[PDF][PDF] Identity theft methods and fraud types

A Tajpour, S Ibrahim, M Zamani - IJIPM: International Journal of …, 2013 - researchgate.net
Identity-based crimes are considered to be one of the most significant and growing problems
of the last 20 years due to the significant economic harm these offenses pose for victims …

Online Identity Theft, Security Issues, and Reputational Damage

ZA Zukarnain - 2021 - preprints.org
Online identity-based theft is known to be one of the most serious and growing threats to
victims, such as individuals and organizations, over the last 10 years due to the enormous …

Statistical steganalysis of four photo themes before embedding

AAJ Altaay, S bin Sahib… - … Conference on Advanced …, 2013 - ieeexplore.ieee.org
In order to analyze how the correlativity behavioral pattern would change after data
embedding, it needs to conduct a statistical analyze on average, maximum, minimum, and …

[HTML][HTML] Determinants of E-Commerce: A Case of Fashion Wears and Cosmetics E-Businesses in Nigeria

W Yusuf, F Alesinloye, E Oyegoke… - Open Journal of Social …, 2024 - scirp.org
The growth of communication technology, modern technology, and the internet, electronic
commerce (e-commerce) has brushed up through all walks of the world with an irrevocable …

Exploring Identity Theft: Motives, Techniques, and Consequents on Different Age Groups

M Mosharraf, FH Haghighatkhah - Journal of Innovations in Computer …, 2023 - jicse.sbu.ac.ir
While the growth of technology has greatly benefited humanity, it also brings along several
drawbacks that can undermine these benefits. Despite its ability to detect attacks and deter …

Tasks security scheduling based on DPSO in heterogeneous grid environment

D Zhang, H Zhu, Y Wang, Z Miao - 2010 Second International …, 2010 - ieeexplore.ieee.org
For the task scheduling problem in the heterogeneous grid environment, a security benefit
function is constructed by considering the task scheduling demand for confidentiality …

[PDF][PDF] International Journal of Communication Networks and Information Security

TC Hlongwane, TE Mathonsi, D Du Plessis… - researchgate.net
The global expansion of e-business applications has introduced novel challenges, with an
escalating number of security issues linked to online transactions, such as phishing attacks …

[PDF][PDF] Developing a framework for e-commerce privacy and data protection in developing nations: a case study of Nigeria

T Adelola - 2017 - core.ac.uk
The emergence of e-commerce has brought about many benefits to a country's economy
and individuals, but the openness of the Internet has given rise to misuse of personal data …

[引用][C] Wide flat region photos statistical steganalysis

AA Jabbar, SB Sahib, M Zamani - Journal of …, 2013 - Advanced Institutes of Convergence …

[引用][C] Edgy photos statistical steganalysis

AA Jabbar, SB Sahib, M Zamani - Advances in …, 2013 - Advanced Institutes of Convergence …