-
2
-
-
53449102514
-
ALAMBIC: A privacy-preserving recommender system for electronic commerce
-
Aïmeur, E., Brassard, G., Fernandez, J.M., Mani Onana, F.S., 2008, ALAMBIC: A Privacy-Preserving Recommender System for Electronic Commerce, International Journal of Information Security, vol. 7, no 5, 307-334.
-
(2008)
International Journal of Information Security
, vol.7
, Issue.5
, pp. 307-334
-
-
Aïmeur, E.1
Brassard, G.2
Fernandez, J.M.3
Mani Onana, F.S.4
-
3
-
-
11344287619
-
Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics
-
Allison, S., Schuck, A., Lersch, K.M., 2005, Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, vol. 33, no. 1, 19-29.
-
(2005)
Journal of Criminal Justice
, vol.33
, Issue.1
, pp. 19-29
-
-
Allison, S.1
Schuck, A.2
Lersch, K.M.3
-
4
-
-
33845275228
-
Who are the victims of identity theft? the effect of demographics
-
Anderson, K.B., 2006, Who are the victims of identity theft? The effect of demographics, Journal of Public Policy & Marketing, vol. 25, no. 2, 160-171.
-
(2006)
Journal of Public Policy & Marketing
, vol.25
, Issue.2
, pp. 160-171
-
-
Anderson, K.B.1
-
7
-
-
78649930481
-
-
Consulté le 11 septembre 20096 août
-
Boggan, S., 6 août 2008, 'Fakeproof' e-passport is cloned in minutes, Times Online, http://www.timesonline.co.uk/tol/news/uk/crime/ article4467106.ece, Consulté le 11 septembre 2009.
-
(2008)
Fakeproof' e-passport is cloned in minutes
-
-
Boggan, S.1
-
8
-
-
78649931461
-
UPEI student entangled in fraudulent Facebook threats
-
CBC News, 27 décembre
-
CBC News, 27 décembre 2007, UPEI student entangled in fraudulent Facebook threats, http://www.cbc.ca/canada/prince-edward-island/story/2007/12/ 24/pe-facebook.html, Consulté le 11 septembre 2009.
-
(2007)
Consulté le 11 Septembre 2009
-
-
-
9
-
-
78649968693
-
-
Consulté le 23 septembre 2009
-
Commérot, S., 2007, Les menaces actuelles d'Internet: Comment s'en protéger, IronPort,http://www.cisco.com/web/FR/documents/pdfs/events/ cisco-expo2007/03-30-10-30-7-ironport-les-menaces-actuelles-d-internet.pdf, Consulté le 23 septembre 2009.
-
(2007)
Les Menaces Actuelles d'Internet: Comment s'En Protéger
-
-
Commérot, S.1
-
10
-
-
78649959093
-
-
Consulté le 11 septembre 2009, 14 juillet
-
Constantin, L., 14 juillet 2009, Vishing Attacks Target Regional Banks and Credit Unions, Softpedia, http://news.softpedia.com/news/Vishing-Attacks- Target-Regional-Banks-and-Credit-Unions-116660.shtml, Consulté le 11 septembre 2009.
-
(2009)
Vishing Attacks Target Regional Banks and Credit Unions
-
-
Constantin, L.1
-
11
-
-
58049166143
-
-
University of Alabama, Birmingham
-
Copes, H., Vieraitis, L., 2007, Identity theft: Assessing offenders' strategies and perceptions of risk, University of Alabama, Birmingham.
-
(2007)
Identity Theft: Assessing Offenders' Strategies and Perceptions of Risk
-
-
Copes, H.1
Vieraitis, L.2
-
12
-
-
78649962853
-
-
Deloitte, Canadian Association of Police Board, Ottawa
-
Deloitte, 2008, A report on cybercrime in Canada, Canadian Association of Police Board, Ottawa.
