Works matching DE "IDENTITY theft prevention"
1
- Kentucky Nurse, 2017, v. 65, n. 4, p. 14
- Article
2
- Computers (2073-431X), 2018, v. 7, n. 1, p. 9, doi. 10.3390/computers7010009
- Chen, Chin-Ling;
- Deng, Yong-Yuan;
- Tang, Yung-Wen;
- Chen, Jung-Hsuan;
- Lin, Yu-Fan
- Article
3
- CDS Review, 2007, v. 100, n. 2, p. 38
- Article
4
- UMKC Law Review, 2017, v. 86, n. 2, p. 362
- Article
5
- St. John's Law Review, 2012, v. 86, n. 4, p. 1011
- Article
6
- Oklahoma Dental Association Journal, 2011, v. 102, n. 4, p. 30
- Article
7
- Oklahoma Dental Association Journal, 2009, v. 100, n. 4, p. 10
- Article
8
- Serials Librarian, 2018, v. 74, n. 1-4, p. 119, doi. 10.1080/0361526X.2018.1439249
- Guajardo, Richard;
- Hamparian, Don;
- Katz, Peter
- Article
9
- Review of Policy Research, 2012, v. 29, n. 1, p. 141, doi. 10.1111/j.1541-1338.2011.00546.x
- Article
10
- Bank Accounting & Finance (08943958), 2006, v. 19, n. 2, p. 33
- Article
11
- Internal Auditor, 2010, v. 67, n. 1, p. 22
- Article
12
- 2014
- Jator, Eleanor K.;
- Hughley, Kimily
- Case Study
13
- Journal of Tax Practice & Procedure, 2016, v. 18, n. 5, p. 15
- Keenan, John;
- Hoshall, Diana
- Article
14
- Journal of Tax Practice & Procedure, 2016, v. 18, n. 3, p. 43
- Jones, Larry;
- Palmer, Taylor
- Article
15
- Journal of Tax Practice & Procedure, 2014, v. 16, n. 3, p. 15
- Villa Jr., Michael A.;
- Borden, Aaron P.
- Article
16
- Jahrbuch für Wissenschaft und Ethik, 2010, v. 15, n. 1, p. 383, doi. 10.1515/9783110222906.383
- Irish Council For Bioethics
- Article
17
- Journal of Prevention & Intervention in the Community, 2016, v. 44, n. 3, p. 177, doi. 10.1080/10852352.2016.1166812
- Downing, Christopher;
- Howard, E. Henry;
- Goodwin, Christina;
- Geller, E. Scott
- Article
18
- Ocular Surgery News, 2009, v. 27, n. 9, p. 43
- Article
19
- Journal of Taxation & Regulation of Financial Institutions, 2018, v. 31, n. 2, p. 31
- Article
20
- Medicine & Health Rhode Island, 2009, v. 92, n. 8, p. 285
- Article
21
- Wake Forest Law Review, 2016, v. 51, n. 1, p. 1
- Article
22
- Journal of the California Dental Association, 2018, v. 46, n. 10, p. 663, doi. 10.1080/19424396.2018.12222085
- Article
23
- International Journal of Information Security & Cybercrime, 2017, v. 6, n. 1, p. 41, doi. 10.19107/IJISC.2017.01.04
- Article
24
- International Journal of Information Security, 2011, v. 10, n. 6, p. 351, doi. 10.1007/s10207-011-0140-7
- Sánchez García, Sergio;
- Gómez Oliva, Ana;
- Pérez Belleboni, Emilia;
- Pau de la Cruz, Iván
- Article
25
- Journal of the CPA Practitioner, 2014, v. 6, n. 2, p. 6
- Article
26
- Journal of the CPA Practitioner, 2012, v. 4, n. 1, p. 8
- Article
27
- University of Florida Journal of Law & Public Policy, 2017, v. 28, n. 3, p. 519
- Greenstein, Danielle Drora
- Article
28
- International Journal of Computer Science & Applications, 2015, v. 12, n. 1, p. 134
- AIT HACHA, AICHA;
- BAH, SLIMANE;
- BAKKOURY, ZOHRA
- Article
29
- Homeland Security Review, 2014, v. 8, n. 2, p. 1
- KAGAN, ALBERT;
- CANT, ANGELA
- Article
30
- IEEE Internet Computing, 2009, v. 13, n. 3, p. 56, doi. 10.1109/MIC.2009.59
- Kuan-Ta Chen;
- Chun-Rong Huang;
- Chu-Song Chen;
- Jau-Yuan Chen
- Article
31
- Journal of the Missouri Bar, 2015, v. 71, n. 3, p. 134
- Article
32
- Connecticut Medicine, 2009, v. 73, n. 6, p. 380
- Article
33
- Canadian Journal of Criminology & Criminal Justice, 2008, v. 50, n. 2, p. 153, doi. 10.3138/cjccj.50.2.153
- Winterdyk, John;
- Thompson, Nikki
- Article
34
- Government Technology, 2008, v. 21, n. 3, p. 48
- Article
35
- Qualitative Research, 2024, v. 24, n. 5, p. 1291, doi. 10.1177/14687941231224591
- Santinele Martino, Alan;
- Perrotta, Arielle;
- McGillion, Brenna Janet
- Article
37
- Financial Executive, 2001, v. 17, n. 2, p. 15
- Article
38
- RAIRO - Theoretical Informatics & Applications, 2016, v. 50, n. 3, p. 193, doi. 10.1051/ita/2016021
- KE GU;
- LIHAO YANG;
- YONG WANG;
- SHENG WEN
- Article
39
- Business Lawyer, 2007, v. 62, n. 2, p. 735
- Scanlan, Agnes Bundy;
- Pardon, Catherine
- Article
40
- Journal of Chain-computerisation, 2012, v. 3, p. 3
- Grijpink, J. H. A. M. (Jan);
- Plomp, M. G. A. (Marijn)
- Article
41
- Journal of Chain-computerisation, 2012, v. 3, p. 3
- Grijpink, J. H. A. M. (Jan)
- Article
42
- American Economist, 2017, v. 62, n. 2, p. 217, doi. 10.1177/0569434516682712
- Graves, Philip E.;
- Sexton, Robert L.
- Article
44
- Optometry & Vision Development, 2008, v. 39, n. 2, p. 64
- Article
45
- Electronic Journal of e-Government, 2011, v. 9, n. 2, p. 214
- Plomp, Marijn;
- Grijpink, Jan
- Article
46
- Law & Philosophy, 2010, v. 29, n. 5, p. 505, doi. 10.1007/s10982-010-9067-9
- Article
47
- Journal of the American Dental Association (JADA), 2014, v. 145, n. 3, p. 308, doi. 10.1016/S0002-8177(14)60071-4
- Article
48
- Cardozo Journal of International & Comparative Law, 2009, v. 17, n. 3, p. 589
- Article
49
- 2016
- Luna, Raul;
- Rhine, Emily;
- Myhra, Matthew;
- Sullivan, Ross;
- Kruse, Clemens Scott
- journal article
50
- Journal of Intellectual Property Law, 2018, v. 25, n. 2, p. 201
- Skedsvold, Miles Christian
- Article