Works matching False personation
Results: 103
FALSE PERSONATION.
- Published in:
- Journal of the American Institute of Criminal Law & Criminology, 1916, v. 7, n. 3, p. 436
- Publication type:
- Article
Student and Non-Student Perceptions and Awareness of Identity Theft.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2008, v. 50, n. 2, p. 153, doi. 10.3138/cjccj.50.2.153
- By:
- Publication type:
- Article
Identity Theft: Laws, Crimes, and Victims.
- Published in:
- Journal of Consumer Affairs, 2004, v. 38, n. 2, p. 201, doi. 10.1111/j.1745-6606.2004.tb00863.x
- By:
- Publication type:
- Article
A Study on Electronic-Money Technology Using Near Field Communication.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 1, p. 1, doi. 10.3390/sym7010001
- By:
- Publication type:
- Article
Physician Medical Identity Theft.
- Published in:
- 2012
- By:
- Publication type:
- Opinion
Examining Identity Theft: Empirical Explorations of the Offense and the Offender.
- Published in:
- Victims & Offenders, 2009, v. 4, n. 4, p. 357, doi. 10.1080/15564880903260603
- By:
- Publication type:
- Article
"CATFISHING": A COMPARATIVE ANALYSIS OF U.S. V. CANADIAN CATFISHING LAWS & THEIR LIMITATIONS.
- Published in:
- Southern Illinois University Law Journal, 2019, v. 44, n. 1, p. 75
- By:
- Publication type:
- Article
Women charged for hospital thefts.
- Published in:
- Lamp, 2008, v. 65, n. 8, p. 13
- Publication type:
- Article
Identity Manipulation in Cyberspace as a Leisure Option: Play and the Exploration of Self.
- Published in:
- Information & Communications Technology Law, 2005, v. 14, n. 2, p. 115, doi. 10.1080/13600830500042632
- By:
- Publication type:
- Article
"Ain't Got Enough Money to Pay Me Respect": Blackfishing, Cultural Appropriation, and the Commodification of Blackness.
- Published in:
- Cultural Studies/Critical Methodologies, 2021, v. 21, n. 5, p. 359, doi. 10.1177/15327086211029357
- By:
- Publication type:
- Article
Preventing Digital Disasters.
- Published in:
- CPA Journal, 2004, v. 74, n. 10, p. 11
- By:
- Publication type:
- Article
Outsourcing by CPAs: Are We a Business of a Profession?
- Published in:
- CPA Journal, 2004, v. 74, n. 5, p. 6
- By:
- Publication type:
- Article
Online Identity Theft and Business.
- Published in:
- CPA Journal, 2004, v. 74, n. 4, p. 50
- By:
- Publication type:
- Article
Identity Theft: It Can Happen to You.
- Published in:
- CPA Journal, 2004, v. 74, n. 4, p. 42
- By:
- Publication type:
- Article
Beyond Capital High: On Dual Citizenship and the Strange Career of “Acting White”.
- Published in:
- Anthropology & Education Quarterly, 2008, v. 39, n. 3, p. 227, doi. 10.1111/j.1548-1492.2008.00019.x
- By:
- Publication type:
- Article
La usurpación de la identidad con fines paródicos en la red social Twitter: ¿manifestaciones de descortesía verbal?
- Published in:
- RILCE. Revista de Filología Hispánica, 2017, v. 33, n. 2, p. 537, doi. 10.15581/008.33.2.537-65
- By:
- Publication type:
- Article
Securing E-Mail with Identity-Based Encryption.
- Published in:
- IT Professional, 2005, v. 7, n. 3, p. 64, doi. 10.1109/MITP.2005.70
- By:
- Publication type:
- Article
CHINA'S NATIONAL RESIDENT IDENTITY CARD: IDENTITY AND POPULATION MANAGEMENT IN TRANSITION.
- Published in:
- UCLA Pacific Basin Law Journal, 2006, v. 23, n. 2, p. 212, doi. 10.5070/p8232022183
- By:
- Publication type:
- Article
Human Identification Theory and the Identity Theft Problem.
- Published in:
- Texas Law Review, 2001, v. 80, n. 1, p. 89
- By:
- Publication type:
- Article
Combating ID Theft: The Identity Theft Red Flags Rule.
- Published in:
- Podiatry Management, 2009, v. 28, n. 5, p. 55
- By:
- Publication type:
- Article
A New Breed of Identity Theft.
- Published in:
- Podiatry Management, 2007, v. 26, n. 9, p. 279
- By:
- Publication type:
- Article
America's Fastest Growing Crime.
- Published in:
- Podiatry Management, 2006, v. 25, n. 6, p. 171
- By:
- Publication type:
- Article
An empirical study of authentication methods to secure e-learning system activities against impersonation fraud.
- Published in:
- Online Journal of Applied Knowledge Management, 2016, v. 4, n. 1, p. 42, doi. 10.36965/ojakm.2016.4(1)42-61
- By:
- Publication type:
- Article
IDENTITY BURGLARY.
- Published in:
- Texas Review of Law & Politics, 2009, v. 13, n. 2, p. 401
- By:
- Publication type:
- Article
UNKNOWING THIEVES: REFORMING THE LEGAL LINK BETWEEN IMMIGRATION AND IDENTITY THEFT.
