Abstract
The computer's role in identity theft incidents may have been misgauged through overestimates of reported losses.
- Bergel, H. Identity theft, Social Security numbers, and the Web. Commun. ACM 43, 2 (Feb. 2000). Google ScholarDigital Library
- Bergstein, B. Beware the numbers hype about ID theft. Associated Press, Nov. 13, 2005; www.usatoday.com/tech/news/techinnovations/2005-11-13-id-theft-numbers_x.htm.Google Scholar
- Kappelman, L.A., Fent, D., Keeling, K.B., and Prybutok, V. Calculating the cost of year-2000 compliance. Commun. ACM 41, 2 (Feb. 1998). Google ScholarDigital Library
- McCarty, B. Automated identity theft. IEEE Security and Privacy 1, 5 (Sept./Oct. 2003). Google ScholarDigital Library
- Synovate. Federal Trade Commission---Identity Theft Survey Report. Sept. 2003; www.ftc.gov/os/2003/09/synovatereport.pdf.Google Scholar
Index Terms
- Scoping identity theft
Recommendations
Is identity theft really theft?
LAW SHAPING TECHNOLOGY; TECHNOLOGY SHAPING THE LAWThis article continues the examination of the emergent legal concept of identity now clearly evident in the UK as a result of the Identity Cards Act 2006 (UK) and its consequences. In 'Conceptualising Identity' (International Review of Law, Computers ...
Comments