-
(2008)
A Report on Cybercrime in Canada
-
-
-
13
-
-
78649967716
-
-
Consulté le 11 septembre 2009, 5 août
-
Derest, V., 5 août 2009, Clampi, un cheval de Troie qui s'avère être un botnet de vol de données financières, Reseaux-Telecoms.net, http://securite.reseaux-telecoms.net/actualites/lire- clampiun-cheval-de-troie-qui-s-avere-etre-un-botnet-de-vol-de-donnees- financieres-20642.html, Consulté le 11 septembre 2009.
-
(2009)
Clampi, un Cheval de Troie Qui s'Avère être un Botnet de Vol de Données Financières
-
-
Derest, V.1
-
15
-
-
78649972055
-
-
Chaire de recherche du Canada en sécurité, identité et technologie, Consulté le 28 septembre 2009
-
Dupont, B., Louis, G. (2009). Les voleurs d'identité: Profil d'une délinquance ordinaire, Chaire de recherche du Canada en sécurité, identité et technologiehttp://www.mapageweb. umontreal.ca/dupontb/articlesandpapers/DupontLouisprofilvid.pdf, Consulté le 28 septembre 2009.
-
(2009)
Les Voleurs d'Identité: Profil d'Une Délinquance Ordinaire
-
-
Dupont, B.1
Louis, G.2
-
16
-
-
67649739099
-
A survey of signature based methods for financial fraud detection
-
Edge, M.E., Falcone Sampaio, P.R., 2009, A survey of signature based methods for financial fraud detection, Computers and Security, vol. 28, no. 6, 381-394.
-
(2009)
Computers and Security
, vol.28
, Issue.6
, pp. 381-394
-
-
Edge, M.E.1
Falcone Sampaio, P.R.2
-
19
-
-
70349274744
-
-
Center for Identity Management and Information Protection, Uttica College
-
Gordon, G., Rebovitch, D., Choo, K., Gordon, J., 2007, Identity fraud trends and patterns: building a data-based foundation for proactive enforcement, Center for Identity Management and Information Protection, Uttica College.
-
(2007)
Identity Fraud Trends and Patterns: Building A Data-based Foundation for Proactive Enforcement
-
-
Gordon, G.1
Rebovitch, D.2
Choo, K.3
Gordon, J.4
-
20
-
-
78649973196
-
-
Identity Theft Resource Center (ITRC), ITRC, San Diego
-
Identity Theft Resource Center (ITRC), 2008, Identity theft: The aftermath 2007, ITRC, San Diego.
-
(2008)
Identity Theft: The Aftermath 2007
-
-
-
21
-
-
78649962850
-
-
Institut pour la sécurité de l'information (ISIQ), CRIM, Montréal
-
Institut pour la sécurité de l'information (ISIQ), 2007, Sondage auprès des citoyens branchés, CRIM, Montréal.
-
(2007)
Sondage Auprès des Citoyens Branchés
-
-
-
22
-
-
78649936017
-
1er mai
-
Consulté le 11 septembre 2009
-
Kelly, S., 1er mai 2008, Identity 'at risk' on Facebook, BBC News http://news.bbc.co.uk/2/hi/programmes/click-online/7375772.stm, Consulté le 11 septembre 2009.
-
(2008)
Identity 'At Risk' on Facebook
-
-
Kelly, S.1
-
23
-
-
70449379642
-
-
Javelin Strategy & Research, Pleasanton
-
Monahan, M., Kim, R., 2009, 2009 Identity fraud survey report, Javelin Strategy & Research, Pleasanton.
-
(2009)
2009 Identity Fraud Survey Report
-
-
Monahan, M.1
Kim, R.2
-
24
-
-
38049065451
-
-
National Criminal Justice Reference Service, Washington
-
Newman, G., McNally, M., 2005, Identity theft literature review, National Criminal Justice Reference Service, Washington.
-
(2005)
Identity Theft Literature Review
-
-
Newman, G.1
McNally, M.2
-
25
-
-
70450266533
-
The myth of the superuser: Fear, risk and harm online
-
Ohm, P., 2008, The myth of the superuser: Fear, risk and harm online, UC Davis Law Review, vol. 41, no. 4, 1327-1402.
