-
3
-
-
84900133919
-
-
Retrieved from http://www.bbbonline. org/privacy/answer.asp#2
-
BBBOnLine. (2004). Seal programs. Retrieved from http://www.bbbonline. org/privacy/answer.asp#2
-
(2004)
Seal programs
-
-
-
4
-
-
85001656472
-
-
ComputerWorld, (July 16) Retrieved from http://www.computerworld.com/printthis/2003/0,4814,82911,00.html
-
Drake, J. (2003). How to take the offense on identity theft. ComputerWorld, (July 16). Retrieved from http://www.computerworld.com/printthis/2003/0,4814,82911,00.html
-
(2003)
How to take the offense on identity theft
-
-
Drake, J.1
-
5
-
-
84900175334
-
-
Retrieved from https://www.econsumer.equifax.com/consumer/ forward.ehtml?forward=default
-
Equifax. (2004). Equifax personal solutions. Retrieved from https://www.econsumer.equifax.com/consumer/ forward.ehtml?forward=default
-
(2004)
Equifax personal solutions
-
-
-
6
-
-
0031225351
-
Strategy and the new economics of information
-
September/October
-
Evans, P. & Wurster, T. (1997). Strategy and the new economics of information. Harvard Business Review, (September/October), 71–82.
-
(1997)
Harvard Business Review
, pp. 71-82
-
-
Evans, P.1
Wurster, T.2
-
7
-
-
84900224830
-
-
Retrieved from http://www. e x p e r i a n. c o m / i d e n t i t y _ f r a u d / fraud_prevention.html
-
Experian. (2004). Experian personal services. Retrieved from http://www. e x p e r i a n. c o m / i d e n t i t y _ f r a u d / fraud_prevention.html
-
(2004)
Experian personal services
-
-
-
8
-
-
84900123881
-
Identity theft losses expected to hit $2 trillion by 2005
-
(May 22) Retrieved from http://itmanagement.earthWeb. com/secu/print.php/2211101
-
Gaudin, S. (2003). Identity theft losses expected to hit $2 trillion by 2005. IT Management: Security, (May 22). Retrieved from http://itmanagement.earthWeb. com/secu/print.php/2211101
-
(2003)
IT Management: Security
-
-
Gaudin, S.1
-
10
-
-
0344219790
-
An examination of privacy policies in Fortune 500 Web sites
-
Liu, C. & Arnett, K. (2002). An examination of privacy policies in Fortune 500 Web sites. Mid-American Journal of Business, 17, 13–21.
-
(2002)
Mid-American Journal of Business
, vol.17
, pp. 13-21
-
-
Liu, C.1
Arnett, K.2
-
11
-
-
0346406657
-
Human identification theory and the identity theft problem
-
LoPucki, L. (2001). Human identification theory and the identity theft problem. Texas Law Review, 80, 89–135.
-
(2001)
Texas Law Review
, vol.80
, pp. 89-135
-
-
LoPucki, L.1
-
12
-
-
0346338316
-
How well do consumers protect themselves from identity theft?
-
Milne, G. (2003). How well do consumers protect themselves from identity theft? The Journal of Consumer Affairs, 37, 388–405.
-
(2003)
The Journal of Consumer Affairs
, vol.37
, pp. 388-405
-
-
Milne, G.1
-
13
-
-
85001656466
-
Identity theft: What can you do to protect your clients?
-
Oehlers, P. (2004). Identity theft: What can you do to protect your clients? Journal of Financial Service Professionals, 58, 20–23.
