Works matching Identity theft and businesses
Results: 42
Prevention and Resolution for Identity Theft: Practical Advice for Individuals, Business Owners, and Tax Professionals.
- Published in:
- Business Education Innovation Journal, 2018, v. 10, n. 1, p. 80
- By:
- Publication type:
- Article
Online Identity Theft and Business.
- Published in:
- CPA Journal, 2004, v. 74, n. 4, p. 50
- By:
- Publication type:
- Article
Business Identity Theft under the UDRP and the ACPA: Is bad faith always bad for business advertising?
- Published in:
- Journal of International Commercial Law & Technology, 2015, v. 10, n. 1, p. 1
- By:
- Publication type:
- Article
PROTECTING CONFIDENTIAL INFORMATION ENTRUSTED TO OTHERS IN BUSINESS TRANSACTIONS: DATA BREACHES, IDENTITY THEFT, AND TORT LIABILITY.
- Published in:
- DePaul Law Review, 2017, v. 66, n. 2, p. 385
- By:
- Publication type:
- Article
Identity Theft: A Cost of Business?
- Published in:
- Business & Society Review (00453609), 2001, v. 106, n. 1, p. 51, doi. 10.1111/0045-3609.00101
- By:
- Publication type:
- Article
Small Businesses and Identity Theft: Reallocating the Risk of Loss.
- Published in:
- North Carolina School Banking Institute Journal, 2006, v. 10, p. 305
- By:
- Publication type:
- Article
Risky Business: The Risk of Identity Theft and Standing to Sue.
- Published in:
- Penn State Law Review, 2021, v. 125, n. 2, p. 533
- By:
- Publication type:
- Article
Combatting Identity Theft: A Proposed Ethical Policy Statement and Best Practices.
- Published in:
- Business & Society Review (00453609), 2017, v. 122, n. 3, p. 393, doi. 10.1111/basr.12121
- By:
- Publication type:
- Article
Behavioral biometrics to detect fake expert profiles during negotiation.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 32, p. 78293, doi. 10.1007/s11042-024-18644-8
- By:
- Publication type:
- Article
Investigating the Role of Perceived Risk, Perceived Security and Perceived Trust on Smart m-Banking Application Using SEM.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 13, p. 9908, doi. 10.3390/su15139908
- By:
- Publication type:
- Article
Ask a lawyer. Identity security awareness.
- Published in:
- 2004
- By:
- Publication type:
- Journal Article
Identity Security Awareness.
- Published in:
- Journal of Perinatal Education, 2004, v. 13, n. 1, p. 36
- By:
- Publication type:
- Article
Identity Theft Policies Go Corporate.
- Published in:
- Financial Executive, 2006, v. 22, n. 9, p. 33
- By:
- Publication type:
- Article
Managing E-Business Risk to Mitigate Loss.
- Published in:
- Financial Executive, 2005, v. 21, n. 5, p. 43
- By:
- Publication type:
- Article
Identity Theft.
- Published in:
- CPA Journal, 2017, v. 87, n. 1, p. 66
- By:
- Publication type:
- Article
Identity-Theft Toolkit.
- Published in:
- CPA Journal, 2006, v. 76, n. 10, p. 66
- By:
- Publication type:
- Article
Combating ID Theft: The Identity Theft Red Flags Rule.
- Published in:
- Podiatry Management, 2009, v. 28, n. 5, p. 55
- By:
- Publication type:
- Article
FACING IDENTITY THEFT.
- Published in:
- Tennessee Bar Journal, 2004, v. 40, n. 12, p. 12
- Publication type:
- Article
DAMPAK DIGITALISASI TERHADAP BISNIS DAN PERDAGANGAN.
- Published in:
- Journal of Comprehensive Science (JCS), 2023, v. 2, n. 6, p. 1801, doi. 10.59188/jcs.v2i6.401
- By:
- Publication type:
- Article
Survey Shows Security Concerns the Biggest Barrier for Mobile Financial Services.
- Published in:
- Document News, 2013, v. 31, n. 1, p. 4
- Publication type:
- Article
Insights into Cybercrime Detection and Response: A Review of Time Factor.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 5, p. 273, doi. 10.3390/info15050273
- By:
- Publication type:
- Article
Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 11, p. 600, doi. 10.3390/info14110600
- By:
- Publication type:
- Article
How Much is the Public Willing to Pay to be Protected from Identity Theft?
