943
Views
21
CrossRef citations to date
0
Altmetric
Original Articles

Counteracting Identity Fraud in the Information Age: The Identity Theft and Assumption Deterrence Act

Pages 183-192 | Published online: 21 Jul 2010

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Katherine Slosarik. (2002) Identity theft: An overview of the problem. The Justice Professional 15:4, pages 329-343.
Read now
Jo Ann Oravec. (2000) Internet and computer technology hazards: Perspectives for family counselling. British Journal of Guidance & Counselling 28:3, pages 309-324.
Read now

Articles from other publishers (19)

Dinh Tien Minh, Pham Thi Truc Ly & Nguyen Thi Ngoc Duyen. (2022) Privacy Risk Awareness and Intent to Disclose Personal Information of Users Using Two Social Networks: Facebook and Instagram. VNU University of Economics and Business 2:6.
Crossref
Rejikumar G, Gopikumar V, K.G.Sofi Dinesh, Aswathy Asokan-Ajitha & Ajay Jose. (2021) Privacy breach perceptions and litigation intentions: Evidence from e-commerce customers. IIMB Management Review 33:4, pages 322-336.
Crossref
Ioannis Paspatis, Aggeliki Tsohou & Spyros Kokolakis. (2020) AppAware: a policy visualization model for mobile applications. Information & Computer Security 28:1, pages 116-132.
Crossref
Juanita Blue, Joan Condell & Tom Lunney. (2017) Identity document authentication using steganographic techniques: The challenges of noise. Identity document authentication using steganographic techniques: The challenges of noise.
Munyaradzi Katurura & Liezel Cilliers. (2016) The extent to which the POPI act makes provision for patient privacy in mobile personal health record systems. The extent to which the POPI act makes provision for patient privacy in mobile personal health record systems.
Prittish Dala & Hein S. Venter. (2016) Understanding the Level of Compliance by South African Institutions to the Protection of Personal Information (POPI) Act. Understanding the Level of Compliance by South African Institutions to the Protection of Personal Information (POPI) Act.
Yuliya G. Zabyelina. (2015) Reverse money laundering in Russia: clean cash for dirty ends. Journal of Money Laundering Control 18:2, pages 202-219.
Crossref
Patrick Hille, Gianfranco Walsh & Mark Cleveland. (2015) Consumer Fear of Online Identity Theft: Scale Development and Validation. Journal of Interactive Marketing 30, pages 1-19.
Crossref
Eric Holm. (2012) Identity crime: The challenges in the regulation of identity crime. Identity crime: The challenges in the regulation of identity crime.
Chad Albrecht, Conan Albrecht & Shay Tzafrir. (2011) How to protect and minimize consumer risk to identity theft. Journal of Financial Crime 18:4, pages 405-414.
Crossref
D H McKnight, N Lankton & J Tripp. (2011) Social Networking Information Disclosure and Continuance Intention: A Disconnect. Social Networking Information Disclosure and Continuance Intention: A Disconnect.
Gina W. Lane & Daniel Z. Sui. (2010) Geographies of identity theft in the U.S.: understanding spatial and demographic patterns, 2002–2006. GeoJournal 75:1, pages 43-55.
Crossref
Benoit Dupont. (2011) La coévolution du « vol d’identité » et des systèmes de paiement. Criminologie 43:2, pages 247-268.
Crossref
Deborah M. Moscardelli & Richard Divine. (2009) Adolescents' Concern for Privacy When Using the Internet: An Empirical Analysis of Predictors and Relationships With Privacy‐Protecting Behaviors. Family and Consumer Sciences Research Journal 35:3, pages 232-252.
Crossref
WenJie Wang, Yufei Yuan & N. Archer. (2006) A contextual framework for combating identity theft. IEEE Security & Privacy Magazine 4:2, pages 30-38.
Crossref
Dinev & Hart. (2006) Privacy Concerns and Levels of Information Exchange: An Empirical Investigation of Intended e-Services Use. e-Service Journal 4:3, pages 25.
Crossref
Alicia Ladson & Bardo Fraunholz. (2005) Facilitating online privacy on eCommerce websites: an Australian experience. Journal of Information, Communication and Ethics in Society 3:2, pages 59-68.
Crossref
Michael Levi & David S. Wall. (2004) Technologies, Security, and Privacy in the Post-9/11 European Information Society. Journal of Law and Society 31:2, pages 194-220.
Crossref
GEORGE R. MILNE. (2005) How Well Do Consumers Protect Themselves from Identity Theft?. Journal of Consumer Affairs 37:2, pages 388-402.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.