Indices1
Identity Theft: Breakthroughs in Research and Practice

Identity Theft: Breakthroughs in Research and Practice

Copyright: © 2017 |Pages: 442
ISBN13: 9781522508083|ISBN10: 1522508082|EISBN13: 9781522508090
DOI: 10.4018/978-1-5225-0808-3
Cite Book Cite Book

MLA

Management Association, Information Resources, editor. Identity Theft: Breakthroughs in Research and Practice. IGI Global, 2017. https://doi.org/10.4018/978-1-5225-0808-3

APA

Management Association, I. (Ed.). (2017). Identity Theft: Breakthroughs in Research and Practice. IGI Global. https://doi.org/10.4018/978-1-5225-0808-3

Chicago

Management Association, Information Resources, ed. Identity Theft: Breakthroughs in Research and Practice. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-0808-3

Export Reference

Mendeley
Favorite Full-Book Download

The preservation of private data is a main concern of governments, organizations, and individuals alike. For individuals, a breach in personal information can mean dire consequences for an individual’s finances, medical information, and personal property.

Identity Theft: Breakthroughs in Research and Practice highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one’s identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future. This publication is an essential resource for information security professionals, researchers, and graduate-level students in the fields of criminal science, business, and computer science.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
This section serves as a foundation for this exhaustive reference tool by addressing underlying principles essential to the understanding of Identity Theft and provides in-depth coverage of conceptual architecture frameworks to...
Fundamental Concepts and Design Methodologies
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
This section presents an extensive coverage of various tools and technologies available in the field of Identity Theft and discusses a variety of applications and opportunities available that can be considered by practitioners in...
Technologies and Applications
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
This section contains 6 chapters, giving a wide range of research pertaining to the social and behavioral impact of Identity Theft, and a wide variety of perspectives and advancement of the discipline on Identity Theft. The reader is...
Social Implications, Critical Issues, and Emerging Trends
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.