Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "identity theft"
@article{DBLP:journals/corr/abs-2401-07205, author = {Shiming Wang and Zhe Ji and Liyao Xiang and Hao Zhang and Xinbing Wang and Chenghu Zhou and Bo Li}, title = {Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models}, journal = {CoRR}, volume = {abs/2401.07205}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.07205}, doi = {10.48550/ARXIV.2401.07205}, eprinttype = {arXiv}, eprint = {2401.07205}, timestamp = {Thu, 01 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-07205.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/OkekeE23, author = {Romanus Izuchukwu Okeke and Max Hashem Eiza}, title = {The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: {A} Qualitative Case Study of {UK} Retail Companies}, journal = {Inf. Syst. Frontiers}, volume = {25}, number = {2}, pages = {451--472}, year = {2023}, url = {https://doi.org/10.1007/s10796-022-10326-w}, doi = {10.1007/S10796-022-10326-W}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/OkekeE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metacom/LiPCHW23, author = {Pengyu Li and Lei Pan and Feifei Chen and Thuong N. Hoang and Rui Wang}, title = {TOTPAuth: {A} Time-based One Time Password Authentication Proof-of-Concept against Metaverse User Identity Theft}, booktitle = {{IEEE} International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023}, pages = {662--665}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MetaCom57706.2023.00117}, doi = {10.1109/METACOM57706.2023.00117}, timestamp = {Thu, 21 Mar 2024 17:12:49 +0100}, biburl = {https://dblp.org/rec/conf/metacom/LiPCHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/OgbanufeP22, author = {Obi Ogbanufe and Robert Pavur}, title = {Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection}, journal = {Int. J. Inf. Manag.}, volume = {62}, pages = {102432}, year = {2022}, url = {https://doi.org/10.1016/j.ijinfomgt.2021.102432}, doi = {10.1016/J.IJINFOMGT.2021.102432}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/OgbanufeP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NgugiHL22, author = {Benjamin K. Ngugi and Kuo{-}Ting Hung and Yuanxiang John Li}, title = {Reducing tax identity theft by identifying vulnerability points in the electronic tax filing process}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {173--189}, year = {2022}, url = {https://doi.org/10.1108/ICS-05-2021-0056}, doi = {10.1108/ICS-05-2021-0056}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NgugiHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SalamDW22, author = {Al Farooq Salam and Hua Dai and Lei Wang}, title = {Online Users' Identity Theft and Coping Strategies, Attribution and Sense of Urgency: {A} Non-Linear Quadratic Effect Assessment}, journal = {Inf. Syst. Frontiers}, volume = {24}, number = {6}, pages = {1929--1948}, year = {2022}, url = {https://doi.org/10.1007/s10796-021-10194-w}, doi = {10.1007/S10796-021-10194-W}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/SalamDW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/WangZY22, author = {Cheng Wang and Hangyu Zhu and Bo Yang}, title = {Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {9}, number = {2}, pages = {428--439}, year = {2022}, url = {https://doi.org/10.1109/TCSS.2021.3092007}, doi = {10.1109/TCSS.2021.3092007}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcss/WangZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiiot/FairclothHCB22, author = {Christopher Faircloth and Gavin Hartzell and Nathan Callahan and Suman Bhunia}, title = {A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft}, booktitle = {2022 {IEEE} World {AI} IoT Congress (AIIoT), Seattle, WA, USA, June 6-9, 2022}, pages = {501--507}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AIIoT54504.2022.9817175}, doi = {10.1109/AIIOT54504.2022.9817175}, timestamp = {Wed, 19 Jul 2023 12:22:41 +0200}, biburl = {https://dblp.org/rec/conf/aiiot/FairclothHCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JannettMMS22, author = {Louis Jannett and Vladislav Mladenov and Christian Mainka and J{\"{o}}rg Schwenk}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{DISTINCT:} Identity Theft using In-Browser Communications in Dual-Window Single Sign-On}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1553--1567}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560692}, doi = {10.1145/3548606.3560692}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JannettMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/Rajaram22, author = {Nivedha Rajaram}, editor = {Hong Va Leong and Sahra Sedigh Sarvestani and Yuuichi Teranishi and Alfredo Cuzzocrea and Hiroki Kashiwazaki and Dave Towey and Ji{-}Jiang Yang and Hossain Shahriar}, title = {Online Identity Theft Index Scorer and Recommendation Service}, booktitle = {46th {IEEE} Annual Computers, Software, and