-
1
-
2
-
3
Identity theft: Forms, characteristics, and distribution
Published 2017-01-01Subjects: Get full text
Article -
4
Identity theft handbook : detection, prevention, and security /
Published 2009Subjects: “…Identity theft…”
-
5
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
6
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
7
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
8
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
9
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
10
Threats of identity theft in cyberspace - case study
Published 2020-06-01Subjects: Get full text
Article -
11
-
12
Medical Identity Theft in the Emergency Department: Awareness is Crucial
Published 2014-11-01“…Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. …”
Get full text
Article -
13
Online identity theft, security issues, and reputational damage
Published 2021“…The aim of this research is to evaluate the need for a reformulation of the concept of identity theft in order to be compatible with the evolution of behaviors and fraud.…”
Article -
14
Phishing and countermeasures : understanding the increasing problem of electronic identity theft /
Published 2007Subjects: -
15
DATA SECURITY - IDENTITY THEFT: BANKS AND FINANCIAL INSTITUTIONS ARE ON THE LOOKOUT
Published 2006-01-01Get full text
Article -
16
-
17
Credit card fraud and identity theft: a case study in Malaysia
Published 2018“…The crimes related to credit card and identity theft of late is increasing drastically. Credit card theft varies in terms of techniques and methods used and it’s crucially important to review and improvise the existing prevention method to reduce the number of crimes related to credit card and identity theft. …”
Article -
18
Behaver - Behavioural Patterns Verification for Prevention of Physical Penetration Using Identity Theft
Published 2018-06-01Subjects: Get full text
Article -
19
Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.
Published 2014“…Therefore, medical identity theft (MIDT) in healthcare needs to be investigated. …”
Get full text
Proceeding Paper -
20
Identity theft: a legal study on phishing / Khadijah Ilyana Mahayudin…[et al.].
Published 2009Get full text
Student Project