-
81
Forensic accounting and fraud examination /
Published c201“…The forensic accounting legal environment -- Fundamentals I : accounting information systems -- Fundamentals II : the auditing environment -- Fraud prevention and risk management -- Fraud detection -- The fraud investigation and engagement processes -- The evidence collection process -- Fraud examination evidence I : physical, documentary, and observational evidence -- Fraud examination evidence II : interview and interrogation methods -- Fraud examination evidence III : forensic science and computer forensics -- The fraud report, litigation, and the recovery process -- Employee, vendor, and other frauds against the organization -- Financial statement fraud -- Fraud and SOX compliance -- Tax fraud -- Bankruptcy, divorce, and identity theft -- Organized crime, counterterrorism, and anti-money laundering -- Business valuation -- Dispute resolution services.…”
-
82
IEEE Access Special Section Editorial: Information Security Solutions for Telemedicine Applications
Published 2018-01-01“…Further, medical identity theft is a growing and dangerous crime. Stolen personal information can have a negative financial impact, but stolen medical information cuts to the very core of personal privacy. …”
Get full text
Article -
83
On Using TPM for Secure Identities in Future Home Networks
Published 2011-01-01“…As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.…”
Get full text
Article -
84
Considérations sur la Nécessité d’introduction des Dates Biométriques dans les Documents de Voyage
Published 2009-06-01“…Identity theft has become a growth industry and organized crime threatens to trigger tradedisputes between countries of the world. …”
Get full text
Article -
85
Women and Money: Unique Issues — Protecting Your Assets
Published 2013-07-01“…This publication shares some common ways you can protect your assets by purchasing different types of insurance, being aware of identity theft or fraud, and monitoring your credit reports. …”
Get full text
Article -
86
INTERNET SECURITY – TECHNOLOGY AND SOCIAL AWARENESS OF THE DANGERS
Published 2017-06-01“…Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces the risk of data loss or identity theft. Public awareness of threats continues to grow, but there are also new, previously unknown threats; that is why it is so important to inform of the dangers by all available channels of communication.…”
Get full text
Article -
87
Women and Money: Unique Issues — Protecting Your Assets
Published 2013-07-01“…This publication shares some common ways you can protect your assets by purchasing different types of insurance, being aware of identity theft or fraud, and monitoring your credit reports. …”
Get full text
Article -
88
Women and Money: Unique Issues — Protecting Your Assets
Published 2013-07-01“…This publication shares some common ways you can protect your assets by purchasing different types of insurance, being aware of identity theft or fraud, and monitoring your credit reports. …”
Get full text
Article -
89
The assesment of the identification capabilities of features of the user interacts with a computer mouth
Published 2017-08-01“…This article discusses the problem of Identity Theft Protection from unauthorized access in computer system. …”
Get full text
Article -
90
Current and Ongoing Internet Crime Tendencies and Techniques. Preventive Legislation Measures in Romania
Published 2010-06-01“…Techniques as Auction Fraud, Counterfeit Cashier's Check, Credit Card Fraud, Debt Elimination, Parcel Courier Email Scheme, Employment/Business Opportunities,Escrow Services Fraud, Identity Theft, Internet Extortion, Investment Fraud, Lotteries, Nigerian Letter or "419", Phishing/Spoofing, Ponzi/Pyramid, Reshipping, Spam, Third Party Receiver of Funds are clarified in this paper and, also the internet crime prevention and legislative measures are treated, too.…”
Get full text
Article -
91
Home Address Exemptions are the Wrong Approach in Protecting Privacy
Published 2022-12-01“…Instead of restricting valuable information, policy makers should focus their efforts on the actual harmful acts intended to be addressed, such as identity theft, doxing, harassment and assault. …”
Get full text
Article -
92
Virtual Offenses: Role of Demographic Factors and Personality Traits
Published 2020-03-01“…A number of positive and negative trends are becoming more prevalent, along with the widespread use of information and communication technologies in everyday life—negative ones being virtual offences such as stalking, bullying, identity theft, scamming and abuse or harassment. The article discusses the relations between demographic factors, the occurrence of virtual offenses and personality traits. …”
Get full text
Article -
93
SOCIAL ENGINEERING AS AN EVOLUTIONARY THREAT TO INFORMATION SECURITY IN HEALTHCARE ORGANIZATIONS
Published 2020-04-01“…The hospital data system includes administrative data, as well as employees’ personal information hacked, which can cause identity theft. The current paper discusses types and sources of social engineering attacks in healthcare organizations. …”
Get full text
Article -
94
Cyberstalking victimization
Published 2013-01-01“…The most common forms of virtual communications’ abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. …”
Get full text
Article -
95
Secure privacy-preserving record linkage system from re-identification attack.
Published 2025-01-01“…These attacks compromise privacy and pose significant risks, such as identity theft and financial fraud. This study proposes a zero-relationship encoding scheme that minimizes the linkage between source and encoded records to enhance PPRL systems' resistance to re-identification attacks. …”
Get full text
Article -
96
Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System
Published 2011-08-01“…The recent years have seen a rise in the number of cases of cyber-crime committed through identity theft and fraud. To address this problem, this paper uses adaptive neural-fuzzy inference system, fuzzy logic and artificial neural network to implement a multifactor authentication system through a technique of information fusion. …”
Get full text
Article -
97
Sharenting – skala i wielowymiarowość zjawiska (nierozważnego) ujawniania przez rodziców informacji o dzieciach w mediach społecznościowych
Published 2018-12-01“…Its different types were discussed and its chosen legal, ethical and social aspects were characterized. The risks (i.e. identity theft and exposing children to cyberviolence) and rewards (i.e. sharing the experience, seeking and providing support) of such parents’ activity in the Internet were presented as well. …”
Get full text
Article -
98
THE IMPORTANCE OF CYBERSECURITY AWARENESS FOR CHILDREN
Published 2022-06-01“…Programs should educate children on how to avoid risky behaviors online, including interactions susceptible to phishing, exposure to inappropriate content such as pornography, cyberbullying, identity theft, and privacy breaches. Additionally, children must learn the importance of keeping their passwords secure and private and adopting a cautious approach while playing online games. …”
Get full text
Article -
99
Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review
Published 2016-09-01“…The research results show that the potential threats are mostly social threats and identity theft.…”
Get full text
Article -
100
Retrospective IP Address Geolocation for Geography-Aware Internet Services
Published 2021-07-01“…The second deals with identity theft prevention in e-commerce.…”
Get full text
Article