September 2006): 553–56. http://dx.doi.org/10.1007/s11623-006-0141-2.
Full textYlang, Norah. "Capable guardianship against identity theft." Journal of Financial Crime 27, no. 1 (January 2, 2020): 130–42. http://dx.doi.org/10.1108/jfc-12-2018-0140.
Full textClarke, Tim. "A Civil War Identity Theft?" Military Medicine 181, no. 9 (September 2016): 1161–62. http://dx.doi.org/10.7205/milmed-d-16-00206.
Full textMoir, Iain, and George R. S. Weir. "Contact centres and identity theft." International Journal of Electronic Security and Digital Forensics 2, no. 1 (2009): 92. http://dx.doi.org/10.1504/ijesdf.2009.023879.
Full textRomanow, Kate. "Private Practice and Identity Theft." ASHA Leader 14, no. 9 (July 2009): 3. http://dx.doi.org/10.1044/leader.ipp.14092009.3.
Full textRoberds, William, and Stacey L. Schreft. "Data breaches and identity theft." Journal of Monetary Economics 56, no. 7 (October 2009): 918–29. http://dx.doi.org/10.1016/j.jmoneco.2009.09.003.
Full textMarcum, Catherine D., George E. Higgins, and Alexandria Mackinnon. "Identity theft reports of adolescents." Journal of Financial Crime 23, no. 4 (October 3, 2016): 965–73. http://dx.doi.org/10.1108/jfc-07-2015-0038.
Full textMahmud, Rifqi. "PENCURIAN IDENTITAS KATEGORI & KASUS." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 38–42. http://dx.doi.org/10.14421/csecurity.2019.2.1.1421.
Full textBhardwaj, Axat. "Blockchain based Digital Storage System." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 20, 2021): 1893–95. http://dx.doi.org/10.22214/ijraset.2021.36781.
Full textBisogni, Fabio, and Hadi Asghari. "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws." Journal of Information Policy 10, no. 1 (May 1, 2020): 45–82. http://dx.doi.org/10.5325/jinfopoli.10.1.0045.
Full textRahman, Kazi Rubaiyat Shahriar, Omar Faruq, Md Toufiqur Rahman, Md Rafiujjaman Sumon, Md Atikur Rahman, Abu Sazzad Mohammad Parvez, Narayan Chandra Nath, and Tareq Ahmed Sohel. "Adoption of identity theft protection services in social media: A PMT investigation." Sustainable Engineering and Innovation 6, no. 1 (May 15, 2024): 87–102. http://dx.doi.org/10.37868/sei.v6i1.id248.
Full textDeLiema, Marguerite, Lynn Langton, and David Burnes. "Identity Theft Among Older Adults: Risk and Protective Factors." Innovation in Aging 4, Supplement_1 (December 1, 2020): 31. http://dx.doi.org/10.1093/geroni/igaa057.100.
Full text