Works matching DE "IDENTITY theft"
Results: 720
The Escalating Gravity of Identity Theft.
- Published in:
- Professionalization of Exercise Physiology, 2006, v. 9, n. 3, p. 1
- By:
- Publication type:
- Article
What's the Use?: Interpreting the Term "Uses" in the Aggravated Identity Theft Provision.
- Published in:
- University of Chicago Law Review, 2022, v. 89, n. 5, p. 1289
- By:
- Publication type:
- Article
Breach: A Trans*textual Essay.
- Published in:
- Qualitative Inquiry, 2023, v. 29, n. 10, p. 1095, doi. 10.1177/10778004221150006
- By:
- Publication type:
- Article
Criminal Identity Deception and Deception Detection in Law Enforcement.
- Published in:
- Group Decision & Negotiation, 2004, v. 13, n. 2, p. 111, doi. 10.1023/B:GRUP.0000021838.66662.0c
- By:
- Publication type:
- Article
Ransomware w sektorze ochrony zdrowia - przyczyny, konsekwencje.
- Published in:
- Business Administration Quarterly / Kwartalnik Nauk o Przedsiebiorstwie, 2024, v. 74, n. 4, p. 5, doi. 10.33119/knop.2024.74.4.1
- By:
- Publication type:
- Article
The stock characters in the editorial boards of journals run by predatory publishers.
- Published in:
- Learned Publishing, 2024, v. 37, n. 3, p. 1, doi. 10.1002/leap.1608
- By:
- Publication type:
- Article
There is no such thing as a predatory journal.
- Published in:
- Learned Publishing, 2023, v. 36, n. 4, p. 709, doi. 10.1002/leap.1568
- By:
- Publication type:
- Article
KANSAS K GARCIA: RESTORING HISTORIC STATE POLICE POWERS IN TRADITIONAL AREAS OF CRIMINAL LAW ENFORCEMENT.
- Published in:
- Maryland Law Review, 2021, v. 80, n. 2, p. 463
- By:
- Publication type:
- Article
Detection of Phishing Website using Machine Learning.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 5252
- By:
- Publication type:
- Article
Data Security System using Blockchain Technology.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part1, p. 173
- By:
- Publication type:
- Article
Off With Greuze's Heads: A Case of Identity Theft.
- Published in:
- Journal 18, 2019, n. 8, p. 1
- By:
- Publication type:
- Article
Identity Abuse as a Tactic of Violence in LGBTQ Communities: Initial Validation of the Identity Abuse Measure.
- Published in:
- Journal of Interpersonal Violence, 2021, v. 36, n. 5/6, p. 2656, doi. 10.1177/0886260518760018
- By:
- Publication type:
- Article
Experiences of dog theft and spatial practices of search/ing.
- Published in:
- Geographical Journal, 2022, v. 188, n. 4, p. 518, doi. 10.1111/geoj.12474
- By:
- Publication type:
- Article
Survey Shows Security Concerns the Biggest Barrier for Mobile Financial Services.
- Published in:
- Document News, 2013, v. 31, n. 1, p. 4
- Publication type:
- Article
Detection Of Identity Theft In Credit Card Application Forms Through Data Mining Techniques Utilizing Multilayer Algorithms.
- Published in:
- Journal of Namibian Studies, 2023, v. 35, p. 49
- By:
- Publication type:
- Article
Managing Cybercrime Risk.
- Published in:
- PM World Journal, 2015, v. 4, n. 3, p. 1
- By:
- Publication type:
- Article
ДОСЛІДЖЕННЯ ЗАХИЩЕНОСТІ BLUETOOTHПРИСТРОЇВ НА ОСНОВІ СМАРТ-ГОДИННИКІВ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2023, v. 29, n. 1, p. 11, doi. 10.18372/2225-5036.29.17548
- By:
- Publication type:
- Article
The United States Federal Trade Commission Shuts Down Purveyors of Fake Documents Used for Fraud and Identity Theft.
- Published in:
- Seybold Report: Analyzing Publishing Technologies, 2018, v. 18, n. 18, p. 7
- Publication type:
- Article
Dynamic Keystroke Technique for a Secure Authentication System based on Deep Belief Nets.
- Published in:
- Engineering, Technology & Applied Science Research, 2023, v. 13, n. 3, p. 10906, doi. 10.48084/etasr.5841
- By:
- Publication type:
- Article
Personal photographic encounters of/with the pandemic's pathological politics.
- Published in:
- Critical Studies on Security, 2021, v. 9, n. 2, p. 155, doi. 10.1080/21624887.2021.1978646
- By:
- Publication type:
- Article
E-GOVERNMENT AND ITS INFLUENCE ON MANAGERIAL EFFECTIVENESS: A SURVEY OF FLORIDA AND TEXAS CITY MANAGERS.
- Published in:
- Financial Accountability & Management, 2007, v. 23, n. 1, p. 1, doi. 10.1111/j.1468-0408.2007.00417.x
- By:
- Publication type:
- Article
THEFT AND ROBBERY IN THE SENTENCES OF MOLDAVIA'S CRIMINAL DEPARTMENT (1799-1804).
- Published in:
- History Notebooks / Prace Historyczne, 2021, v. 148, n. 1, p. 85, doi. 10.4467/20844069PH.21.006.13683
- By:
- Publication type:
- Article
An exploratory study of police impersonation crimes: Confrontational offenders and offenses.
- Published in:
- Revista Logos Ciencia & Tecnologia, 2023, v. 15, n. 2, p. 70, doi. 10.22335/rlct.v15i2.1721
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- 2017
- By:
- Publication type:
- Editorial
GUARDIANS UPON HIGH: AN APPLICATION OF ROUTINE ACTIVITIES THEORY TO ONLINE IDENTITY THEFT IN EUROPE AT THE COUNTRY AND INDIVIDUAL LEVEL.
