Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Swindlers and swindling. --- False personation. --- Disguise. --- Deception --- Impersonation (Crime) --- Fraud --- Impersonation --- Con artists --- Confidence men --- Confidence women --- Grifters --- Scam artists --- Scammers and scamming --- Scamming --- Crime --- Criminals --- Tricksters
Choose an application
False personation --- Forgery --- Public administration --- Fraud --- Commercial fraud --- Deceit --- Misrepresentation (Crime) --- Commercial crimes --- Deception --- Torts --- Hoaxes --- Impostors and imposture --- Administration, Public --- Delivery of government services --- Government services, Delivery of --- Public management --- Public sector management --- Political science --- Administrative law --- Decentralization in government --- Local government --- Public officers --- Offenses against property --- Swindlers and swindling --- Impersonation (Crime) --- Impersonation --- History. --- China --- History --- Officials and employees.
Choose an application
False personation --- Forgery --- Public administration --- Fraud --- Commercial fraud --- Deceit --- Misrepresentation (Crime) --- Commercial crimes --- Deception --- Torts --- Hoaxes --- Impostors and imposture --- Administration, Public --- Delivery of government services --- Government services, Delivery of --- Public management --- Public sector management --- Political science --- Administrative law --- Decentralization in government --- Local government --- Public officers --- Offenses against property --- Swindlers and swindling --- Impersonation (Crime) --- Impersonation --- History. --- China --- History --- Officials and employees. --- S11/0816 --- China: Social sciences--Criminality --- S04/0690 --- S08/0260 --- China: History--Qing: 1644 - 1840 --- China: Law and legislation--Qing codex
Choose an application
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information. Together, these points illustrate that the near-term search for cheap identity management is a formula for long-term fraud resulting in ever-increasing identity theft. The Economics of Identity Theft: Avoidance, Causes and Possible Cures, a professional book, discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and the placement of biometric security in an economically broken system, which results in a broken biometric system. The final chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status. In conclusion, four startling previews of the future are written as scenarios. The Economics of Identity Theft: Avoidance, Causes and Possible Cures is designed for a professional audience composed of practitioners and researchers. This book is also suitable as a secondary text for advanced-level students in computer science, economics and several other disciplines. .
False personation. --- Identity theft --- Economic aspects. --- Identity fraud --- False personation --- Theft --- Impersonation (Crime) --- Fraud --- Impersonation --- Biometrics. --- Data encryption (Computer science). --- Economics. --- Computer security. --- Business. --- Computer Communication Networks. --- Cryptology. --- Economics, general. --- Systems and Data Security. --- Business and Management, general. --- Trade --- Economics --- Management --- Commerce --- Industrial management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Economic theory --- Political economy --- Social sciences --- Economic man --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Biometrics (Biology). --- Management science. --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Quantitative business analysis --- Problem solving --- Operations research --- Statistical decision --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Distributed processing --- Statistical methods
Listing 1 - 4 of 4 |
Sort by
|