Works matching DE "IDENTITY theft prevention"
Results: 99
New Medicare Cards Offer Greater Protection to More Than 57.7 Million Americans: New cards will no longer contain Social Security numbers, to combat fraud and illegal use.
- Published in:
- Kentucky Nurse, 2017, v. 65, n. 4, p. 14
- Publication type:
- Article
An Improvement on Remote User Authentication Schemes Using Smart Cards.
- Published in:
- Computers (2073-431X), 2018, v. 7, n. 1, p. 9, doi. 10.3390/computers7010009
- By:
- Publication type:
- Article
ENCRYPTION-CAPABLE HARD DRIVES OFFER ADDED PROTECTION.
- Published in:
- CDS Review, 2007, v. 100, n. 2, p. 38
- Publication type:
- Article
IN DEFENSE OF THE "DUTY TO REPORT" CRIMES.
- Published in:
- UMKC Law Review, 2017, v. 86, n. 2, p. 362
- By:
- Publication type:
- Article
GET YOUR FACTAS STRAIGHT: THE APPLICATION OF FACTA'S TRUNCATION PROVISION TO ONLINE TRANSACTIONS.
- Published in:
- St. John's Law Review, 2012, v. 86, n. 4, p. 1011
- By:
- Publication type:
- Article
Congress Passes Legislation Exempting Dentists from FTC's Red Flags Rule.
- Published in:
- Oklahoma Dental Association Journal, 2011, v. 102, n. 4, p. 30
- By:
- Publication type:
- Article
The Federal Trade Commission's new "Red Flags" Rule... What does it mean for you and your practice?
- Published in:
- Oklahoma Dental Association Journal, 2009, v. 100, n. 4, p. 10
- Publication type:
- Article
Partnering with Vendors to Limit Compromised User Accounts.
- Published in:
- Serials Librarian, 2018, v. 74, n. 1-4, p. 119, doi. 10.1080/0361526X.2018.1439249
- By:
- Publication type:
- Article
Health-Care Data Protection and Biometric Authentication Policies: Comparative Culture and Technology Acceptance in China and in the United States.
- Published in:
- Review of Policy Research, 2012, v. 29, n. 1, p. 141, doi. 10.1111/j.1541-1338.2011.00546.x
- By:
- Publication type:
- Article
Multifactor Authentication: A Blow to Identity Theft?
- Published in:
- Bank Accounting & Finance (08943958), 2006, v. 19, n. 2, p. 33
- By:
- Publication type:
- Article
Friend or Foe?
- Published in:
- Internal Auditor, 2010, v. 67, n. 1, p. 22
- Publication type:
- Article
ABO/Rh Testing, Antibody Screening, and Biometric Technology as Tools to Combat Insurance Fraud: An Example and Discussion.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
IRS Watch.
- Published in:
- Journal of Tax Practice & Procedure, 2016, v. 18, n. 5, p. 15
- By:
- Publication type:
- Article
Cyber-security, the IRS and You: How to Stay Up-to-Date with Changing Technologies.
- Published in:
- Journal of Tax Practice & Procedure, 2016, v. 18, n. 3, p. 43
- By:
- Publication type:
- Article
Penalties.
- Published in:
- Journal of Tax Practice & Procedure, 2014, v. 16, n. 3, p. 15
- By:
- Publication type:
- Article
Biometrics: Enhancing Security or Invading Privacy? Executive Summary.
- Published in:
- Jahrbuch für Wissenschaft und Ethik, 2010, v. 15, n. 1, p. 383, doi. 10.1515/9783110222906.383
- By:
- Publication type:
- Article
Preventing the threat of credit-card fraud: Factors influencing cashiers’ identification-checking behavior.
- Published in:
- Journal of Prevention & Intervention in the Community, 2016, v. 44, n. 3, p. 177, doi. 10.1080/10852352.2016.1166812
- By:
- Publication type:
- Article
Medical groups oppose federal identity theft prevention policy.
- Published in:
- Ocular Surgery News, 2009, v. 27, n. 9, p. 43
- By:
- Publication type:
- Article
Cybersecurity Breaches: Avoiding Pitfalls.
- Published in:
- Journal of Taxation & Regulation of Financial Institutions, 2018, v. 31, n. 2, p. 31
- By:
- Publication type:
- Article
The FTC Red Flags Rule Requirements of Healthcare Providers For Compliance.
- Published in:
- Medicine & Health Rhode Island, 2009, v. 92, n. 8, p. 285
- By:
- Publication type:
- Article
INDIGNITY: REDEFINING THE HARM CAUSED BY DATA BREACHES.
- Published in:
- Wake Forest Law Review, 2016, v. 51, n. 1, p. 1
- By:
- Publication type:
- Article
Are Your Patients Who They Say They Are? Preventing Medical Identity Theft.
- Published in:
- Journal of the California Dental Association, 2018, v. 46, n. 10, p. 663, doi. 10.1080/19424396.2018.12222085
- Publication type:
- Article
The Darknet: A New Passageway to Identity Theft.
- Published in:
- International Journal of Information Security & Cybercrime, 2017, v. 6, n. 1, p. 41, doi. 10.19107/IJISC.2017.01.04
- By:
- Publication type:
- Article
Solving identity delegation problem in the e-government environment.
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 6, p. 351, doi. 10.1007/s10207-011-0140-7
- By:
- Publication type:
- Article
CONGRESSIONAL AGENDA.