- Published in:
- British Journal of Criminology, 2016, v. 56, n. 1, p. 21, doi. 10.1093/bjc/azv011
- By:
- Publication type:
- Article
'Perfect Vision': An Examination of the Role of Census and Profiling Practices in Visualizing and Crafting Refugee 'Groups' under Contemporary Group-resettlement Programmes.
- Published in:
- Journal of Refugee Studies, 2021, v. 34, n. 1, p. 108, doi. 10.1093/jrs/fez075
- By:
- Publication type:
- Article
ZLOUPOTREBA SERTIFIKATA U SERVISU ELEKTRONSKE POŠTE.
- Published in:
- Singidunum Scientific Review / Singidunum Revija, 2011, v. 8, n. 2, p. 79
- By:
- Publication type:
- Article
Integration of Self Sovereign Identity in Security Systems.
- Published in:
- International Journal of Next-Generation Computing, 2021, v. 12, n. 5, p. 732
- By:
- Publication type:
- Article
Online Privacy Fatigue: A Scoping Review and Research Agenda.
- Published in:
- Future Internet, 2023, v. 15, n. 5, p. 164, doi. 10.3390/fi15050164
- By:
- Publication type:
- Article
Security Challenges of Location Privacy in VANETs and State-of-the-Art Solutions: A Survey.
- Published in:
- Future Internet, 2021, v. 13, n. 4, p. 96, doi. 10.3390/fi13040096
- By:
- Publication type:
- Article
A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems.
- Published in:
- Future Internet, 2021, v. 13, n. 4, p. 90, doi. 10.3390/fi13040090
- By:
- Publication type:
- Article
Coping Strategies and Anxiety and Depressive Symptoms in Young Adult Victims of Cyberstalking: A Questionnaire Survey in an Italian Sample.
- Published in:
- Future Internet, 2020, v. 12, n. 8, p. 136, doi. 10.3390/fi12080136
- By:
- Publication type:
- Article
Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment.
- Published in:
- Future Internet, 2019, v. 11, n. 5, p. 116, doi. 10.3390/fi11050116
- By:
- Publication type:
- Article
Unlocking the Future of Secure Automatic Machines: Leveraging Facereg with HRC & LBPH.
- Published in:
- Journal of Automation, Mobile Robotics & Intelligent Systems, 2024, v. 18, n. 1, p. 67, doi. 10.14313/jamris/1-2024/7
- By:
- Publication type:
- Article
IP-Spoofing Vulnerability Protection Software for Data Communication Network Operators.
- Published in:
- IUP Journal of Information Technology, 2016, v. 12, n. 1, p. 7
- By:
- Publication type:
- Article
Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse.
- Published in:
- Information Systems Frontiers, 2023, v. 25, n. 5, p. 2071, doi. 10.1007/s10796-023-10400-x
- By:
- Publication type:
- Article
The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies.
- Published in:
- Information Systems Frontiers, 2023, v. 25, n. 2, p. 451, doi. 10.1007/s10796-022-10326-w
- By:
- Publication type:
- Article
Online Users' Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment.
- Published in:
- Information Systems Frontiers, 2022, v. 24, n. 6, p. 1929, doi. 10.1007/s10796-021-10194-w
- By:
- Publication type:
- Article
Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 6, p. 1251, doi. 10.1007/s10796-019-09958-2
- By:
- Publication type:
- Article
The quest for complete security: An empirical analysis of users' multi-layered protection from security threats.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 343, doi. 10.1007/s10796-017-9755-1
- By:
- Publication type:
- Article
Is impersonalization of personal data of parties in civil proceedings necessary and lawful?
- Published in:
- Current Issues of Business & Law / Verslo ir Teisės Aktualijos, 2012, v. 7, n. 2, p. 263, doi. 10.5200/1822-9530.2012.17
- By:
- Publication type:
- Article
Will the Real Emily Please Stand Up.
- Published in:
- In the Library with the Lead Pipe, 2009, p. 1
- By:
- Publication type:
- Article
NETWORK SECURITY INCREASE BY USING EXTENDED VALIDATION SECURE SOCKET LAYER CERTIFICATES FOR AVOIDING THE PHISHING THREATS.
- Published in:
- Annals of DAAAM & Proceedings, 2009, p. 813
- By:
- Publication type:
- Article
ALPRs and the Law: "And I'm Driving a Stolen Car".
- Published in:
- Law Enforcement Executive Forum, 2016, v. 16, n. 4, p. 37
- By:
- Publication type:
- Article
Page One.
- Published in:
- CDS Review, 2009, v. 102, n. 3, p. 1
- Publication type:
- Article
Identity theft and the care of the virtual self.
- Published in:
- Economy & Society, 2008, v. 37, n. 4, p. 572, doi. 10.1080/03085140802357950
- By:
- Publication type:
- Article
Suspended sentence for 11-year student bursary fraud that cost the NHS £88,000.
- Published in:
- Nursing Standard, 2017, v. 31, n. 46, p. 8, doi. 10.7748/ns.31.46.8.s3
- Publication type:
- Article
ALLEVIATING THE BURDEN OF COERCED DEBT: LEGAL SOLUTIONS TO INTIMATE PARTNER CREDIT ABUSE.
- Published in:
- University of Baltimore Law Review, 2024, v. 53, n. 2, p. 537
- By:
- Publication type:
- Article
A PRIMER FOR BLOCKCHAIN.
- Published in:
- UMKC Law Review, 2019, v. 88, n. 2, p. 239
- By:
- Publication type:
- Article
WHERE DOES DATA LIVE?
- Published in:
- DePaul Law Review, 2023, v. 72, n. 4, p. 793
- By:
- Publication type:
- Article