Found: 599
Select item for more details and to access through your institution.
Volunteers Provide Valuable Advice to 16 Taxpayers at Problem-Solving Day.
- Published in:
- ABA Tax Times, 2024, v. 43, n. 2, p. 40
- By:
- Publication type:
- Article
Examining the Association Between Citizenship and Ethnicity on Identity Theft Risk: Findings from the National Crime Victimization Survey.
- Published in:
- American Journal of Criminal Justice, 2024, v. 49, n. 3, p. 400, doi. 10.1007/s12103-024-09759-7
- By:
- Publication type:
- Article
ResNet1D-Based Personal Identification with Multi-Session Surface Electromyography for Electronic Health Record Integration.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 10, p. 3140, doi. 10.3390/s24103140
- By:
- Publication type:
- Article
Keep an Eye on Your NPI.
- Published in:
- Family Practice Management, 2024, v. 31, n. 3, p. 39
- By:
- Publication type:
- Article
Insights into Cybercrime Detection and Response: A Review of Time Factor.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 5, p. 273, doi. 10.3390/info15050273
- By:
- Publication type:
- Article
NEUERSCHEINUNGEN.
- Published in:
- WISTA Wirtschaft und Statistik, 2024, n. 3, p. 14
- Publication type:
- Article
Psychiatric electronic health records in the era of data breaches – What are the ramifications for patients, psychiatrists and healthcare systems?
- Published in:
- Australasian Psychiatry, 2024, v. 32, n. 2, p. 121, doi. 10.1177/10398562241230816
- By:
- Publication type:
- Article
The Identity Index The Big Picture The Details: Findings from a new nationwide survey on identity verification.
- Published in:
- 2024
- Publication type:
- Chart/Diagram/Graph
Securing the Safety Net: Finding a holistic way to verify identities and prevent benefits fraud.
- Published in:
- Government Technology, 2024, v. 37, n. 3, p. 28
- By:
- Publication type:
- Article
The Internet Godfather Comes Clean.
- Published in:
- 2024
- By:
- Publication type:
- Interview
Oversharing on Social Media: Anxiety, Attention-Seeking, and Social Media Addiction Predict the Breadth and Depth of Sharing.
- Published in:
- Psychological Reports, 2024, v. 127, n. 2, p. 513, doi. 10.1177/00332941221122861
- By:
- Publication type:
- Article
A dimensionality reduction-based approach for secured color image watermarking.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2024, v. 28, n. 6, p. 5137, doi. 10.1007/s00500-023-09233-2
- By:
- Publication type:
- Article
Women's knowledge and musical form: adapting historical identities in Martin Guerre.
- Published in:
- Adaptation, 2024, v. 17, n. 1, p. 115, doi. 10.1093/adaptation/apad035
- By:
- Publication type:
- Article
IRS Watch: Employee Retention Credit Voluntary Disclosure Program Announced While Taxpayer Advocate Raises Processing Concerns.
- Published in:
- Journal of Tax Practice & Procedure, 2024, v. 26, n. 1, p. 19
- By:
- Publication type:
- Article
Reducing the Negativity in Negative Option Marketing: The FTC’s Amendment to the Negative Option Rule.
- Published in:
- North Carolina School Banking Institute Journal, 2024, v. 28, n. 1, p. 301
- By:
- Publication type:
- Article
GmbHG Kommentar – mit Branchenvorschriften, dGmbHG und Wirtschaftsstrafrecht.
- Published in:
- Zeitschrift für Abgaben-, Finanz- und Steuerrecht, 2024, v. 22, n. 2, p. 78
- By:
- Publication type:
- Article
The court's judgment on the true identity of the author responsible for identity fraud and the consequent batch retraction of Iranian's papers in the journal of diagnostic pathology.
- Published in:
- Diagnostic Pathology, 2024, v. 19, n. 1, p. 1, doi. 10.1186/s13000-024-01459-4
- By:
- Publication type:
- Article
Identity fraud victimization: a critical review of the literature of the past two decades.
- Published in:
- Crime Science, 2024, v. 13, n. 1, p. 1, doi. 10.1186/s40163-024-00202-0
- By:
- Publication type:
- Article
Comparative Analysis of Blockchain Platforms for Security Enhancement in Online Social Networks.
- Published in:
- Ingénierie des Systèmes d'Information, 2024, v. 29, n. 1, p. 19, doi. 10.18280/isi.290103
- By:
- Publication type:
- Article
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 1, p. 373, doi. 10.1007/s10207-023-00749-0
- By:
- Publication type:
- Article
The Social Network Dilemma: Safeguarding Privacy and Security in an Online Community.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 1, p. 125, doi. 10.18280/ijsse.140112
- By:
- Publication type:
- Article
Understanding digital image anti-forensics: an analytical review.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 10445, doi. 10.1007/s11042-023-15866-0
- By:
- Publication type:
- Article
Two Areas of Developing Concerns: Artificial Intelligence and Cybersecurity.
- Published in:
- Benefits Quarterly, 2024, v. 40, n. 1, p. 45
- Publication type:
- Article
Identity Theft, Deep Brain Stimulation, and the Primacy of Post‐trial Obligations.
- Published in:
- Hastings Center Report, 2024, v. 54, n. 1, p. 34, doi. 10.1002/hast.1567
- By:
- Publication type:
- Article
Nachrichten.
- Published in:
- Information -- Wissenschaft und Praxis, 2024, v. 75, n. 1, p. 82, doi. 10.1515/iwp-2023-2055
- Publication type:
- Article
SDS-IAM: Secure Data Storage with Identity and Access Management in Blockchain.
