Online identity theft, security issues, and reputational damage
Online identity-based theft is known to be one of the most serious and growing threats to victims, such as individuals and organizations, over the last 10 years due to the enormous economic damage these crimes have caused. The availability of personal information on the Internet has increased the ch...
| Main Authors: | Ahmad Zukarnain, Zuriati, Sinnathamby Sehgar, Sopna |
|---|---|
| Format: | Article |
| Published: |
MDPI AG
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/94427/ |
Similar Items
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Authentication securing methods for mobile identity: issues, solutions and challenges
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
The Shariah approach to criminalise identity theft
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014)
The Shari’ah approach to criminalise identity theft
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
Legal redress for identity theft in Malaysia : hope or hype?
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Fear of cyber-identity theft and related fraudulent activity
by: Roberts, Lynne, et al.
Published: (2013)
by: Roberts, Lynne, et al.
Published: (2013)
Theft prevention using wireless security system (WSS)
by: Ng, Chee Kyun, et al.
Published: (2008)
by: Ng, Chee Kyun, et al.
Published: (2008)
Anti-theft security system using face recognition
by: Chong, Guang Yu
Published: (2018)
by: Chong, Guang Yu
Published: (2018)
Privacy and identity theft recovery planning: An onion skin model
by: Alashoor, T., et al.
Published: (2016)
by: Alashoor, T., et al.
Published: (2016)
Damaged corporate reputation: Can celebrity Tweets repair it?
by: Van Norel, N., et al.
Published: (2014)
by: Van Norel, N., et al.
Published: (2014)
Factors affecting the increasing of online identity theft : a study in Kota Bharu Kelantan / Noor Ain Mohd Ariffin
by: Mohd Ariffin, Noor Ain
Published: (2012)
by: Mohd Ariffin, Noor Ain
Published: (2012)
Vehicular ad hoc networks and security issues: survey
by: Abdulkader, Zaid A., et al.
Published: (2017)
by: Abdulkader, Zaid A., et al.
Published: (2017)
A reputation-based routing protocol for wireless sensor networks
by: Adnan, Ali Idarous, et al.
Published: (2015)
by: Adnan, Ali Idarous, et al.
Published: (2015)
Evaluated reputation-based trust for WSN security
by: Said Alkalbani, Abdullah, et al.
Published: (2014)
by: Said Alkalbani, Abdullah, et al.
Published: (2014)
A survey on addressing iot security issues by embedding blockchain technology solutions: review, attacks, current trends, and applications
by: Huan, Nathalie Tan Yhe, et al.
Published: (2024)
by: Huan, Nathalie Tan Yhe, et al.
Published: (2024)
Investigation of medical identity theft in healthcare sector: its statistics, effects and way out.
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Identity theft: a legal study on phishing / Khadijah Ilyana Mahayudin…[et al.].
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
Theft prevention in brothers Mahallahs
by: Mohd. Israil, Khaliq Ahmad, et al.
Published: (2011)
by: Mohd. Israil, Khaliq Ahmad, et al.
Published: (2011)
Smart theft alarm with image
by: Ab Ghani, Mohammad Azuan, et al.
Published: (2021)
by: Ab Ghani, Mohammad Azuan, et al.
Published: (2021)
İnternet hırsızlığı=Internet theft
by: Kayadibi, Saim
Published: (2017)
by: Kayadibi, Saim
Published: (2017)
GRID anti-theft system
by: Neer Pandi, Rhuban
Published: (2012)
by: Neer Pandi, Rhuban
Published: (2012)
Portable anti-theft device
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
by: Johari Halim Shah, Nadira, et al.
Published: (2020)
Reputation ontology for reputation systems
by: Chang, Elizabeth, et al.
Published: (2006)
by: Chang, Elizabeth, et al.
Published: (2006)
Reputation ontology for reputation systems
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Addressing the threats of online theft of trade secret and cyber espionage in Malaysia: the legal landscape
by: Abd. Jalil, Juriah
Published: (2019)
by: Abd. Jalil, Juriah
Published: (2019)
The state of e-government security in Malaysia : reassessing the legal and regulatory framework on the threat of information theft
by: Zulhuda, Sonny
Published: (2012)
by: Zulhuda, Sonny
Published: (2012)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
An innovative reputation system for trustworthy and secure vehicle-to-vehicle communication
by: Almani, Dimah
Published: (2025)
by: Almani, Dimah
Published: (2025)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
Improved modified reputation-base trust for wireless sensor networks security
by: Alkalbani, Abdullah Said, et al.
Published: (2016)
by: Alkalbani, Abdullah Said, et al.
Published: (2016)
Anti theft design of car seat (mechanical)
by: Nurul Husna, Mohamad Shariff
Published: (2009)
by: Nurul Husna, Mohamad Shariff
Published: (2009)
Design And Development Of Library Anti-Theft System
by: Selvamani, Sathish Kumar, et al.
Published: (2016)
by: Selvamani, Sathish Kumar, et al.
Published: (2016)
Video surveillance: Item monitoring against theft
by: Chong, Yiing Sheah
Published: (2023)
by: Chong, Yiing Sheah
Published: (2023)
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
by: Zakhary, Sameh R., et al.
Published: (2010)
by: Zakhary, Sameh R., et al.
Published: (2010)
New consumer load prototype for electricity theft monitoring
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
Anti-theft car seat design (electronic/control)
by: Mahfuzah, Mohd Nasir
Published: (2009)
by: Mahfuzah, Mohd Nasir
Published: (2009)
Development of GSM-Based Vehicle Anti-Theft System
by: Hamid, Khairul Hamzani
Published: (2006)
by: Hamid, Khairul Hamzani
Published: (2006)
Wireless Control of Anti-Theft Solar Photovoltaic Module
by: Tan, Yin Shen
Published: (2017)
by: Tan, Yin Shen
Published: (2017)
The importance of reputation (online reviews and word of mouth) within Indian restaurants in the UK.
by: Kansara, Rima
Published: (2015)
by: Kansara, Rima
Published: (2015)
Similar Items
-
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015) -
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009) -
Authentication securing methods for mobile identity: issues, solutions and challenges
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022) -
The Shariah approach to criminalise identity theft
by: Mohamed, Sidi Mohamed Ould, et al.
Published: (2014) -
The Shari’ah approach to criminalise identity theft
by: Zulhuda, Sonny, et al.
Published: (2015)