Skip to results
Modify your search
NARROW
1-2 of 2
Keywords: identity thieves
Sort by
Chapter
Information Security, Law, and Data-Intensive Business Models: Data Control and Social Networking: Irreconcilable Ideas?
Get access
Lilian Edwards and Ian Brown
Published: 06 October 2009
... that identity thieves are making extensive use of personal information disclosed in such virtual spaces to commit fraud, while unaccredited writers of subapplications for these spaces can also gain access and evade security around vast amounts of valuable data. It is argued that although the law may provide...
Chapter
Identity Theft
Lynne M. Vieraitis and Amny Shuraydi
Published: 06 January 2015
... used by identity thieves to steal and convert personally identifying information for financial gain. identity theft identity fraud identity thieves victimizations offending qualitative research Often cited as one of the fastest-growing crimes in the United States and abroad, identity theft...
Advertisement
Advertisement