- Published in:
- Rutgers Law Journal, 2009, v. 41, n. 1/2, p. 403
- By:
- Publication type:
- Article
Identification Cards in America.
- Published in:
- Society, 1999, v. 36, n. 5, p. 70, doi. 10.1007/BF02686155
- By:
- Publication type:
- Article
Editor's Introduction.
- Published in:
- Social Research, 2008, v. 75, n. 4, p. 1035
- By:
- Publication type:
- Article
IDENTITY CRISIS.
- Published in:
- Government Technology, 2007, v. 20, n. 6, p. 20
- By:
- Publication type:
- Article
DELIMITĂRI DINTRE INFRACŢIUNILE DE ÎNŞELĂCIUNE ŞI ABUZ ÎN SERVICIU CONTRA INTERESELOR PERSOANELOR.
- Published in:
- Dreptul, 2011, n. 12, p. 231
- By:
- Publication type:
- Article
Identity Mistakes: A Missed Opportunity?
- Published in:
- Modern Law Review, 2004, v. 67, n. 6, p. 993, doi. 10.1111/j.1468-2230.2004.520_2.x
- By:
- Publication type:
- Article
What your firm should know about identity theft.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2004, v. 15, n. 4, p. 3, doi. 10.1002/jcaf.20016
- By:
- Publication type:
- Article
Location-Based Marketing, Regulation of Home-Share Platforms, and Other Developments in Section 230 Immunity.
- Published in:
- Business Lawyer, 2019, v. 75, n. 1, p. 1667
- By:
- Publication type:
- Article
Can I See Your I.D.?: True Stories of False Identities.
- Published in:
- 2011
- By:
- Publication type:
- Book Review
THE DARK SIDE OF SOCIAL MEDIA ROMANCE: CIVIL RECOURSE FOR CATFISH VICTIMS.
- Published in:
- Loyola of Los Angeles Law Review, 2019, v. 50, n. 4, p. 741
- By:
- Publication type:
- Article
WHO ARE WE?: THE QUEST FOR IDENTITY IN LAW.
- Published in:
- Dalhousie Law Journal, 2015, v. 38, n. 2, p. 311
- By:
- Publication type:
- Article
The Heartbleed bug: Insecurity repackaged, rebranded and resold.
- Published in:
- Crime, Media, Culture, 2015, v. 11, n. 3, p. 259, doi. 10.1177/1741659015592792
- By:
- Publication type:
- Article
IDENTITY THEFT: MAKING THE KNOWN UNKNOWNS KNOWN.
- Published in:
- Harvard Journal of Law & Technology, 2007, v. 21, n. 1, p. 97
- By:
- Publication type:
- Article
Defamation or Impersonation? Working Towards a Legislative Remedy for Deepfake Election Misinformation.
- Published in:
- William & Mary Law Review, 2024, v. 66, n. 1, p. 251
- By:
- Publication type:
- Article
Fair and Accurate Credit Transactions Act Now Law.
- Published in:
- Journal of Property Management, 2004, v. 69, n. 2, p. 6
- By:
- Publication type:
- Article
ELAKA: Energy-Efficient and Lightweight Multi-Server Authentication and Key Agreement Protocol Based on Dynamic Biometrics.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 3, p. 767, doi. 10.1007/s11277-018-5348-7
- By:
- Publication type:
- Article
Consumers Blind to ID Theft Risk.
- Published in:
- Internal Auditor, 2005, v. 62, n. 5, p. 19
- By:
- Publication type:
- Article
La falsification d'identité en France, du règne personnel de Louis XIV à la veille de la Révolution.
- Published in:
- French Historical Studies, 2016, v. 39, n. 3, p. 471, doi. 10.1215/00161071-3500285
- By:
- Publication type:
- Article
Identity Theft and Bankruptcy Expungement.
- Published in:
- American Bankruptcy Law Journal, 2003, v. 77, n. 4, p. 409
- By:
- Publication type:
- Article
IDENTITY THEFT STATUTES: WHICH WILL PROTECT AMERICANS THE MOST?
- Published in:
- Albany Law Review, 2004, v. 67, n. 4, p. 1137
- By:
- Publication type:
- Article
Letter to the editor.
- Published in:
- 2009
- Publication type:
- Letter
Is identity theft really theft?
- Published in:
- International Review of Law, Computers & Technology, 2009, v. 23, n. 1/2, p. 77, doi. 10.1080/13600860902742596
- By:
- Publication type:
- Article
Counteracting Identity Fraud in the Information Age: The Identity Theft and Assumption Deterrence Act.
- Published in:
- International Review of Law, Computers & Technology, 1999, v. 13, n. 2, p. 183, doi. 10.1080/13600869955134
- By:
- Publication type:
- Article
An exploratory study of police impersonation crimes: Confrontational offenders and offenses.
- Published in:
- Revista Logos Ciencia & Tecnologia, 2023, v. 15, n. 2, p. 70, doi. 10.22335/rlct.v15i2.1721
- By:
- Publication type:
- Article
Authenticated key exchange with synchronized state.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2373, doi. 10.1002/sec.948
- By:
- Publication type:
- Article
Fraud and Freedom: Gender, Identity and Narratives of Deception among the Female Convicts in Colonial America.
- Published in:
- 2011
- By:
- Publication type:
- Case Study