-
1
-
-
34250636150
-
The body does not lie: Identity, risk and trust in technoculture
-
K. F. Aas. 'the body does not lie': Identity, risk and trust in technoculture. Crime Media Culture, 2(2):143-158, 2006.
-
(2006)
Crime Media Culture
, vol.2
, Issue.2
, pp. 143-158
-
-
Aas, K.F.1
-
4
-
-
78649843356
-
Standardisation of definitions of identity crime terms: A step towards consistency
-
ACPR March
-
ACPR. Standardisation of definitions of identity crime terms: A step towards consistency. Technical Report 145.3, Australasian Centre for Policing Research, March 2006.
-
(2006)
Technical Report 145.3, Australasian Centre for Policing Research
-
-
-
5
-
-
2442560611
-
A critique of using grounded theory as a research method
-
G. Allan. A critique of using grounded theory as a research method. Electronic Journal of Business Research Methods, 2(1):1-10, 2003.
-
(2003)
Electronic Journal of Business Research Methods
, vol.2
, Issue.1
, pp. 1-10
-
-
Allan, G.1
-
8
-
-
78649851562
-
-
chapter Chapter 12: Identity Theft Causes, Correlates and Factors: A Content Analysis Number 07458. Pearson Prentice Hall
-
S. E. Berg. Crimes of the Internet, chapter Chapter 12: Identity Theft Causes, Correlates and Factors: A Content Analysis, pages 225-250. Number 07458. Pearson Prentice Hall, 2009.
-
(2009)
Crimes of the Internet
, pp. 225-250
-
-
Berg, S.E.1
-
11
-
-
78649829366
-
-
Center for Identity Management and Information Protection. CIMIP Study Reveals New Findings About ID Theft Cases. Website May
-
Center for Identity Management and Information Protection. CIMIP Study Reveals New Findings About ID Theft Cases. Website: http://www.utica.edu/ academic/institutes/cimip/mediacenter/index.cfm, May 2009.
-
(2009)
-
-
-
13
-
-
84953586760
-
Human idenficication in information sysems: Management challenges and public policy issues
-
R. Clarke. Human idenficication in Information Sysems: Management Challenges and Public Policy Issues. Information Technology and People, 7(4):6-37, 1994.
-
(1994)
Information Technology and People
, vol.7
, Issue.4
, pp. 6-37
-
-
Clarke, R.1
-
16
-
-
84937327581
-
Victimology: Past, present and future
-
E. A. Fattah. Victimology: Past, present and future. Criminologie, 33(1):17-46, 2000.
-
(2000)
Criminologie
, vol.33
, Issue.1
, pp. 17-46
-
-
Fattah, E.A.1
-
17
-
-
78649852076
-
Identity theft report prepared for: Veda advantage
-
Galaxy Research April
-
Galaxy Research. Identity Theft Report Prepared for: Veda Advantage. Technical report, Galaxy Research, April 2009.
-
(2009)
Technical Report, Galaxy Research
-
-
-
19
-
-
0031872275
-
Victims of crime: A psychiatric perspective
-
April
-
R. D. Goldney. Victims of crime: A psychiatric perspective. Psychiatry, Psychology and Law, 5(1):153-157, April 1998.
-
(1998)
Psychiatry, Psychology and Law
, vol.5
, Issue.1
, pp. 153-157
-
-
Goldney, R.D.1
-
20
-
-
78649836779
-
-
House of Representatives Standing Committee on Economics, Finance and Public Administration. Numbers on the Run The Parliment of the Commonwealth of Australia, August
-
House of Representatives Standing Committee on Economics, Finance and Public Administration. Numbers on the Run. Review of the ANAO No.37 1998-99, The Parliment of the Commonwealth of Australia, August 2000.
-
(2000)
Review of the ANAO No.37 1998-99
-
-
-
21
-
-
78649838886
-
-
Identity Theft Resource Center Website
-
Identity Theft Resource Center. Identity Theft: The Aftermath 2008. Website, 2008.
-
(2008)
Identity Theft: The Aftermath 2008
-
-
-
22
-
-
78649831919
-
Defining identity crimes
-
ACIS, 3-5 December
-
R. Jamieson, R. Sarre, A. Steel, G. Stephens, and D. Winchester. Defining identity crimes. In Australasian Conference on Information Systems, pages 442-452. ACIS, 3-5 December 2008.
-
(2008)
Australasian Conference on Information Systems
, pp. 442-452
-
-
Jamieson, R.1
Sarre, R.2
Steel, A.3
Stephens, G.4
Winchester, D.5
-
24
-
-
78649874505
-
2010 identity fraud survey report. Syndicated sample report
-
Javelin Strategy & Research February
-
Javelin Strategy & Research. 2010 identity fraud survey report. Syndicated sample report, Javelin Strategy & Research, February 2010.
-
(2010)
Javelin Strategy & Research
-
-
-
25
-
-
84883275602
-
Police and identity theft victims - Preventing further victimisation
-
Australasian Centre for Policing Research, April
-
J. Jefferson. Police and identity theft victims - preventing further victimisation. Current Commentary 7, Australasian Centre for Policing Research, April 2004.