-
(2004)
Journal of Financial Service Professionals
, vol.58
, pp. 20-23
-
-
Oehlers, P.1
-
14
-
-
84900085483
-
The newest identity thieves: Parents
-
(April 7) Retrieved from http://moneycentral.msn.com/content/Banking/FnancialPrivacy/P77623.asp
-
Pulliam-Weston, L. (2004). The newest identity thieves: Parents. MSN Money, (April 7). Retrieved from http://moneycentral.msn.com/content/Banking/FnancialPrivacy/P77623.asp
-
(2004)
MSN Money
-
-
Pulliam-Weston, L.1
-
16
-
-
84900138975
-
New frontiers in the identity theft war
-
(June 20) Retrieved from http://www.crmbuyer. com/perl/story/21718.html
-
Ray, T. (2003). New frontiers in the identity theft war. CRM Buyer, (June 20). Retrieved from http://www.crmbuyer. com/perl/story/21718.html
-
(2003)
CRM Buyer
-
-
Ray, T.1
-
17
-
-
0347083998
-
Counteracting identity fraud in the Information Age: The Identity Theft and Assumption Deterrence Act
-
Saunders, K. & Zucker, B. (1999). Counteracting identity fraud in the Information Age: The Identity Theft and Assumption Deterrence Act. International Review of Law, Computers and Technology, 13, 183–192.
-
(1999)
International Review of Law, Computers and Technology
, vol.13
, pp. 183-192
-
-
Saunders, K.1
Zucker, B.2
-
18
-
-
0348089527
-
Loyalty and e-marketing issues: Customer retention on the Web
-
Smith, A.D. (2002). Loyalty and e-marketing issues: Customer retention on the Web. Quarterly Journal of Electronic Commerce, 3, 141–161.
-
(2002)
Quarterly Journal of Electronic Commerce
, vol.3
, pp. 141-161
-
-
Smith, A.D.1
-
19
-
-
0036063961
-
Information management of automated data capture: An overview of technical developments
-
Smith, A.D. & Offodile, F. (2002). Information management of automated data capture: An overview of technical developments. Information Management and Computer Security, 10(3), 109–118.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.3
, pp. 109-118
-
-
Smith, A.D.1
Offodile, F.2
-
20
-
-
0036063532
-
Application service providers (ASP): Moving downstream to enhance competitive advantage
-
Smith, A.D. & Rupp, W.T. (2002a). Application service providers (ASP): Moving downstream to enhance competitive advantage. Information Management and Computer Security, 10(2), 64–72.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.2
, pp. 64-72
-
-
Smith, A.D.1
Rupp, W.T.2
-
21
-
-
0036036094
-
Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers
-
Smith, A.D. & Rupp, W.T. (2002b). Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers. Information Management and Computer Security, 10(4), 178–183.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.4
, pp. 178-183
-
-
Smith, A.D.1
Rupp, W.T.2
-
22
-
-
54249130859
-
The science of biometric identification
-
Smith, C. (2003). The science of biometric identification. Australian Science Teachers Journals, 49, 34–39.
-
(2003)
Australian Science Teachers Journals
, vol.49
, pp. 34-39
-
-
Smith, C.1
-
23
-
-
84900059076
-
-
Retrieved from http:// www. t r a n s u n i o n. c o m / c o n t e n t /page.jsp?id=/personalsolutions/general/data/FraudInformation.xml
-
TransUnion. (2004). TransUnion personal solutions. Retrieved from http:// www. t r a n s u n i o n. c o m / c o n t e n t /page.jsp?id=/personalsolutions/general/data/FraudInformation.xml
-
(2004)
TransUnion personal solutions
-
-
-
24
-
-
84900232561
-
-
Retrieved from http://www.usa.visa.com/business/merchants/cisp_index.html
-
VisaUSA. (2004). Cardholder information security program. Retrieved from http://www.usa.visa.com/business/merchants/cisp_index.html
-
(2004)
Cardholder information security program
-
-
-
25
-
-
85001607017
-
Protect your privacy: 10 simple steps
-
Retrieved from http://moneycentral.msn.com/content/Banking/FinancialPrivacy/P33715.asp
-
Wuorio, J. (2004). Protect your privacy: 10 simple steps. MSN Money. Retrieved from http://moneycentral.msn.com/content/Banking/FinancialPrivacy/P33715.asp
-
(2004)
MSN Money
-
-
Wuorio, J.1
|