Applications Conferenc, {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022}, pages = {407--408}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COMPSAC54236.2022.00064}, doi = {10.1109/COMPSAC54236.2022.00064}, timestamp = {Thu, 11 Aug 2022 16:32:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/Rajaram22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/YeGZCLGCWC22, author = {Qiongzan Ye and Yangbo Gao and Zhenhua Zhang and Yu Chen and Yupeng Li and Min Gao and Shutong Chen and Xin Wang and Yang Chen}, title = {Modeling Access Environment and Behavior Sequence for Financial Identity Theft Detection in E-Commerce Services}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua, Italy, July 18-23, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IJCNN55064.2022.9892383}, doi = {10.1109/IJCNN55064.2022.9892383}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/YeGZCLGCWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vsip/TrabelsiPD22, author = {Anis Trabelsi and Marc Pic and Jean{-}Luc Dugelay}, title = {Recapture Detection to Fight Deep Identity Theft}, booktitle = {Proceedings of the 4th International Conference on Video, Signal and Image Processing, {VSIP} 2022, Shanghai, China, November 25-27, 2022}, pages = {37--42}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3577164.3577170}, doi = {10.1145/3577164.3577170}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vsip/TrabelsiPD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijec/Vaithyasubramanian21, author = {S. Vaithyasubramanian and Saravanan Devaraj and C. K. Kirubhashankar}, title = {Communal Fraud Detection Algorithm for Establishing Identity Thefts in Online Shopping}, journal = {Int. J. e Collab.}, volume = {17}, number = {3}, pages = {75--84}, year = {2021}, url = {https://doi.org/10.4018/IJeC.2021070105}, doi = {10.4018/IJEC.2021070105}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijec/Vaithyasubramanian21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitr/Awuah-OffeiY21, author = {Kwame Awuah{-}Offei and Winfred Yaokumah}, title = {Cyber-Identity Theft and Fintech Services}, journal = {J. Inf. Technol. Res.}, volume = {14}, number = {3}, pages = {1--19}, year = {2021}, url = {https://doi.org/10.4018/jitr.2021070101}, doi = {10.4018/JITR.2021070101}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jitr/Awuah-OffeiY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/QianT21, author = {Junjie (Henry) Qian and H{\"{u}}seyin Tanriverdi}, editor = {Joe S. Valacich and Anitesh Barua and Ryan T. Wright and Atreyi Kankanhalli and Xitong Li and Shaila Miranda}, title = {Digital and Physical Mechanisms of Financial Frauds and Identity Theft}, booktitle = {Proceedings of the 42nd International Conference on Information Systems, {ICIS} 2021, Building Sustainability and Resilience with {IS:} {A} Call for Action, Austin, TX, USA, December 12-15, 2021}, publisher = {Association for Information Systems}, year = {2021}, url = {https://aisel.aisnet.org/icis2021/cyber\_security/cyber\_security/12}, timestamp = {Sun, 16 Apr 2023 13:39:53 +0200}, biburl = {https://dblp.org/rec/conf/icis/QianT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bis/ZaeemB20, author = {Razieh Nokhbeh Zaeem and K. Suzanne Barber}, editor = {Witold Abramowicz and Gary Klein}, title = {How Much Identity Management with Blockchain Would Have Saved Us? {A} Longitudinal Study of Identity Theft}, booktitle = {Business Information Systems Workshops - {BIS} 2020 International Workshops, Colorado Springs, CO, USA, June 8-10, 2020, Revised Selected Papers}, series = {Lecture Notes in Business Information Processing}, volume = {394}, pages = {158--168}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61146-0\_13}, doi = {10.1007/978-3-030-61146-0\_13}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bis/ZaeemB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ZouRTSRS20, author = {Yixin Zou and Kevin A. Roundy and Acar Tamersoy and Saurabh Shintre and Johann Roturier and Florian Schaub}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--15}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376570}, doi = {10.1145/3313831.3376570}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/ZouRTSRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/JibrilKNAPC20, author = {Abdul Bashiru Jibril and Michael Adu Kwarteng and Fortune Nwaiwu and Christina Appiah{-}Nimo and Michal Pilik and Miloslava Chovancova}, editor = {Mari{\'{e}} Hattingh and Machdel Matthee and Hanlie Smuts and Ilias O. Pappas and Yogesh K. Dwivedi and Matti M{\"{a}}ntym{\"{a}}ki}, title = {Online Identity Theft on Consumer Purchase Intention: {A} Mediating Role of Online Security and Privacy Concern}, booktitle = {Responsible Design, Implementation and Use of Information and Communication Technology - 19th {IFIP} {WG} 6.11 Conference on e-Business, e-Services, and