- Published in:
- International Journal of Performability Engineering, 2024, v. 20, n. 1, p. 32, doi. 10.23940/ijpe.24.01.p5.3239
- By:
- Publication type:
- Article
Unlocking the Future of Secure Automatic Machines: Leveraging Facereg with HRC & LBPH.
- Published in:
- Journal of Automation, Mobile Robotics & Intelligent Systems, 2024, v. 18, n. 1, p. 67, doi. 10.14313/jamris/1-2024/7
- By:
- Publication type:
- Article
A "RULE MAKING" CLASS: THE FEDERAL TRADE COMMISSION'S EXPANSIVE PER SE BAN ON NON-COMPETE CLAUSES: AUTHORITY, ENFORCEABILITY, AND THE NEED FOR CONGRESSIONAL ACTION.
- Published in:
- Journal of Dispute Resolution, 2024, v. 2024, n. 1, p. 145
- By:
- Publication type:
- Article
DO DATA BREACH NOTIFICATION LAWS WORK?
- Published in:
- New York University Journal of Legislation & Public Policy, 2024, v. 26, n. 1, p. 173
- By:
- Publication type:
- Article
What's in YOUR Data? New Texas Law Protects Consumer Personal Information.
- Published in:
- Tierra Grande, 2024, v. 31, n. 1, p. 2
- By:
- Publication type:
- Article
Get Savvy on Social Engineering to Reduce Stolen Identity Fraud.
- Published in:
- Journal of Government Financial Management, 2023, v. 72, n. 4, p. 32
- By:
- Publication type:
- Article
Breach: A Trans*textual Essay.
- Published in:
- Qualitative Inquiry, 2023, v. 29, n. 10, p. 1095, doi. 10.1177/10778004221150006
- By:
- Publication type:
- Article
Intangible Identity Theft and Intimate Partner Violence.
- Published in:
- Violence & Victims, 2023, v. 38, n. 6, p. 819, doi. 10.1891/VV-2023-0121
- By:
- Publication type:
- Article
Cybersecurity Challenges and Solutions in the Fintech Mobile App Ecosystem.
- Published in:
- International Journal of Interactive Mobile Technologies, 2023, v. 17, n. 22, p. 100, doi. 10.3991/ijim.v17i22.45261
- By:
- Publication type:
- Article
Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy.
- Published in:
- Mobile Information Systems, 2023, p. 1, doi. 10.1155/2023/4764135
- By:
- Publication type:
- Article
Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 11, p. 600, doi. 10.3390/info14110600
- By:
- Publication type:
- Article
SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-44586-6
- By:
- Publication type:
- Article
Identity Theft, Trust Breaches, and the Production of Economic Insecurity.
- Published in:
- American Sociological Review, 2023, v. 88, n. 5, p. 844, doi. 10.1177/00031224231189895
- By:
- Publication type:
- Article
Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse.
- Published in:
- Information Systems Frontiers, 2023, v. 25, n. 5, p. 2071, doi. 10.1007/s10796-023-10400-x
- By:
- Publication type:
- Article
Assessing the Levels of Knowledge of Personal Data Protection among Students.
- Published in:
- International Journal on Social & Education Sciences (IJonSES), 2023, v. 5, n. 4, p. 879, doi. 10.46328/ijonses.610
- By:
- Publication type:
- Article
There is no such thing as a predatory journal.
- Published in:
- Learned Publishing, 2023, v. 36, n. 4, p. 709, doi. 10.1002/leap.1568
- By:
- Publication type:
- Article
Influencing "Kidfluencing": Protecting Children by Limiting the Right to Profit From "Sharenting".
- Published in:
- Vanderbilt Journal of Entertainment & Technology Law, 2023, v. 25, n. 4, p. 845
- By:
- Publication type:
- Article
Impact of Digital Contexts in the Training of University Education Students.
- Published in:
- Education Sciences, 2023, v. 13, n. 9, p. 923, doi. 10.3390/educsci13090923
- By:
- Publication type:
- Article
UPGRADING CYBERSECURITY LAW.
- Published in:
- Houston Law Review, 2023, v. 61, n. 1, p. 51
- By:
- Publication type:
- Article
DO IT USERS BEHAVE RESPONSIBLY IN TERMS OF CYBERCRIME PROTECTION?
- Published in:
- Human Technology, 2023, v. 19, n. 2, p. 178, doi. 10.14254/1795-6889.2023.19-2.3
- By:
- Publication type:
- Article
"Artists Sue AI Generators Over 'Scraping' of Creative Works to Train Image Bots: 'Industrial-level Identity Theft'".
- Published in:
- Journal of Information Ethics, 2023, v. 32, n. 2, p. 158, doi. 10.2307/JIE.32.2.157
- By:
- Publication type:
- Article
Life-long phishing attack detection using continual learning.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-37552-9
- By:
- Publication type:
- Article
The Legal Muddle Over Healthcare Fraud in Malaysia.
- Published in:
- Malaysian Journal of Law & Society, 2023, p. 43, doi. 10.17576/juum-2023-SI-04
- By:
- Publication type:
- Article
Can Shareholders Benefit from Consumer Protection Disclosure Mandates? Evidence from Data Breach Disclosure Laws.
- Published in:
- Accounting Review, 2023, v. 98, n. 4, p. 1, doi. 10.2308/TAR-2020-0787
- By:
- Publication type:
- Article
THE GOVERNMENT HAS YOUR DNA; IS IT CONSTITUTIONAL? (The Suspect DNA Database).
- Published in:
- Appalachian Journal of Law, 2023, v. 22, n. 2, p. 1
- By:
- Publication type:
- Article