-
1
-
2
-
3
Identity theft: Forms, characteristics, and distribution
Published 2017-01-01Subjects: Get full text
Article -
4
Identity theft handbook : detection, prevention, and security /
Published 2009Subjects: “…Identity theft…”
-
5
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
6
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
7
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
8
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
9
Identity Theft: The Importance of Prosecuting on Behalf of Victims
Published 2024-11-01Subjects: Get full text
Article -
10
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
11
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
12
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
13
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
14
-
15
Online identity theft, security issues, and reputational damage
Published 2021“…The aim of this research is to evaluate the need for a reformulation of the concept of identity theft in order to be compatible with the evolution of behaviors and fraud.…”
Article -
16
Phishing and countermeasures : understanding the increasing problem of electronic identity theft /
Published 2007Subjects: -
17
Polish Personal Identity Card as a Tool for Identity Theft
Published 2015-06-01“…The new document contains less information about the owner, i.e. height, eye color or signature, so that the risk of identity theft is significantly greater. …”
Get full text
Article -
18
-
19
Identity theft escalation – you may need to change your life
Published 2005-12-01Get full text
Article -
20
Behaver - Behavioural Patterns Verification for Prevention of Physical Penetration Using Identity Theft
Published 2018-06-01Subjects: Get full text
Article