Search Results - "Identity Thief"

  • Showing 1 - 2 results of 2
Refine Results
  1. 1

    Critical information security challenges: an appraisal by Shuhaib Mir, Mohammad, Wani , Sharyar, Ibrahim, Jamaludin

    Published 2013
    “…Leakage of such information can facilitate large-scale identity theft and successful impersonation of a victim lets the identity thief commit fraud. Identity theft occurs when someone uses another individual’s personal information to pose as that individual. …”
    Get full text
    Get full text
    Get full text
  2. 2

    Digital student ID card using NFC technology by Eng, Mun Shuen

    Published 2022
    “…It is important to protect the personal information data on the card from identity thief in this era of big data. Besides, traditional Identity Card management is inefficient. …”
    Get full text
    Get full text