Identity crime: The challenges in the regulation of identity crime
暂无分享,去创建一个
[1] Elizabeth Towell,et al. Investigating the future of Internet regulation , 1998, Internet Res..
[2] Computer-related Crime in Asia: Emergent Issues , 2005 .
[3] John Kane,et al. Differentiating identity theft: An exploratory study of victims using a national victimization survey☆ , 2010 .
[4] Jay Forder,et al. Electronic Commerce and the Law , 2003 .
[5] Steven J. Schwartz. Wearables in 2048 , 2001, CACM.
[6] Keith Jackson,et al. Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .
[7] Rodger Morrison. Commentary: Multi-Factor Identification and Authentication , 2007, Inf. Syst. Manag..
[8] K. Anderson. Who are the Victims of Identity Theft? The Effect of Demographics , 2006 .
[9] Jennifer Lynch. Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing Attacks , 2005 .
[10] Wim Vandenberghe,et al. Electronic Theft: Unlawful Acquisition In Cyberspace , 2004, Int. J. Law Inf. Technol..
[11] Jason Coppel. A Hard Look at the Effects Doctrine of Jurisdiction in Public International Law , 1993, Leiden Journal of International Law.
[12] Thomas M. Regan,et al. IDENTITY FRAUD: PROVIDING A SOLUTION , 2002 .
[13] Frank Stajano,et al. Understanding scam victims , 2011, Commun. ACM.
[14] K. M. Saunders,et al. Counteracting Identity Fraud in the Information Age: The Identitiy Theft and Assumption Deterrence Act , 1999 .
[15] T. Holt,et al. The Effect of Self-Control on Victimization in the Cyberworld , 2010 .
[16] Katherine J. Barker,et al. Credit card fraud: awareness and prevention , 2008 .