Found: 97
Select item for more details and to access through your institution.
ADOPTION OF IDENTITY THEFT COUNTERMEASURES AND ITS SHORT- AND LONG-TERM IMPACT ON FIRM VALUE.
- Published in:
- MIS Quarterly, 2019, v. 43, n. 1, p. 313, doi. 10.25300/MISQ/2019/14192
- By:
- Publication type:
- Article
Are Your Patients Who They Say They Are? Preventing Medical Identity Theft.
- Published in:
- Journal of the California Dental Association, 2018, v. 46, n. 10, p. 663, doi. 10.1080/19424396.2018.12222085
- Publication type:
- Article
A DUTY TO SAFEGUARD: DATA BREACH LITIGATION THROUGH A QUASI-BAILMENT LENS.
- Published in:
- Journal of Intellectual Property Law, 2018, v. 25, n. 2, p. 201
- By:
- Publication type:
- Article
ONE SIZE DOES NOT FIT ALL.
- Published in:
- Phi Kappa Phi Forum, 2018, v. 98, n. 3, p. 6
- By:
- Publication type:
- Article
Prevention and Resolution for Identity Theft: Practical Advice for Individuals, Business Owners, and Tax Professionals.
- Published in:
- Business Education Innovation Journal, 2018, v. 10, n. 1, p. 80
- By:
- Publication type:
- Article
Academic Information Security Researchers: Hackers or Specialists?
- Published in:
- Science & Engineering Ethics, 2018, v. 24, n. 2, p. 785, doi. 10.1007/s11948-017-9907-1
- By:
- Publication type:
- Article
An Improvement on Remote User Authentication Schemes Using Smart Cards.
- Published in:
- Computers (2073-431X), 2018, v. 7, n. 1, p. 9, doi. 10.3390/computers7010009
- By:
- Publication type:
- Article
Rethinking digital identity.
- Published in:
- Journal of Payments Strategy & Systems, 2018, v. 12, n. 1, p. 40
- By:
- Publication type:
- Article
Cybersecurity Breaches: Avoiding Pitfalls.
- Published in:
- Journal of Taxation & Regulation of Financial Institutions, 2018, v. 31, n. 2, p. 31
- By:
- Publication type:
- Article
IN DEFENSE OF THE "DUTY TO REPORT" CRIMES.
- Published in:
- UMKC Law Review, 2017, v. 86, n. 2, p. 362
- By:
- Publication type:
- Article
A LANDLORD'S OBLIGATION TO PROTECT THE SENSITIVE INFORMATION OF POTENTIAL AND CURRENT LESSEES' FROM IDENTITY THEFT.
- Published in:
- University of Florida Journal of Law & Public Policy, 2017, v. 28, n. 3, p. 519
- By:
- Publication type:
- Article
Optimal Public Policy Against Identity Theft.
- Published in:
- American Economist, 2017, v. 62, n. 2, p. 217, doi. 10.1177/0569434516682712
- By:
- Publication type:
- Article
New Medicare Cards Offer Greater Protection to More Than 57.7 Million Americans: New cards will no longer contain Social Security numbers, to combat fraud and illegal use.
- Published in:
- Kentucky Nurse, 2017, v. 65, n. 4, p. 14
- Publication type:
- Article
What Is the Social Security Number Removal Initiative and What Does It Mean to Audiologists?
- Published in:
- Audiology Today, 2017, v. 29, n. 5, p. 68
- By:
- Publication type:
- Article
Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates.
- Published in:
- Electronic Commerce Research, 2017, v. 17, n. 2, p. 289, doi. 10.1007/s10660-016-9222-y
- By:
- Publication type:
- Article
The Darknet: A New Passageway to Identity Theft.
- Published in:
- International Journal of Information Security & Cybercrime, 2017, v. 6, n. 1, p. 41, doi. 10.19107/IJISC.2017.01.04
- By:
- Publication type:
- Article
Board Moves To Make AAFCS Webinars Free To All Members.
- Published in:
- 2016
- By:
- Publication type:
- Opinion
IRS Watch.
- Published in:
- Journal of Tax Practice & Procedure, 2016, v. 18, n. 5, p. 15
- By:
- Publication type:
- Article
TRACEABLE IDENTITY-BASED GROUP SIGNATURE.
- Published in:
- RAIRO - Theoretical Informatics & Applications, 2016, v. 50, n. 3, p. 193, doi. 10.1051/ita/2016021
- By:
- Publication type:
- Article
Cyber-security, the IRS and You: How to Stay Up-to-Date with Changing Technologies.
- Published in:
- Journal of Tax Practice & Procedure, 2016, v. 18, n. 3, p. 43
- By:
- Publication type:
- Article
Identity Crisis: Choice Escrow & Land Title, LLC and the Rising Risks of Fraudulent Wire Transfers.
- Published in:
- DePaul Business & Commercial Law Journal, 2016, v. 14, n. 3, p. 387
- By:
- Publication type:
- Article
INDIGNITY: REDEFINING THE HARM CAUSED BY DATA BREACHES.
- Published in:
- Wake Forest Law Review, 2016, v. 51, n. 1, p. 1
- By:
- Publication type:
- Article
UNITED STATES CYBERSECURITY ENFORCEMENT: LEADING ROLES OF THE FEDERAL TRADE COMMISSION AND STATE ATTORNEYS GENERAL.
- Published in:
- Northern Kentucky Law Review, 2016, v. 43, n. 1, p. 1
- By:
- Publication type:
- Article
IDENTIFY THEFT.
