Archer et al., 2012 - Google Patents
Identity theft and fraud: Evaluating and managing riskArcher et al., 2012
- Document ID
- 7557438801165233119
- Author
- Archer N
- Sproule S
- Yuan Y
- Guo K
- Xiang J
- Publication year
External Links
Snippet
Personal data is increasingly being exchanged and stored by electronic means, making businesses, organizations and individuals more vulnerable than ever to identity theft and fraud. This book provides a practical and accessible guide to identity theft and fraud using a …
- 230000002633 protecting 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Investment, e.g. financial instruments, portfolio management or fund management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance, e.g. risk analysis or pensions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Levi et al. | The implications of economic cybercrime for policing | |
Bellini | Paying the price: When intimate partners use technology for financial harm | |
Mugarura et al. | Intricacies of anti-money laundering and cyber-crimes regulation in a fluid global system | |
Piquero et al. | Preventing identity theft: perspectives on technological solutions from industry insiders | |
TW202232919A (en) | Email certification system | |
Opderbeck | Cybersecurity and Data Breach Harms: Theory and Reality | |
Seda | Identity theft and university students: do they know, do they care? | |
Chigada | Towards an aligned South African national cybersecurity policy framework | |
Vacca | Identity theft | |
Archer et al. | Identity theft and fraud: Evaluating and managing risk | |
Fadayo | An examination of e-banking fraud prevention and detection in Nigerian banks | |
Ciocchetti | The privacy matrix | |
Lincke | Security planning | |
Tajpour et al. | Identity Theft and Prevention | |
Navarro | Preventative fraud measures for cryptocurrency exchanges: mitigating the risk of cryptocurrency scams | |
Camp | Economics of Identity Theft: Avoidance, Causes and Possible Cures | |
Ordekian et al. | Investigating Wrench Attacks: Physical Attacks Targeting Cryptocurrency Users | |
Alwan | Policy Development and Frameworks for Cyber Security in Corporates and Law Firms | |
Poole et al. | Prevention and Resolution for Identity Theft: Practical Advice for Individuals, Business Owners, and Tax Professionals. | |
Cornish et al. | Mastercard international security and risk management: credit card fraud | |
Marakalala | Forensic Identification: The Biometric Technology Linked to Online Financial Fraud and Crime Related to the South African Banking Industry | |
McCoy et al. | Identity Theft: Private Battle or Public Crisis? | |
Rakololo et al. | An Exploratory Study on Causes of Identity Document Theft in South Africa | |
Soni | Identity Fraud and Digital Gadget Users’ Cognizance | |
Mwabu | Factors influencing electronic fraud in the banking industry in Kenya: a case of Kenya commercial bank central region. |