Works matching DE "INTERNET fraud prevention"
Results: 29
Using financial intelligence to target online fraud victimisation: applying a tertiary prevention perspective.
- Published in:
- Criminal Justice Studies, 2016, v. 29, n. 2, p. 125, doi. 10.1080/1478601X.2016.1170278
- By:
- Publication type:
- Article
"There's No App for That": Calibrating Cybersecurity Safeguards and Disclosures.
- Published in:
- Business Lawyer, 2012, v. 68, n. 1, p. 183
- By:
- Publication type:
- Article
Keeping Your Identity Safe Online – Wi-Fi Hotspots.
- Published in:
- National Institute of Justice Journal, 2011, n. 268, p. 40
- Publication type:
- Article
Cyber Risks: Evolving Threats, Emerging Coverages, and Ensuing Case Law.
- Published in:
- Penn State Law Review, 2018, v. 122, n. 3, p. 727
- By:
- Publication type:
- Article
THE ROLE OF ONLINE TRADING COMMUNITIES IN MANAGING INTERNET AUCTION FRAUD.
- Published in:
- MIS Quarterly, 2007, v. 31, n. 4, p. 759, doi. 10.2307/25148819
- By:
- Publication type:
- Article
ONLINE & ELECTRONIC FRAUD PREVENTION & SAFETY TIPS COGNIZANCE IN SOUTH AFRICAN BANKS.
- Published in:
- Socioeconomica, 2015, v. 4, n. 8, p. 527, doi. 10.12803/SJSECO.48131
- By:
- Publication type:
- Article
Solving identity delegation problem in the e-government environment.
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 6, p. 351, doi. 10.1007/s10207-011-0140-7
- By:
- Publication type:
- Article
A Fake Content Remove Scheme using Binomial Distribution Characteristics of Collective Intelligence in Peer-to-Peer Environment.
- Published in:
- IETE Journal of Research, 2011, v. 57, n. 5, p. 423, doi. 10.4103/0377-2063.90151
- By:
- Publication type:
- Article
Fraud detections for online businesses: a perspective from blockchain technology.
- Published in:
- Financial Innovation, 2016, v. 2, n. 1, p. 1, doi. 10.1186/s40854-016-0039-4
- By:
- Publication type:
- Article
CHALLENGES OF MANAGING E-COMMERCE.
- Published in:
- Economics, Management & Financial Markets, 2011, v. 6, n. 2, p. 194
- By:
- Publication type:
- Article
Enhancing Cybersecurity Awareness Training: A Comprehensive Phishing Exercise Approach.
- Published in:
- International Management Review, 2018, v. 14, n. 2, p. 5
- By:
- Publication type:
- Article
Fake-Website Detection Tools: Identifying Elements that Promote Individuals' Use and Enhance Their Performance.
- Published in:
- Journal of the Association for Information Systems, 2015, v. 16, n. 6, p. 448
- By:
- Publication type:
- Article
CYBERSECURITY IN CS DEGREES.
- Published in:
- ITNOW, 2016, v. 58, n. 2, p. 56, doi. 10.1093/itnow/bww053
- Publication type:
- Article
HOW SECURE ARE MOBILE PAYMENT SERVICES?
- Published in:
- ITNOW, 2016, v. 58, n. 2, p. 34, doi. 10.1093/itnow/bww045
- By:
- Publication type:
- Article
THE COUNTDOWN IS ON.
- Published in:
- ITNOW, 2016, v. 58, n. 2, p. 30, doi. 10.1093/itnow/bww043
- By:
- Publication type:
- Article
THE UNWITTING INSIDER.
- Published in:
- ITNOW, 2016, v. 58, n. 2, p. 28, doi. 10.1093/itnow/bww042
- By:
- Publication type:
- Article
IS SOCIAL ENGINEERING THE EASY WAY IN?
- Published in:
- ITNOW, 2016, v. 58, n. 2, p. 24, doi. 10.1093/itnow/bww040
- By:
- Publication type:
- Article
SECURITY CONSCIOUS.
- Published in:
- ITNOW, 2015, v. 57, n. 2, p. 30, doi. 10.1093/itnow/bwv041
- Publication type:
- Article
Securing Digital Transactions.
- Published in:
- ITNOW, 2015, v. 57, n. 1, p. 38, doi. 10.1093/itnow/bwv016
- By:
- Publication type:
- Article
Keys Don't Grow in Threes.
- Published in:
- IEEE Internet Computing, 2009, v. 13, n. 3, p. 96, doi. 10.1109/MIC.2009.64
- By:
- Publication type:
- Article
Fighting Phishing with Discriminative Keypoint Features.
- Published in:
- IEEE Internet Computing, 2009, v. 13, n. 3, p. 56, doi. 10.1109/MIC.2009.59
- By:
- Publication type:
- Article
Entropy with Local Binary Patterns for Efficient Iris Liveness Detection.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 3, p. 2331, doi. 10.1007/s11277-017-5089-z
- By:
- Publication type:
- Article
US agencies policing Internet for health care fraud.
- Published in:
- Canadian Medical Association Journal (CMAJ), 2001, v. 165, n. 8, p. 1083
- By:
- Publication type:
- Article
Canada's New Anti-Spam and Online Fraud Act: FAQs Regarding its Impact on Veterinarians.
- Published in:
- 2014
- Publication type:
- Question & Answer
Fingerprint Spoof Detection Using Gradient Co-occurrence Matrix.
- Published in:
- Engineering Letters, 2017, v. 25, n. 4, p. 360
- By:
- Publication type:
- Article
Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information.
- Published in:
- Journal of Management Information Systems, 2015, v. 31, n. 4, p. 109, doi. 10.1080/07421222.2014.1001260
- By:
- Publication type:
- Article
Reasonably Suspicious: Avoiding Targeted Email Scams.
- Published in:
- Utah Bar Journal, 2018, v. 31, n. 4, p. 37
- By:
- Publication type:
- Article
WRITTEN TESTIMONY OF MR. ROBERT CHESNUT, SENIOR VICE PRESIDENT, RULES, TRUST AND SAFETY, EBAY INC., BEFORE THE HOUSE SUBCOMMITTEE ON CRIME, TERRORISM AND HOMELAND SECURITY, HEARING ON "ORGANIZED RETAIL THEFT PREVENTION: FOSTERING A COMPREHENSIVE PUBLIC-PRIVATE RESPONSE"
- Published in:
- Journal of Current Issues in Crime, Law & Law Enforcement, 2012, v. 5, n. 3, p. 219
- Publication type:
- Article
AARP launches campaign to root out social media scams.
- Published in:
- Journal on Active Aging, 2017, v. 16, n. 6, p. 14
- Publication type:
- Article