Works matching DE "IDENTITY theft prevention"


Results: 100
    1

    Better Late Than Never.

    Published in:
    Government Technology, 2008, v. 21, n. 3, p. 48
    By:
    • Vander Veen, Chad
    Publication type:
    Article
    2

    Stopping Identity Theft.

    Published in:
    Journal of Consumer Affairs, 2004, v. 38, n. 2, p. 233, doi. 10.1111/j.1745-6606.2004.tb00866.x
    By:
    • Sovern, Jeff
    Publication type:
    Article
    3

    TRACEABLE IDENTITY-BASED GROUP SIGNATURE.

    Published in:
    RAIRO - Theoretical Informatics & Applications, 2016, v. 50, n. 3, p. 193, doi. 10.1051/ita/2016021
    By:
    • KE GU;
    • LIHAO YANG;
    • YONG WANG;
    • SHENG WEN
    Publication type:
    Article
    4
    5
    6
    7
    8
    9
    11
    12
    13
    14
    15
    16
    18
    19

    CONGRESSIONAL AGENDA.

    Published in:
    Journal of the CPA Practitioner, 2014, v. 6, n. 2, p. 6
    Publication type:
    Article
    20

    Shredding and Compliance.

    Published in:
    Journal of the CPA Practitioner, 2012, v. 4, n. 1, p. 8
    By:
    • D'Accordo, Armando
    Publication type:
    Article
    21
    22
    23

    TAX.

    Published in:
    Bench & Bar of Minnesota, 2015, v. 72, n. 6, p. 45
    By:
    • HOLCOMB, MORGAN
    Publication type:
    Article
    24

    IDENTITY THEFT.

    Published in:
    Bench & Bar of Minnesota, 2013, v. 70, n. 7, p. 56
    By:
    • Georgopoulos, Areti
    Publication type:
    Article
    25

    Red Flags Rule Summary.

    Published in:
    Journal: American Water Works Association, 2008, v. 100, n. 10, p. 37, doi. 10.1002/j.1551-8833.2008.tb09741.x
    By:
    • Holmes, Tommy
    Publication type:
    Article
    26
    27
    28
    29
    30

    ONE SIZE DOES NOT FIT ALL.

    Published in:
    Phi Kappa Phi Forum, 2018, v. 98, n. 3, p. 6
    By:
    • SILVA, DAVID J.;
    • HENAGER, ROBIN
    Publication type:
    Article
    31
    32
    33
    34
    35

    Rethinking digital identity.

    Published in:
    Journal of Payments Strategy & Systems, 2018, v. 12, n. 1, p. 40, doi. 10.69554/hgwp9250
    By:
    • Salmony, Michael
    Publication type:
    Article
    36

    Outsourcing Privacy.

    Published in:
    International Journal of Micrographics & Optical Technology, 2009, v. 27, n. 6, p. 5
    Publication type:
    Article
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50