- Published in:
- JQ: Justice Quarterly, 2011, v. 28, n. 3, p. 437, doi. 10.1080/07418825.2010.511245
- By:
- Publication type:
- Article
Friend or Foe?
- Published in:
- Internal Auditor, 2010, v. 67, n. 1, p. 22
- Publication type:
- Article
What your firm should know about identity theft.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2004, v. 15, n. 4, p. 3, doi. 10.1002/jcaf.20016
- By:
- Publication type:
- Article
Search Me.
- Published in:
- Journal of Property Management, 2006, v. 71, n. 3, p. 11
- Publication type:
- Article
E-MAIL FORENSICS: TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF ONE COURT CASE.
- Published in:
- Journal of Information Technology & Applications, 2018, v. 8, n. 2, p. 64, doi. 10.7251/JIT1802064L
- By:
- Publication type:
- Article
AN ANALYSIS OF THE INCREASING CASES OF DATA BREACHES IN INDIA.
- Published in:
- i-Manager's Journal on Software Engineering, 2023, v. 17, n. 3, p. 38, doi. 10.26634/jse.17.3.19791
- By:
- Publication type:
- Article
The Behaviour and Perceptions of On-Line Consumers: Risk, Risk Perception and Trust.
- Published in:
- International Journal of Information Science & Management, 2009, v. 7, n. 1, p. 79
- By:
- Publication type:
- Article
SDS-IAM: Secure Data Storage with Identity and Access Management in Blockchain.
- Published in:
- International Journal of Performability Engineering, 2024, v. 20, n. 1, p. 32, doi. 10.23940/ijpe.24.01.p5.3239
- By:
- Publication type:
- Article
Identity Theft: Proliferating Threat.
- Published in:
- Business Journal for Entrepreneurs, 2010, v. 2010, n. 2, p. 1
- By:
- Publication type:
- Article
Data Privacy: One Universal Regulation Eliminating the Many States of Legal Uncertainty.
- Published in:
- St. Louis University Law Journal, 2021, v. 65, n. 4, p. 873
- By:
- Publication type:
- Article
You've Been Hacked, and Now You're Being Sued: The Developing World of Cybersecurity Litigation.
- Published in:
- Florida Bar Journal, 2016, v. 90, n. 7, p. 30
- By:
- Publication type:
- Article
THE ROLE OF BIG DATA AND DATA SCIENCE IN THE CONTEXT OF INFORMATION SECURITY AND CYBERSECURITY.
- Published in:
- Journal of Modern Science, 2023, v. 53, n. 4, p. 9, doi. 10.13166/jms/177036
- By:
- Publication type:
- Article
Unauthorized Access? Remember to Check Identity Theft Laws.
- Published in:
- Journal of Health Care Compliance, 2006, v. 8, n. 1, p. 35
- By:
- Publication type:
- Article
Exploring the Impact of AI-Based Cyber Security Financial Sector Management.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 10, p. 5875, doi. 10.3390/app13105875
- By:
- Publication type:
- Article
Identity Hack! Is Your Company Next?
- Published in:
- Strategic Finance, 2014, v. 96, n. 6, p. 33
- By:
- Publication type:
- Article
ID-ology: A Planner's Guide to Identity Theft.
- Published in:
- Journal of Financial Planning, 2004, v. 17, n. 9, p. 36
- By:
- Publication type:
- Article
Cyber Insurance Need of the Hour: To Combat Growing Cyber-Attacks within Cyber Space.
- Published in:
- Library of Progress-Library Science, Information Technology & Computer, 2024, v. 44, n. 3, p. 12748
- By:
- Publication type:
- Article
Taking Best Advantage of Your Aquatic Business Cards.
- Published in:
- 2007
- By:
- Publication type:
- Editorial
Major Security Issue That Facing Social Networks with Its Main Defense Strategies.
- Published in:
- Technical Journal / Tehnički Glasnik, 2022, v. 16, n. 2, p. 205, doi. 10.31803/tg-20220124140610
- By:
- Publication type:
- Article
Old Fashioned File Cabinets Are an Open Invitation to Data Thieves.
- Published in:
- International Journal of Micrographics & Optical Technology, 2006, v. 24, p. 14
- Publication type:
- Article