-
(2008)
UC Davis Law Review
, vol.41
, Issue.4
, pp. 1327-1402
-
-
Ohm, P.1
-
26
-
-
78649977977
-
-
5 août, OfficeMax, DSW, Others, Consulté le 11 septembre 2009
-
Poulsen, K., 5 août 2008, Feds Charge 11 in Breaches at TJ Maxx, OfficeMax, DSW, Others, Wired, http://www.wired.com/threatlevel/2008/08/11- charged-in-m/, Consulté le 11 septembre 2009.
-
(2008)
Feds Charge 11 in Breaches at TJ Maxx
-
-
Poulsen, K.1
-
29
-
-
47649127274
-
-
11-13 juillet, Toronto
-
Sproule, S., Archer, N., 2007, Defining identity theft. Eight World Congress on the Management of eBusiness, 11-13 juillet, Toronto.
-
(2007)
Defining Identity Theft. Eight World Congress on the Management of EBusiness
-
-
Sproule, S.1
Archer, N.2
-
30
-
-
77249127455
-
-
MeRC working paper no. 23, McMaster University, Hamilton
-
Sproule, S., Archer, N., 2008, Measuring identity theft in Canada: 2008 consumer survey, MeRC working paper no. 23, McMaster University, Hamilton.
-
(2008)
Measuring Identity Theft in Canada: 2008 Consumer Survey
-
-
Sproule, S.1
Archer, N.2
-
31
-
-
70949098699
-
-
University of California Santa Barbara Technical report, Santa Barbara
-
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., et Vigna, G. (2009). Your botnet is my botnet: Analysis of a botnet takeover, University of California Santa Barbara Technical report, Santa Barbara.
-
(2009)
Your Botnet Is My Botnet: Analysis of A Botnet Takeover
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
34
-
-
78649923382
-
-
8 août, Computerworld, Consulté le 23 septembre 2009
-
Thibodeau, P., 8 août 2008, Credit card thieves ran a polite, professional help desk, Computerworld, http://www.networkworld.com/news/2008/ 080708-credit-card-thieves-ran-a.html, Consulté le 23 septembre 2009.
-
(2008)
Credit Card Thieves Ran A Polite, Professional Help Desk
-
-
Thibodeau, P.1
-
35
-
-
61449103250
-
-
Union, National Infrastructure Cyber Crime Program, La Haye
-
Van der Meulen, N., 2006, The challenge of countering identity theft: Recent developments in the United States, the United Kingdom, and the European Union, National Infrastructure Cyber Crime Program, La Haye.
-
(2006)
The Challenge of Countering Identity Theft: Recent Developments in the United States, the United Kingdom, and the European
-
-
Van Der Meulen, N.1
-
37
-
-
85025672526
-
-
12 janvier, Consulté le 11 septembre 2009
-
Wilson, T., 12 janvier 2007, For Sale: Phishing Kit, Dark Reading, http://www.darkreading.com/security/management/showArticle.jhtml?articleID= 208804288, Consulté le 11 septembre 2009.
-
(2007)
For Sale: Phishing Kit
-
-
Wilson, T.1
-
38
-
-
50049116605
-
Student and non-student perceptions and awareness of identity theft
-
Winterdyk, J., Thompson, N., 2008, Student and non-student perceptions and awareness of identity theft. Revue canadienne de criminologie et de justice pénale, vol. 50, no. 2, 153-186.
-
(2008)
Revue Canadienne de Criminologie et de Justice Pénale
, vol.50
, Issue.2
, pp. 153-186
-
-
Winterdyk, J.1
Thompson, N.2
-
39
-
-
78649974171
-
-
17 août, Consulté le 11 septembre 2009
-
Zetter, K., 17 août 2009, TJX Hacker Charged With Heartland, Hannaford Breaches, Wired, http://www.wired.com/threatlevel/2009/08/tjx-hacker- charged-with-heartland/, Consulté le 11 septembre 2009.
-
(2009)
TJX Hacker Charged with Heartland, Hannaford Breaches
-
-
Zetter, K.1
|