- Published in:
- Journal of the CPA Practitioner, 2014, v. 6, n. 2, p. 6
- Publication type:
- Article
Shredding and Compliance.
- Published in:
- Journal of the CPA Practitioner, 2012, v. 4, n. 1, p. 8
- By:
- Publication type:
- Article
A LANDLORD'S OBLIGATION TO PROTECT THE SENSITIVE INFORMATION OF POTENTIAL AND CURRENT LESSEES' FROM IDENTITY THEFT.
- Published in:
- University of Florida Journal of Law & Public Policy, 2017, v. 28, n. 3, p. 519
- By:
- Publication type:
- Article
A NEW AUTHENTICATION SCHEME FOR SIP REGISTRATION IN A MANET ENVIRONMENT.
- Published in:
- International Journal of Computer Science & Applications, 2015, v. 12, n. 1, p. 134
- By:
- Publication type:
- Article
Information Security: A Socio-technical Solution for Homeland Security Threats within Small to Medium Sized Enterprises (SMEs).
- Published in:
- Homeland Security Review, 2014, v. 8, n. 2, p. 1
- By:
- Publication type:
- Article
Fighting Phishing with Discriminative Keypoint Features.
- Published in:
- IEEE Internet Computing, 2009, v. 13, n. 3, p. 56, doi. 10.1109/MIC.2009.59
- By:
- Publication type:
- Article
Counseling Clients for #Digital Death.
- Published in:
- Journal of the Missouri Bar, 2015, v. 71, n. 3, p. 134
- By:
- Publication type:
- Article
Is Your Practice in Compliance with the New "Red Flag" Regulations?
- Published in:
- Connecticut Medicine, 2009, v. 73, n. 6, p. 380
- By:
- Publication type:
- Article
Student and Non-Student Perceptions and Awareness of Identity Theft.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2008, v. 50, n. 2, p. 153, doi. 10.3138/cjccj.50.2.153
- By:
- Publication type:
- Article
Better Late Than Never.
- Published in:
- Government Technology, 2008, v. 21, n. 3, p. 48
- By:
- Publication type:
- Article
Who can you trust these days?: Dealing with imposter participants during online recruitment and data collection.
- Published in:
- Qualitative Research, 2024, v. 24, n. 5, p. 1291, doi. 10.1177/14687941231224591
- By:
- Publication type:
- Article
Board Moves To Make AAFCS Webinars Free To All Members.
- Published in:
- 2016
- By:
- Publication type:
- Opinion
Online ID Authentication.
- Published in:
- Financial Executive, 2001, v. 17, n. 2, p. 15
- Publication type:
- Article
TRACEABLE IDENTITY-BASED GROUP SIGNATURE.
- Published in:
- RAIRO - Theoretical Informatics & Applications, 2016, v. 50, n. 3, p. 193, doi. 10.1051/ita/2016021
- By:
- Publication type:
- Article
Compliance Program Management for Financial Services Institutions in Today's Environment.
- Published in:
- Business Lawyer, 2007, v. 62, n. 2, p. 735
- By:
- Publication type:
- Article
Practical Guidelines for chain-computerisation.
- Published in:
- Journal of Chain-computerisation, 2012, v. 3, p. 3
- By:
- Publication type:
- Article
Chains and identity.
- Published in:
- Journal of Chain-computerisation, 2012, v. 3, p. 3
- By:
- Publication type:
- Article
Optimal Public Policy Against Identity Theft.
- Published in:
- American Economist, 2017, v. 62, n. 2, p. 217, doi. 10.1177/0569434516682712
- By:
- Publication type:
- Article
IDENTITY CRISIS: SEEKING A UNIFIED APPROACH TO PLAINTIFF STANDING FOR DATA SECURITY BREACHES OF SENSITIVE PERSONAL INFORMATION.
- Published in:
- 2013
- By:
- Publication type:
- Opinion
Financial Management -- Payment Card Fraud Can Happen to You.
- Published in:
- Optometry & Vision Development, 2008, v. 39, n. 2, p. 64
- By:
- Publication type:
- Article
Towards an Information Strategy for Combating Identity Fraud in the Public Domain: Cases from Healthcare and Criminal Justice.
- Published in:
- Electronic Journal of e-Government, 2011, v. 9, n. 2, p. 214
- By:
- Publication type:
- Article
The Liberal Value of Privacy.
- Published in:
- Law & Philosophy, 2010, v. 29, n. 5, p. 505, doi. 10.1007/s10982-010-9067-9
- By:
- Publication type:
- Article
Medical identity theft: How to protect yourself.
- Published in:
- Journal of the American Dental Association (JADA), 2014, v. 145, n. 3, p. 308, doi. 10.1016/S0002-8177(14)60071-4
- Publication type:
- Article
THE DIGITAL CURRENCY DOPPELGANGER: REGULATORY CHALLENGE OR HARBINGER OF THE NEW ECONOMY?
- Published in:
- Cardozo Journal of International & Comparative Law, 2009, v. 17, n. 3, p. 589
- By:
- Publication type:
- Article
Cyber threats to health information systems: A systematic review.
- Published in:
- 2016
- By:
- Publication type:
- journal article
A DUTY TO SAFEGUARD: DATA BREACH LITIGATION THROUGH A QUASI-BAILMENT LENS.
- Published in:
- Journal of Intellectual Property Law, 2018, v. 25, n. 2, p. 201
- By:
- Publication type:
- Article