- Published in:
- Podiatry Review, 2016, v. 73, n. 1, p. 17
- Publication type:
- Article
Cyber threats to health information systems: A systematic review.
- Published in:
- 2016
- By:
- Publication type:
- journal article
Incentivizing the Protection of Personally Identifying Consumer Data After the Home Depot Breach.
- Published in:
- Indiana Law Journal, 2015, v. 91, n. 1, p. 143
- By:
- Publication type:
- Article
Is Your Practice at Risk for Medical Identity Theft? Are you taking the proper steps to prevent this crime?
- Published in:
- Podiatry Management, 2015, v. 34, n. 8, p. 123
- By:
- Publication type:
- Article
TAX.
- Published in:
- Bench & Bar of Minnesota, 2015, v. 72, n. 6, p. 45
- By:
- Publication type:
- Article
Counseling Clients for #Digital Death.
- Published in:
- Journal of the Missouri Bar, 2015, v. 71, n. 3, p. 134
- By:
- Publication type:
- Article
A NEW AUTHENTICATION SCHEME FOR SIP REGISTRATION IN A MANET ENVIRONMENT.
- Published in:
- International Journal of Computer Science & Applications, 2015, v. 12, n. 1, p. 134
- By:
- Publication type:
- Article
Financial Fraud and Child Abuse.
- Published in:
- Reclaiming Children & Youth, 2014, v. 23, n. 2, p. 54
- By:
- Publication type:
- Article
Information Security: A Socio-technical Solution for Homeland Security Threats within Small to Medium Sized Enterprises (SMEs).
- Published in:
- Homeland Security Review, 2014, v. 8, n. 2, p. 1
- By:
- Publication type:
- Article
Penalties.
- Published in:
- Journal of Tax Practice & Procedure, 2014, v. 16, n. 3, p. 15
- By:
- Publication type:
- Article
An Efficient User Revocation and Encryption Methods for Secure Multi-Owner Data Sharing to Dynamic Groups in the Cloud.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 5, p. 825
- By:
- Publication type:
- Article
CONGRESSIONAL AGENDA.
- Published in:
- Journal of the CPA Practitioner, 2014, v. 6, n. 2, p. 6
- Publication type:
- Article
The New Outlaws: Cybercriminals.
- Published in:
- Tennessee Bar Journal, 2014, v. 50, n. 4, p. 30
- By:
- Publication type:
- Article
Medical identity theft: How to protect yourself.
- Published in:
- Journal of the American Dental Association (JADA), 2014, v. 145, n. 3, p. 308, doi. 10.1016/S0002-8177(14)60071-4
- Publication type:
- Article
ABO/Rh Testing, Antibody Screening, and Biometric Technology as Tools to Combat Insurance Fraud: An Example and Discussion.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
Look Out for Identity Scams.
- Published in:
- Phi Kappa Phi Forum, 2013, v. 93, n. 3, p. 23
- By:
- Publication type:
- Article
IDENTITY THEFT.
- Published in:
- Bench & Bar of Minnesota, 2013, v. 70, n. 7, p. 56
- By:
- Publication type:
- Article
INTERNATIONAL IDENTITY THEFT: HOW THE INTERNET REVOLUTIONIZED IDENTITY THEFT AND THE APPROACHES THE WORLD'S NATIONS ARE TAKING TO COMBAT IT.
- Published in:
- Florida Journal of International Law, 2013, v. 25, n. 2, p. 311
- By:
- Publication type:
- Article
IDENTITY CRISIS: SEEKING A UNIFIED APPROACH TO PLAINTIFF STANDING FOR DATA SECURITY BREACHES OF SENSITIVE PERSONAL INFORMATION.
- Published in:
- 2013
- By:
- Publication type:
- Opinion
The IRS's 'Dirty Dozen' Tax Scams.
- Published in:
- CPA Journal, 2013, v. 83, n. 6, p. 48
- By:
- Publication type:
- Article
50 ways to protect your identity in a digital age: New financial threats you need to know and how to avoid them (2nd ed.).
- Published in:
- 2013
- By:
- Publication type:
- Book Review
GET YOUR FACTAS STRAIGHT: THE APPLICATION OF FACTA'S TRUNCATION PROVISION TO ONLINE TRANSACTIONS.
- Published in:
- St. John's Law Review, 2012, v. 86, n. 4, p. 1011
- By:
- Publication type:
- Article
Shredding and Compliance.
- Published in:
- Journal of the CPA Practitioner, 2012, v. 4, n. 1, p. 8
- By:
- Publication type:
- Article
Chains and identity.
- Published in:
- Journal of Chain-computerisation, 2012, v. 3, p. 3
- By:
- Publication type:
- Article
Practical Guidelines for chain-computerisation.
- Published in:
- Journal of Chain-computerisation, 2012, v. 3, p. 3
- By:
- Publication type:
- Article
Health-Care Data Protection and Biometric Authentication Policies: Comparative Culture and Technology Acceptance in China and in the United States.
- Published in:
- Review of Policy Research, 2012, v. 29, n. 1, p. 141, doi. 10.1111/j.1541-1338.2011.00546.x
- By:
- Publication type:
- Article
Towards an Information Strategy for Combating Identity Fraud in the Public Domain: Cases from Healthcare and Criminal Justice.
- Published in:
- Electronic Journal of e-Government, 2011, v. 9, n. 2, p. 214
- By:
- Publication type:
- Article