Identity theft, privacy, and the architecture of vulnerability

被引:0
|
作者
Solove, DJ
机构
关键词
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
引用
收藏
页码:1227 / 1276
页数:50
相关论文
共 50 条
  • [1] The ultimate invasion of privacy: Identity theft
    Aimeur, Esma
    Schonfeld, David
    [J]. 2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 24 - 31
  • [2] Did privacy cause identity theft?
    LoPucki, LM
    [J]. HASTINGS LAW JOURNAL, 2003, 54 (04) : 1277 - 1297
  • [3] A Trust Based Model for Federated Identity Architecture to Mitigate Identity Theft
    Ghazizadeh, Eghbal
    Zamani, Mazdak
    Ab Manan, Jamalul-lail
    Khaleghparast, Reza
    Taherian, Ali
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 376 - 381
  • [4] Privacy and Identity Theft Recovery Planning: An Onion Skin Model
    Alashoor, Tawfiq
    Baskerville, Richard
    Zhu, Ruilin
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 3696 - 3705
  • [5] Identity theft vulnerability Neoliberal governance through crime construction
    Monahan, Torin
    [J]. THEORETICAL CRIMINOLOGY, 2009, 13 (02) : 155 - 176
  • [6] Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices
    Zou, Yixin
    Roundy, Kevin
    Tamersoy, Acar
    Shintre, Saurabh
    Roturier, Johann
    Schaub, Florian
    [J]. PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20), 2020,
  • [7] Identity theft
    Marks, P
    [J]. NEW SCIENTIST, 2005, 187 (2516) : 27 - 27
  • [8] Identity theft
    Anderson, Keith B.
    Durbin, Erik
    Salinger, Michael A.
    [J]. JOURNAL OF ECONOMIC PERSPECTIVES, 2008, 22 (02): : 171 - 192
  • [9] Identity theft!
    Baldwin, P
    [J]. TURBOMACHINERY INTERNATIONAL, 2002, 43 (03) : 6 - 7
  • [10] Social Networks. Benefits, Privacy, and Identity Theft: KSA Case Study
    Al-Daraiseh, Ahmad A.
    Al-Joudi, Afnan S.
    Al-Gahtani, Hanan B.
    Al-Qahtani, Maha S.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (12) : 129 - 143