An Identity Fraud Model Categorising Perpetrators, Channels, Methods of Attack, Victims and Organisational Impacts
暂无分享,去创建一个
Rodger Jamieson | Gregory Stephens | Donald Winchester | D. Winchester | Greg Stephens | R. Jamieson
[1] David Lacey,et al. The role of organizations in identity theft response: the organization-individual victim dynamic , 2004 .
[2] Gurpreet Dhillon,et al. Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..
[3] Kenneth J. Stevens,et al. A Model of E-Fraud , 2003, PACIS.
[4] Wenjie Wang,et al. A contextual framework for combating identity theft , 2006, IEEE Security & Privacy.
[5] Lucian Vasiu,et al. A conceptual framework of e-fraud control in an integrated supply chain , 2004, ECIS.
[6] Rodger Jamieson,et al. Development of a Conceptual Framework for Managing Identity Fraud , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[7] F. H. Mcclintock,et al. Crime in England and Wales , 1969 .
[8] Homa Atabakhsh,et al. Criminal Identity Deception and Deception Detection in Law Enforcement , 2004 .
[9] K. Calavita,et al. SAVINGS AND LOAN FRAUD AS ORGANIZED CRIME: TOWARD A CONCEPTUAL TYPOLOGY OF CORPORATE ILLEGALITY* , 1993 .
[10] Kate Smith-Miles,et al. A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.
[11] W. K. Wilhelm,et al. The Fraud Management Lifecycle Theory: A Holistic Approach to Fraud Management. , 2004 .
[12] G. Dowling,et al. Corporate reputation and sustained superior financial performance , 2002 .
[13] Russell Dean Vines,et al. Phishing: Cutting the Identity Theft Line , 2005 .
[14] D. Parker. Crime by computer , 1976 .
[15] David Lacey,et al. Identity fraud in Australia: an evaluation of its nature, cost and extent , 2003 .
[16] Peter Stephenson,et al. Investigating Computer-Related Crime , 1999 .
[17] Gurpreet Dhillon,et al. Refereed Papers: Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns , 2001 .