[go: up one dir, main page]

Archer et al., 2012 - Google Patents

Identity theft and fraud: Evaluating and managing risk

Archer et al., 2012

Document ID
7557438801165233119
Author
Archer N
Sproule S
Yuan Y
Guo K
Xiang J
Publication year

External Links

Snippet

Personal data is increasingly being exchanged and stored by electronic means, making businesses, organizations and individuals more vulnerable than ever to identity theft and fraud. This book provides a practical and accessible guide to identity theft and fraud using a …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Investment, e.g. financial instruments, portfolio management or fund management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance, e.g. risk analysis or pensions

Similar Documents

Publication Publication Date Title
Levi et al. The implications of economic cybercrime for policing
Bellini Paying the price: When intimate partners use technology for financial harm
Mugarura et al. Intricacies of anti-money laundering and cyber-crimes regulation in a fluid global system
Piquero et al. Preventing identity theft: perspectives on technological solutions from industry insiders
TW202232919A (en) Email certification system
Opderbeck Cybersecurity and Data Breach Harms: Theory and Reality
Seda Identity theft and university students: do they know, do they care?
Chigada Towards an aligned South African national cybersecurity policy framework
Vacca Identity theft
Archer et al. Identity theft and fraud: Evaluating and managing risk
Fadayo An examination of e-banking fraud prevention and detection in Nigerian banks
Ciocchetti The privacy matrix
Lincke Security planning
Tajpour et al. Identity Theft and Prevention
Navarro Preventative fraud measures for cryptocurrency exchanges: mitigating the risk of cryptocurrency scams
Camp Economics of Identity Theft: Avoidance, Causes and Possible Cures
Ordekian et al. Investigating Wrench Attacks: Physical Attacks Targeting Cryptocurrency Users
Alwan Policy Development and Frameworks for Cyber Security in Corporates and Law Firms
Poole et al. Prevention and Resolution for Identity Theft: Practical Advice for Individuals, Business Owners, and Tax Professionals.
Cornish et al. Mastercard international security and risk management: credit card fraud
Marakalala Forensic Identification: The Biometric Technology Linked to Online Financial Fraud and Crime Related to the South African Banking Industry
McCoy et al. Identity Theft: Private Battle or Public Crisis?
Rakololo et al. An Exploratory Study on Causes of Identity Document Theft in South Africa
Soni Identity Fraud and Digital Gadget Users’ Cognizance
Mwabu Factors influencing electronic fraud in the banking industry in Kenya: a case of Kenya commercial bank central region.