-
(2004)
Current Commentary 7
-
-
Jefferson, J.1
-
26
-
-
2642585873
-
The value of identity and the need for authenticity
-
DTI Office of Science and Technology Crime Foresight Panel Essay, December
-
G. Jones and M. Levi. The value of identity and the need for authenticity. In Turning the corner. DTI Office of Science and Technology Crime Foresight Panel Essay, December 2000.
-
(2000)
Turning the Corner
-
-
Jones, G.1
Levi, M.2
-
27
-
-
78649894866
-
Developing a police perspective and exploring the use of biometrics and other emerging technologies as an investigative tool in identity crimes
-
D. K. N. Krishnan and D. R. Berwick. Developing a police perspective and exploring the use of biometrics and other emerging technologies as an investigative tool in identity crimes. Report 145.1, Australasian Centre for Policing Research, 2004.
-
(2004)
Report 145.1, Australasian Centre for Policing Research
-
-
Krishnan, D.K.N.1
Berwick, D.R.2
-
30
-
-
84883080300
-
-
Criminal Justice Press, Monsey, NY, U.S.A
-
M. M. McNally. Perspectives on Identity Theft, volume 23 of Criminal Prevention Series, chapter Identity Theft and Opportunity, pages 33-55. Criminal Justice Press, Monsey, NY, U.S.A., 2008.
-
(2008)
Perspectives on Identity Theft, Volume 23 of Criminal Prevention Series, Chapter Identity Theft and Opportunity
, pp. 33-55
-
-
McNally, M.M.1
-
31
-
-
72849136974
-
-
Model Criminal Law Officers' Committtee Final report, MCLOC, March
-
Model Criminal Law Officers' Committtee. Final report identity crime. Final report, MCLOC, March 2008.
-
(2008)
Final Report Identity Crime
-
-
-
33
-
-
78649817449
-
-
Pearson. Product - Brief Symptom Inventory 18. Website May
-
Pearson. Product - Brief Symptom Inventory 18. Website: http://psychcorp.pearsonassessments.com/HAIWEB/Cultures/en-us/Productdetail.htm? Pid=PAg110, May 2010.
-
(2010)
-
-
-
34
-
-
16444376120
-
Two-factor authentication: Too little, too late
-
B. Schneier. Two-factor authentication: Too little, too late. Communications of the ACM, 48(4):136, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
, pp. 136
-
-
Schneier, B.1
-
35
-
-
78649836246
-
-
chapter Biometrics: Overview and Applicaitons Springer Publishing Company Inc.
-
I. K. Sethi. Privacy and Technologies of Identity, chapter Biometrics: Overview and Applicaitons, pages 117-134. Springer Publishing Company Inc., 2005.
-
(2005)
Privacy and Technologies of Identity
, pp. 117-134
-
-
Sethi, I.K.1
-
36
-
-
0347021055
-
Exploring the psychological and somatic impact of identity theft
-
T. Sharp, A. Shreve-Neiger, W. Fremouw, J. Kane, and S. Hutton. Exploring the psychological and somatic impact of identity theft. Journal of Forensic Science, 49(1):131-136, 2004.
-
(2004)
Journal of Forensic Science
, vol.49
, Issue.1
, pp. 131-136
-
-
Sharp, T.1
Shreve-Neiger, A.2
Fremouw, W.3
Kane, J.4
Hutton, S.5
-
37
-
-
0040573911
-
Long-term consequences of victimization by white-collar crime
-
March
-
N. Shover and G. L. Fox. Long-term consequences of victimization by white-collar crime. Justice Quarterly, 11(1):75-98, March 1994.
-
(1994)
Justice Quarterly
, vol.11
, Issue.1
, pp. 75-98
-
-
Shover, N.1
Fox, G.L.2
-
38
-
-
78649846957
-
Identification processes in the higher education sector: Risks and countermeasures
-
Canberra, December
-
R. G. Smith. Identification processes in the higher education sector: risks and countermeasures. Technical Report 305, Australian Institute of Criminology, Canberra, December 2005.
-
(2005)
Technical Report 305, Australian Institute of Criminology
-
-
Smith, R.G.1
-
39
-
-
78649884225
-
-
chapter Preventing Identity-Related Crime: The Challenges of Identification Criminal Justice Press, Monsey, NY, U.S.A
-
R. G. Smith. Perspectives on Identity Theft, volume 23 of Criminal Prevention Series, chapter Preventing Identity-Related Crime: The Challenges of Identification, pages 133-150. Criminal Justice Press, Monsey, NY, U.S.A., 2008.
-
(2008)
Perspectives on Identity Theft, Volume 23 of Criminal Prevention Series
, pp. 133-150
-
-
Smith, R.G.1
-
42
-
-
78649879318
-
-
Wallis Consulting Group Pty Ltd. Community attitudes to privacy 2007 Australia, Level 8, 133 Castlereagh St, Sydney, NSW August
-
Wallis Consulting Group Pty Ltd. Community attitudes to privacy 2007. Technical report, Office of the Privacy Commissioner, Australia, Level 8, 133 Castlereagh St, Sydney, NSW, 2000, August 2007.
-
(2000)
Technical Report, Office of the Privacy Commissioner
-
-
|