Credit and Identity Theft
暂无分享,去创建一个
[1] Richard D. Porter,et al. Estimating the Worldwide Volume of Counterfeit U.S. Currency: Data and Extrapolation , 2003 .
[2] R. Posner. The Federal Trade Commission , 1969 .
[3] Exclusion and Moral Hazard: The Case of Identical Demand , 1993 .
[4] Harry J. Paarsch,et al. Money and Dynamic Credit Arrangements with Private Information , 2000, J. Econ. Theory.
[5] Daniel J. Solove,et al. Identity Theft, Privacy, and the Architecture of Vulnerability , 2003 .
[6] Will the new $100 bill decrease counterfeiting? , 1996 .
[7] B. Taub. Currency and Credit Are Equivalent Mechanisms , 1994 .
[8] Ricardo de O. Cavalcanti,et al. A Model of Private Bank-Note Issue , 1999 .
[9] William Roberds,et al. A Theory of Transactions Privacy , 2000 .
[10] Ping He,et al. Money and Banking in Search Equilibrium , 2005 .
[11] N. Kocherlakota. Money is memory , 1998 .
[12] Lynn M. LoPucki. Did Privacy Cause Identity Theft? , 2003 .
[13] Warren E. Weber,et al. or the Federal Reserve System. , 2022 .
[14] Peter Burns,et al. Fraud Management in the Credit Card Industry , 2002 .
[15] H. Varian. Markets for information goods , 1998 .
[16] Luis Araujo. Social Norms and Money , 2003 .
[17] Stephen D. Williamson,et al. Private Money and Counterfeiting , 2002 .
[18] Shouyong Shi,et al. A Divisible Search Model of Fiat Money , 1997 .
[19] BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM , 2000 .
[20] Lynn M. LoPucki,et al. Human Identification Theory and the Identity Theft Problem , 2001 .
[21] N. Kiyotaki,et al. Production and consumption , 2013 .
[22] Klaus Kultti. A monetary economy with counterfeiting , 1996 .
[23] Dean Corbae,et al. Decentralized credit and monetary exchange without public record keeping , 2004 .
[24] Richard Schmalensee,et al. Paying with Plastic: The Digital Revolution in Buying and Borrowing , 1999 .
[25] Narayana R. Kocherlakota,et al. Incomplete Record-Keeping and Optimal Payment Arrangements , 1998 .
[26] R. Townsend. Currency and Credit in a Private Information Economy , 1989, Journal of Political Economy.
[27] Roger Clarke,et al. Human Identification in Information Systems , 1994 .
[28] Ed Nosal,et al. A Model of (the Threat of) Counterfeiting , 2007 .
[29] William Roberds,et al. WORKING PAPER SERIESFEDERAL RESERVE BANK of ATLANTA WORKING PAPER SERIES Money Is Privacy , 2004 .