Search

Your search keyword '"Identity theft"' showing total 39,404 results

Search Constraints

Start Over You searched for: Descriptor "Identity theft" Remove constraint Descriptor: "Identity theft"
39,404 results on '"Identity theft"'

Search Results

2. Lock down your browser: YOU'LL NEED THIS A STABLE INTERNET CONNECTION

3. What is research data "misuse"? And how can it be prevented or mitigated?

4. Dark Web Activity in the Japanese Language Between 2004 and 2020: A Case Study of the Onion Channel.

5. Guardians of the vault: unmasking online threats and fortifying e-banking security, a systematic review.

6. Consumer Acceptance of Biometric Credit Cards as an Identify Proofing Mechanism.

7. 論身分竊盜與身分冒用之刑事處罰.

8. Why You MUST USE: Don't be afraid of artificial intelligence--it's more useful than you think. Robert Irvine reveals 30 ways that free AI tools can improve everything you do on your PC and online

10. 2024 Annual Program Directory, Winter Edition.

11. KEEPING CURRENT PROBATE.

12. DITCH YOUR OLD PASSWORDS NOW!

13. IoTBlockFin: A Solution to Prevent Loan Scams in India with Integrating IoT and Blockchain for Enhanced Security and Transparency in Loan Processing.

14. FBI-Tipps zum persönlichen Schutz vor KI-Angriffen

15. Why identity security is your best companion for uncharted compliance challenges

16. Phishing mit Word-Dokumenten und QR-Code

17. Job termination scam warns staff of phony Employment Tribunal decision

18. Erneute Phishing-Attacke auf IHK-Unternehmen

19. How to defend Microsoft networks from adversary-in-the-middle attacks

20. Was your last DocuSign-ed bill legitimate? Check again

21. Russian hackers target US officials in a new spear-phishing campaign

22. Die 6 größten Cyberbedrohungen im Gesundheitswesen

23. Okta’s new security standard to be adopted by Google, Microsoft

24. Attackers are using QR codes sneakily crafted in ASCII and blob URLs in phishing emails

25. Behavioral biometrics to detect fake expert profiles during negotiation.

26. Efficient cancelable authentication system based on DRPE and adaptive filter.

27. Dynamic behaviors of a modified computer virus model: Insights into parameters and network attributes.

28. Digital sanctuary: exploring security and privacy concerns of congregants in the virtual church.

29. It pays to be forthcoming: timing of data breach announcement, trust violation, and trust restoration.

30. What enhances or worsens the user-generated metaverse experience? An application of BERTopic to Roblox user eWOM.

31. Robust DeepFake Face Detection Leveraging Xception Model and Novel Snake Optimization Technique.

33. Identifying trends and patterns in offending and victimization on Snapchat: a rapid review.

34. EuGH: Speicherung von Fingerabdrücken auf Personalausweisen ist verfassungsgemäß.

35. Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes.

36. Healthcare provider data breaches – framework for crisis communication and support of patients and healthcare workers in mental healthcare.

37. The Prevalence and Nature of Victimization among First Semester Students at Urban, Hispanic-Serving Institutions (HSIs)

38. "Identity theft" in BRCA1/2: impact of positive genetic test results and risk-reducing interventions.

39. Cyber Insurance Need of the Hour: To Combat Growing Cyber-Attacks within Cyber Space.

40. Mitigating Human Rights Violations Caused by Deepfake Technology.

41. The super‐recogniser advantage extends to the detection of hyper‐realistic face masks.

42. The stock characters in the editorial boards of journals run by predatory publishers.

43. A Digital Forensics Model for the Examination of QR Code and Android App to Investigate Aadhaar Card Identity Fraud.

44. IoT Privacy Risks Revealed.

45. GESTIUNEA RISCULUI DE FRAUDĂ ÎN ACTIVITĂȚILE BANCARE ÎN CADRUL METAVERSE.

46. SAFER SENIOR CITIZENS ONLINE.

47. EuGH: Immaterieller Schadensersatz nach Art. 82 DSGVO beim Identitätsdiebstahl.

48. Was fügt der EuGH in Scalable Capital zur Prüfung von Art. 82 DSGVO hinzu? — Ein weiterer Baustein in der Rechtsprechungslinie zum immateriellen Schadensersatz.

49. User Palmprint authentication for banking system using processing.

50. Best free antivirus: Don't want to pay for a full security suite? We reveal the best free choices, depending on what you're looking for

Catalog

Books, media, physical & digital resources