Found: 653
Select item for more details and to access through your institution.
IoTBlockFin: A Solution to Prevent Loan Scams in India with Integrating IoT and Blockchain for Enhanced Security and Transparency in Loan Processing.
- Published in:
- Journal of Intelligent Systems & Internet of Things, 2025, v. 14, n. 1, p. 209, doi. 10.54216/JISIoT.140116
- By:
- Publication type:
- Article
Women charged for hospital thefts.
- Published in:
- Lamp, 2008, v. 65, n. 8, p. 13
- Publication type:
- Article
"Screaming into the Void": Canadians' Experiences Reporting Identity Theft.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2024, v. 66, n. 1, p. 87, doi. 10.3138/cjccj-2023-0063
- By:
- Publication type:
- Article
Breach: A Trans*textual Essay.
- Published in:
- Qualitative Inquiry, 2023, v. 29, n. 10, p. 1095, doi. 10.1177/10778004221150006
- By:
- Publication type:
- Article
SAFER SENIOR CITIZENS ONLINE.
- Published in:
- Forum Pedagogiczne / Pedagogical Forum, 2024, v. 14, n. 2, p. 215, doi. 10.21697/fp.2024.2.2.17
- By:
- Publication type:
- Article
INJURY-IN-FACT: SOLVING THE FEDERAL CIRCUIT COURT SPLIT REGARDING CONSTITUTIONAL STANDING IN DATA THEFT LITIGATION.
- Published in:
- Golden Gate University Law Review, 2022, v. 52, n. 2, p. 163
- By:
- Publication type:
- Article
Your Personal Information Was Stolen? That's an Injury: Article III Standing in the Context of Data Breaches.
- Published in:
- University of the Pacific Law Review, 2019, v. 50, n. 3, p. 427
- By:
- Publication type:
- Article
Exploitable Traits as Vulnerabilities The Human Element in Security.
- Published in:
- ISACA Journal, 2021, n. 5, p. 16
- By:
- Publication type:
- Article
My relatives are waiting: Barriers to tribal enrollment of fostered/adopted American Indians.
- Published in:
- Journal of Marriage & Family, 2021, v. 83, n. 5, p. 1373, doi. 10.1111/jomf.12797
- By:
- Publication type:
- Article
The Real Facts Supporting Jeanne Calment as the Oldest Ever Human.
- Published in:
- 2019
- By:
- Publication type:
- journal article
Impact of Digital Contexts in the Training of University Education Students.
- Published in:
- Education Sciences, 2023, v. 13, n. 9, p. 923, doi. 10.3390/educsci13090923
- By:
- Publication type:
- Article
PHISHING AND PHARMING AS FORMS OF IDENTITY THEFT AND IDENTITY ABUSE.
- Published in:
- Balkan Social Science Review, 2019, v. 13, n. 13, p. 43
- By:
- Publication type:
- Article
Stealing Press Credentials: Law Enforcement Identity Misappropriation of the Press in the Cyber Era.
- Published in:
- National Security & Armed Conflict Law Review, 2016, v. 6, p. 25
- By:
- Publication type:
- Article
Fišing kao oblik prevare i krađe identiteta u zdravstvu: Viktimizacija za vreme trajanja pandemije COVID-19.
- Published in:
- Temida, 2022, v. 25, n. 1, p. 53, doi. 10.2298/TEM2201053V
- By:
- Publication type:
- Article
Riesgos de la aceleración digital: una mirada desde el Marco DIGCOMP2.2 y los derechos digitales de la ciudadanía.
- Published in:
- Anuario Think EPI, 2022, v. 16, p. 1, doi. 10.3145/thinkepi.2022.e16a19
- By:
- Publication type:
- Article
The pitfalls of sharenting.
- Published in:
- Education Journal, 2022, n. 508, p. 8
- Publication type:
- Article
A User Identity Management System for Cybercrime Control.
- Published in:
- Nigerian Journal of Technology, 2021, v. 40, n. 1, p. 129, doi. 10.4314/njt.v40i1.17
- By:
- Publication type:
- Article
User Identification Through Keystroke Dynamic.
- Published in:
- Khoj Journal of Indian Management Research & Practices, 2016, p. 241
- By:
- Publication type:
- Article
NEUERSCHEINUNGEN.
- Published in:
- WISTA Wirtschaft und Statistik, 2024, n. 3, p. 14
- Publication type:
- Article
Role of Information Technology in Cyber Crime and Ethical Issues in Cyber Ethics.
- Published in:
- International Journal of Business & Engineering Research, 2016, v. 10, p. 1
- By:
- Publication type:
- Article
A New Development Technology? South Asian Biometrics and the Promise of State Security and Economic Opportunity.
- Published in:
- Geography Compass, 2015, v. 9, n. 10, p. 539, doi. 10.1111/gec3.12230
- By:
- Publication type:
- Article
ZLOUPOTREBA SERTIFIKATA U SERVISU ELEKTRONSKE POŠTE.
- Published in:
- Singidunum Scientific Review / Singidunum Revija, 2011, v. 8, n. 2, p. 79
- By:
- Publication type:
- Article
New Hybrid Features for Phish Website Prediction.
- Published in:
- International Journal of Advances in Soft Computing & Its Applications, 2016, v. 8, n. 1, p. 28
- By:
- Publication type:
- Article
PROTECTING INDIVIDUAL SECURITY ONLINE AND IN THE REAL WORLD.
- Published in:
- Parliamentarian, 2010, v. 91, n. 4, p. 400
- Publication type:
- Article
E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors.
- Published in:
- American Business Law Journal, 2007, v. 44, n. 1, p. 55, doi. 10.1111/j.1744-1714.2007.00031.x
- By:
- Publication type:
- Article
Circuit Cour cuit Courts Split: Victim of a Data Br ts Split: Victim of a Data Breach? Can Y each? Can You “STAND” and Sue in Federal Court?
