LoPucki, 2001
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| LoPucki | Human identification theory and the identity theft problem | |
| US11288676B2 (en) | Private confirmation system | |
| Newman et al. | Identity theft literature review | |
| Smith | Investigations: Bank Fraud | |
| Cullen | The Wall Street Journal. Complete Identity Theft Guidebook: How to Protect Yourself from the Most Pervasive Crime in America | |
| Hoar | Identity theft: The crime of the new millennium | |
| Anderson et al. | Identity theft | |
| Wang et al. | A contextual framework for combating identity theft | |
| US20120331557A1 (en) | Global identity protector E-commerce payment code certified processing system | |
| US20090326972A1 (en) | Global identity protector e-commerce payment code certified processing system | |
| Towle | Identity theft: myths, methods, and new law | |
| Vacca | Identity theft | |
| Newman | Identity theft | |
| Archer et al. | Identity theft and fraud: Evaluating and managing risk | |
| Sawyer | Scams: Blaming the Victims | |
| Glynn | Computer abuse: the emerging crime and the need for legislation | |
| Nycum | Legal Problems of Computer Abuse | |
| Hemphill | Identity theft: A cost of business? | |
| Camp | Privacy and reliability in Internet commerce | |
| Lawson et al. | Identity theft: The need for better consumer protection | |
| Zaidi | Identity Theft and Consumer Protection: Finding Sensible Approaches to Safeguard Personal Data in the United States and Canada | |
| Dowe | Frustration Station: Attempting to Control Your Credit | |
| Chansen | The Evolution of Synthetic Identity Theft and Its Impact on Children | |
| Sterk | Title Theft | |
| Bertoni | Identity theft: governments have acted to protect personally identifiable information, but vulnerabilities remain: congressional testimony |