A review of information privacy and its importance to consumers and organizations

M Pelteret, J Ophoff - Informing Science, 2016 - rke.abertay.ac.uk
The privacy of personal information is an important area of focus in today's electronic world,
where information can so easily be captured, stored, and shared. In recent years it has …

[PDF][PDF] E-commerce and identity theft issues

A Tajpour, S Ibrahim, M Zamani - International Journal of …, 2013 - researchgate.net
Cyberspace is the digitized and networked work area people enter when using the Internet.
Electronic commerce depends on the use of personally identifiable information and …

Continuance in online participation following the compromise of older adults' identity information: a literature review

JM Watson, PM Salmon, D Lacey… - Theoretical Issues in …, 2018 - Taylor & Francis
This paper presents findings from a literature review on older adults continued use of the
Internet following an identity theft incident. Globally, identity theft is increasing, statistics …

Statistical steganalysis of four photo themes before embedding

AAJ Altaay, S bin Sahib… - … Conference on Advanced …, 2013 - ieeexplore.ieee.org
In order to analyze how the correlativity behavioral pattern would change after data
embedding, it needs to conduct a statistical analyze on average, maximum, minimum, and …

Online identity theft victimization: An assessment of victims and non-victims level of cyber security knowledge

DR Cornelius - 2016 - search.proquest.com
Online identity theft and cybercrime have increased with the rise of social networking, e-
commerce, and mobile devices. Therefore, the purpose of this quantitative, causal approach …

Strategies to prevent and reduce medical identity theft resulting in medical fraud

JV Clement - 2018 - search.proquest.com
Medical identity fraud is a byproduct of identity theft; it enables imposters to procure medical
treatment, thus defrauding patients, insurers, and government programs through forged …

Determination of performance to verify the synthetic identity theft by training the neural networks

K Veena, K Meena - 2017 IEEE International Conference on …, 2017 - ieeexplore.ieee.org
This paper presents a method to analyse the various identities of a user and thus determine
if any synthetic identity theft has been committed. Here three type of data is taken ie, Input …

[图书][B] Cybercrime prevention among small businesses in the greater Houston area: A qualitative exploratory case study

G Ajuzie - 2019 - search.proquest.com
The purpose of the qualitative exploratory case study was to explore the lived experiences of
small business owners whose companies had fallen victim to cybercrime in the Greater …

Exploring Identity Theft: Motives, Techniques, and Consequents on Different Age Groups

M Mosharraf, FH Haghighatkhah - Journal of Innovations in Computer …, 2023 - jicse.sbu.ac.ir
While the growth of technology has greatly benefited humanity, it also brings along several
drawbacks that can undermine these benefits. Despite its ability to detect attacks and deter …

Tasks security scheduling based on DPSO in heterogeneous grid environment

D Zhang, H Zhu, Y Wang, Z Miao - 2010 Second International …, 2010 - ieeexplore.ieee.org
For the task scheduling problem in the heterogeneous grid environment, a security benefit
function is constructed by considering the task scheduling demand for confidentiality …