- Published in:
- FIU Law Review, 2021, v. 15, n. 1, p. 121, doi. 10.25148/lawrev.15.1.21
- By:
- Publication type:
- Article
Snapshot of Service: Life's Kitchen.
- Published in:
- Advocate (05154987), 2017, v. 60, n. 9, p. 55
- By:
- Publication type:
- Article
La usurpación de la identidad con fines paródicos en la red social Twitter: ¿manifestaciones de descortesía verbal?
- Published in:
- RILCE. Revista de Filología Hispánica, 2017, v. 33, n. 2, p. 537, doi. 10.15581/008.33.2.537-65
- By:
- Publication type:
- Article
Breaking Bad Security Vulnerabilities.
- Published in:
- Journal of Financial Service Professionals, 2017, v. 71, n. 1, p. 50
- By:
- Publication type:
- Article
What Can Be Done to Combat Tax-Related Identity Theft?
- Published in:
- Journal of Financial Service Professionals, 2016, v. 70, n. 3, p. 16
- By:
- Publication type:
- Article
A Civil War Identity Theft?
- Published in:
- 2016
- By:
- Publication type:
- journal article
ABO/Rh Testing, Antibody Screening, and Biometric Technology as Tools to Combat Insurance Fraud: An Example and Discussion.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
Group formation with neighbor similarity trust in P2P E-commerce.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 295, doi. 10.1007/s12083-011-0116-4
- By:
- Publication type:
- Article
Análisis comparativo de variables utilizadas en redes distribuidas zigbee para detección de intrusiones desde dispositivos finales en una red de vehículos autónomos no tripulados.
- Published in:
- DYNA - Ingeniería e Industria, 2022, v. 97, n. 6, p. 606, doi. 10.6036/10620
- By:
- Publication type:
- Article
Tapatybės vagystė elektroninėje erdvėje.
- Published in:
- Information Sciences / Informacijos Mokslai, 2009, v. 50, p. 240, doi. 10.15388/Im.2009.0.3231
- By:
- Publication type:
- Article
Better beware: comparing metacognition for phishing and legitimate emails.
- Published in:
- Metacognition & Learning, 2019, v. 14, n. 3, p. 343, doi. 10.1007/s11409-019-09197-5
- By:
- Publication type:
- Article
Bil/-a sem ukradeni otrok, bil/-a sem pozabljeni otrok.
- Published in:
- Contributions to Contemporary History / Prispevki za Novejšo Zgodovino, 2022, v. 62, n. 3, p. 83, doi. 10.51663/pnz.62.3.05
- By:
- Publication type:
- Article
Influencing "Kidfluencing": Protecting Children by Limiting the Right to Profit From "Sharenting".
- Published in:
- Vanderbilt Journal of Entertainment & Technology Law, 2023, v. 25, n. 4, p. 845
- By:
- Publication type:
- Article
ESTABLISHING A CAUSE OF ACTION FOR CYBERSECURITY BREACHES AGAINST GOVERNMENT AGENCIES IN LOUISIANA.
- Published in:
- Loyola Law Review, 2022, v. 68, n. 2, p. 415
- By:
- Publication type:
- Article
THE GOVERNMENT HAS YOUR DNA; IS IT CONSTITUTIONAL? (The Suspect DNA Database).
- Published in:
- Appalachian Journal of Law, 2023, v. 22, n. 2, p. 1
- By:
- Publication type:
- Article
Organized fraud and organizing frauds: Unpacking research on networks and organization.
- Published in:
- Criminology & Criminal Justice: An International Journal, 2008, v. 8, n. 4, p. 389, doi. 10.1177/1748895808096470
- By:
- Publication type:
- Article
Organized crime and local businesses.
- Published in:
- Criminology & Criminal Justice: An International Journal, 2008, v. 8, n. 4, p. 443, doi. 10.1177/1748895808096469
- By:
- Publication type:
- Article
CHS National Conference.
- Published in:
- Forensic Examiner, 2007, v. 16, n. 3, p. 46
- Publication type:
- Article
Continued Investigation of a PSYCHOPATHIC CRIMINAL'S BEHAVIOR as the Wheels of Justice Slowly Turn.
- Published in:
- Forensic Examiner, 2004, v. 13, n. 4, p. 28
- By:
- Publication type:
- Article
the impact of identity THEFT through cyberspace.
- Published in:
- Forensic Examiner, 2003, v. 12, n. 5/6, p. 30
- By:
- Publication type:
- Article
SURVEY OF ADDITIONAL IP AND TECHNOLOGY LAW DEVELOPMENTS.
- Published in:
- Berkeley Technology Law Journal, 2018, v. 33, n. 4, p. 1343
- Publication type:
- Article
ARE ''BETTER'' SECURITY BREACH NOTIFICATION LAWS POSSIBLE?
- Published in:
- Berkeley Technology Law Journal, 2009, v. 24, n. 3, p. 1133
- By:
- Publication type:
- Article
IDENTITY THEFT IN CYBERSPACE: CRIME CONTROL METHODS AND THEIR EFFECTIVENESS IN COMBATING PHISHING ATTACKS.
- Published in:
- Berkeley Technology Law Journal, 2005, v. 20, n. 1, p. 259
- By:
- Publication type:
- Article
FT C Red Flag and Address Discrepancy Rule.
- Published in:
- Audiology Today, 2009, v. 21, n. 5, p. 61
- Publication type:
- Article
New complex technology will not stop fraudsters.
- Published in:
- Chemistry & Industry, 2005, n. 18, p. 7
- By:
- Publication type:
- Article