Cyber Identity Theft
| Main Author: | Roberts, Lynne |
|---|---|
| Other Authors: | Luppicini |
| Format: | Book Chapter |
| Published: |
Information Science Reference
2009
|
| Online Access: | http://hdl.handle.net/20.500.11937/31353 |
Similar Items
Fear of cyber-identity theft and related fraudulent activity
by: Roberts, Lynne, et al.
Published: (2013)
by: Roberts, Lynne, et al.
Published: (2013)
The Shariah approach to criminalise identity theft
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
The Shari’ah approach to criminalise identity theft
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Jurisdictional and definitional issues of cyber-stalking
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Addressing the threats of online theft of trade secret and cyber espionage in Malaysia: the legal landscape
by: Abd. Jalil, Juriah
Published: (2019)
by: Abd. Jalil, Juriah
Published: (2019)
Legal redress for identity theft in Malaysia : hope or hype?
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Online identity theft, security issues, and reputational damage
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
Cyber-Victimisation in Australia: Extent, Impact on Individuals and Responses
by: Roberts, Lynne
Published: (2008)
by: Roberts, Lynne
Published: (2008)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Privacy and identity theft recovery planning: An onion skin model
by: Alashoor, T., et al.
Published: (2016)
by: Alashoor, T., et al.
Published: (2016)
Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An Analysis on Cyber Stalking.
by: Roberts, Lynne
Published: (2008)
by: Roberts, Lynne
Published: (2008)
Identity theft: a legal study on phishing / Khadijah Ilyana Mahayudin…[et al.].
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
İnternet hırsızlığı=Internet theft
by: Kayadibi, Saim
Published: (2017)
by: Kayadibi, Saim
Published: (2017)
Theft prevention in brothers Mahallahs
by: Mohd. Israil, Khaliq Ahmad, et al.
Published: (2011)
by: Mohd. Israil, Khaliq Ahmad, et al.
Published: (2011)
GRID anti-theft system
by: Neer Pandi, Rhuban
Published: (2012)
by: Neer Pandi, Rhuban
Published: (2012)
Portable anti-theft device
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
Smart theft alarm with image
by: Ab Ghani, Mohammad Azuan, et al.
Published: (2021)
by: Ab Ghani, Mohammad Azuan, et al.
Published: (2021)
Factors affecting the increasing of online identity theft : a study in Kota Bharu Kelantan / Noor Ain Mohd Ariffin
by: Mohd Ariffin, Noor Ain
Published: (2012)
by: Mohd Ariffin, Noor Ain
Published: (2012)
Anti theft design of car seat (mechanical)
by: Nurul Husna, Mohamad Shariff
Published: (2009)
by: Nurul Husna, Mohamad Shariff
Published: (2009)
Design And Development Of Library Anti-Theft System
by: Selvamani, Sathish Kumar, et al.
Published: (2016)
by: Selvamani, Sathish Kumar, et al.
Published: (2016)
Video surveillance: Item monitoring against theft
by: Chong, Yiing Sheah
Published: (2023)
by: Chong, Yiing Sheah
Published: (2023)
Anti-theft car seat design (electronic/control)
by: Mahfuzah, Mohd Nasir
Published: (2009)
by: Mahfuzah, Mohd Nasir
Published: (2009)
New consumer load prototype for electricity theft monitoring
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
Development of GSM-Based Vehicle Anti-Theft System
by: Hamid, Khairul Hamzani
Published: (2006)
by: Hamid, Khairul Hamzani
Published: (2006)
Theft prevention using wireless security system (WSS)
by: Ng, Chee Kyun, et al.
Published: (2008)
by: Ng, Chee Kyun, et al.
Published: (2008)
Wireless Control of Anti-Theft Solar Photovoltaic Module
by: Tan, Yin Shen
Published: (2017)
by: Tan, Yin Shen
Published: (2017)
Anti-theft security system using face recognition
by: Chong, Guang Yu
Published: (2018)
by: Chong, Guang Yu
Published: (2018)
Identity theft: MyKad / Sheza Lina Mohd Salleh-Hud-Din, Yasmin Natasha Muhammad Khairy Nunis and Azianiziani Abdullah
by: Mohd Salleh-Hud-Din, Sheza Lina, et al.
Published: (2008)
by: Mohd Salleh-Hud-Din, Sheza Lina, et al.
Published: (2008)
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
Consumer load prediction based on NARX for electricity theft detection
by: Isqeel, Abdullateef Ayodele, et al.
Published: (2016)
by: Isqeel, Abdullateef Ayodele, et al.
Published: (2016)
Restorative justice as an alternative criminal dispute resolution for the offence of theft
by: Ab Aziz, Norjihan, et al.
Published: (2017)
by: Ab Aziz, Norjihan, et al.
Published: (2017)
Restorative justice as an alternative criminal dispute resolution for the offence of theft
by: Ab Aziz, Norjihan, et al.
Published: (2017)
by: Ab Aziz, Norjihan, et al.
Published: (2017)
Restorative justice as an alternative criminal dispute resolution for the offence of theft
by: Ab Aziz, Norjihan, et al.
Published: (2017)
by: Ab Aziz, Norjihan, et al.
Published: (2017)
Islamic provision of theft and mutiny: an analysis of Muslim modernists' approach
by: Md. Ibrasma, Habeeb Rahman
Published: (2011)
by: Md. Ibrasma, Habeeb Rahman
Published: (2011)
Automotive anti-theft system using fuzzy logic method
by: Kahtan, Hasan, et al.
Published: (2017)
by: Kahtan, Hasan, et al.
Published: (2017)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022)
by: Lee, Yvonne Yi Jin
Published: (2022)
Professional and interprofessional identities: a scoping review
by: Tong, R., et al.
Published: (2020)
by: Tong, R., et al.
Published: (2020)
Conducting ethical research online: respect for individuals, identities, and the ownership of words
by: Roberts, Lynne, et al.
Published: (2008)
by: Roberts, Lynne, et al.
Published: (2008)
Similar Items
-
Fear of cyber-identity theft and related fraudulent activity
by: Roberts, Lynne, et al.
Published: (2013) -
The Shariah approach to criminalise identity theft
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014) -
The Shari’ah approach to criminalise identity theft
by: Zulhuda, Sonny, et al.
Published: (2015) -
Jurisdictional and definitional issues of cyber-stalking
by: Roberts, Lynne
Published: (2009) -
Addressing the threats of online theft of trade secret and cyber espionage in Malaysia: the legal landscape
by: Abd. Jalil, Juriah
Published: (2019)