e-Society, {I3E} 2020, Skukuza, South Africa, April 6-8, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12067}, pages = {147--158}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45002-1\_13}, doi = {10.1007/978-3-030-45002-1\_13}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/JibrilKNAPC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MalderleBMW020, author = {Timo Malderle and Felix Boes and Gina Muuss and Matthias W{\"{u}}bbeling and Michael Meier}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Credential Intelligence Agency: {A} Threat Intelligence Approach to Mitigate Identity Theft}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {115--138}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_6}, doi = {10.1007/978-3-030-94900-6\_6}, timestamp = {Mon, 21 Mar 2022 16:15:19 +0100}, biburl = {https://dblp.org/rec/conf/icissp/MalderleBMW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LiYWR19, author = {Yuan Li and Adel Yazdanmehr and Jingguo Wang and H. Raghav Rao}, title = {Responding to identity theft: {A} victimization perspective}, journal = {Decis. Support Syst.}, volume = {121}, pages = {13--24}, year = {2019}, url = {https://doi.org/10.1016/j.dss.2019.04.002}, doi = {10.1016/J.DSS.2019.04.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/LiYWR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejlt/Vettermann19, author = {Oliver Vettermann}, title = {Self-made Data Protection - is it Enough? Prevention and After-care of Identity Theft}, journal = {Eur. J. Law Technol.}, volume = {10}, number = {1}, year = {2019}, url = {http://ejlt.org/index.php/ejlt/article/view/673}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejlt/Vettermann19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/WalshSHHT19, author = {Gianfranco Walsh and Edward Shiu and Louise Hassan and Patrick Hille and Ikuo Takahashi}, title = {Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development}, journal = {Inf. Syst. Frontiers}, volume = {21}, number = {6}, pages = {1251--1264}, year = {2019}, url = {https://doi.org/10.1007/s10796-019-09958-2}, doi = {10.1007/S10796-019-09958-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/WalshSHHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itl/SaeedISK19, author = {Dawer Saeed and Razi Iqbal and Hafiz Husnain Raza Sherazi and Muhammad Usman Ghani Khan}, title = {Evaluating Near-Field Communication tag security for identity theft prevention}, journal = {Internet Technol. Lett.}, volume = {2}, number = {5}, year = {2019}, url = {https://doi.org/10.1002/itl2.123}, doi = {10.1002/ITL2.123}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itl/SaeedISK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itp/MaitloAPS19, author = {Abdullah Maitlo and Nisreen Ameen and Hamid Reza Peikari and Mahmood Hussain Shah}, title = {Preventing identity theft}, journal = {Inf. Technol. People}, volume = {32}, number = {5}, pages = {1184--1214}, year = {2019}, url = {https://doi.org/10.1108/ITP-05-2018-0255}, doi = {10.1108/ITP-05-2018-0255}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itp/MaitloAPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jkm/ShahM0Y19, author = {Mahmood Hussain Shah and Abdullah Maitlo and Paul Jones and Yahaya Y. Yusuf}, title = {An investigation into agile learning processes and knowledge sharing practices to prevent identity theft in the online retail organisations}, journal = {J. Knowl. Manag.}, volume = {23}, number = {9}, pages = {1857--1884}, year = {2019}, url = {https://doi.org/10.1108/JKM-06-2018-0370}, doi = {10.1108/JKM-06-2018-0370}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jkm/ShahM0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/BoseL19, author = {Indranil Bose and Alvin Chung Man Leung}, title = {Adoption of Identity Theft Countermeasures and its Short- and Long-Term Impact on Firm Value}, journal = {{MIS} Q.}, volume = {43}, number = {1}, year = {2019}, url = {https://doi.org/10.25300/misq/2019/14192}, doi = {10.25300/MISQ/2019/14192}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/BoseL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/WangYCW19, author = {Cheng Wang and Bo Yang and Jipeng Cui and Chaodong Wang}, title = {Fusing Behavioral Projection Models for Identity Theft Detection in Online Social Networks}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {6}, number = {4}, pages = {637--648}, year = {2019}, url = {https://doi.org/10.1109/TCSS.2019.2917003}, doi = {10.1109/TCSS.2019.2917003}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/WangYCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/see/DadkhahLB18, author = {Mehdi Dadkhah and Mohammad Lagzian and Glenn Borchardt}, title = {Identity Theft in the Academic World Leads to Junk Science}, journal = {Sci. Eng. Ethics}, volume = {24}, number = {1}, pages = {287--290}, year = {2018}, url = {https://doi.org/10.1007/s11948-016-9867-x}, doi = {10.1007/S11948-016-9867-X}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/see/DadkhahLB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LiYWR18, author = {Yuan Li and Adel Yazdanmehr and Jingguo Wang and H. Raghav Rao}, title = {How Do You Cope: Individuals' Responses to Identity Theft Victimization}, booktitle = {24th Americas Conference on Information Systems, {AMCIS} 2018, New Orleans, LA, USA, August 16-18, 2018}, publisher = {Association for Information Systems}, year = {2018}, url = {https://aisel.aisnet.org/amcis2018/Security/Presentations/42}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/LiYWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egose/KalvetTU18, author = {Tarmo Kalvet and Marek Tiits and Pille Ubakivi{-}Hadachi}, editor = {Andrei V. Chugunov and Yuri Misnikov and Evgeny Roshchin and Dmitrii Trutnev}, title = {Risks and Societal Implications of Identity Theft}, booktitle = {Electronic Governance and Open Society: Challenges in Eurasia - 5th International Conference, {EGOSE} 2018, St. Petersburg, Russia, November 14-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {947}, pages = {67--81}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-13283-5\_6}, doi = {10.1007/978-3-030-13283-5\_6}, timestamp = {Mon, 06 Apr 2020 18:35:38 +0200}, biburl = {https://dblp.org/rec/conf/egose/KalvetTU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/Shaikh18, author = {Asif Shaikh}, editor = {Constantine Stephanidis}, title = {Shadow-IT System and Insider Threat: An Assessment of an Opportunity Dimension for the Identity Theft}, booktitle = {{HCI} International 2018 - Posters' Extended Abstracts - 20th International Conference, {HCI} International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part {III}}, series = {Communications in Computer and Information Science}, volume = {852}, pages = {314--317}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92285-0\_44}, doi = {10.1007/978-3-319-92285-0\_44}, timestamp = {Mon, 09 Jul 2018 16:15:21 +0200}, biburl = {https://dblp.org/rec/conf/hci/Shaikh18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/WalshHSHT18, author = {Gianfranco Walsh and Patrick Hille and Edward Shiu and Louise Hassan and Ikuo Takahashi}, editor = {Jan Pries{-}Heje and Sudha Ram and Michael Rosemann}, title = {Cross-Cultural Fear of Online Identity Theft: {A} Comparison Study and Scale Refinement}, booktitle = {Proceedings of the International Conference on Information Systems - Bridging the Internet of People, Data, and Things, {ICIS} 2018, San Francisco, CA, USA, December 13-16, 2018}, publisher = {Association for Information Systems}, year = {2018}, url = {https://aisel.aisnet.org/icis2018/security/Presentations/1}, timestamp = {Tue, 22 Jan 2019 10:41:07 +0100}, biburl = {https://dblp.org/rec/conf/icis/WalshHSHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/obd/Concepcion-Sanchez18, author = {Jos{\'{e}} {\'{A}}ngel Concepci{\'{o}}n{-}S{\'{a}}nchez and Jezabel Molina{-}Gil and Pino Caballero{-}Gil and Iv{\'{a}}n Santos{-}Gonz{\'{a}}lez}, title = {Fuzzy Logic System for Identity Theft Detection in Social Networks}, booktitle = {4th International Conference on Big Data Innovations and Applications, Innovate-Data 2018, Barcelona, Spain, August 6-8, 2018}, pages = {65--70}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/Innovate-Data.2018.00017}, doi = {10.1109/INNOVATE-DATA.2018.00017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/obd/Concepcion-Sanchez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-06825, author = {Cheng Wang and Bo Yang}, title = {Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks}, journal = {CoRR}, volume = {abs/1801.06825}, year = {2018}, url = {http://arxiv.org/abs/1801.06825}, eprinttype = {arXiv}, eprint = {1801.06825}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-06825.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZaeemMYB17, author = {Razieh Nokhbeh Zaeem and Monisha Manoharan and Yongpeng Yang and K. Suzanne Barber}, title = {Modeling and analysis of identity threat behaviors through text mining of identity theft stories}, journal = {Comput. Secur.}, volume = {65}, pages = {50--63}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.11.002}, doi = {10.1016/J.COSE.2016.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZaeemMYB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel17i, author = {Hal Berghel}, title = {Equifax and the Latest Round of Identity Theft Roulette}, journal = {Computer}, volume = {50}, number = {12}, pages = {72--76}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.4451227}, doi = {10.1109/MC.2017.4451227}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel17i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globalsip/LorimerDK17, author = {Philip A. K. Lorimer and Victor Ming{-}Fai Diec and Burak Kantarci}, title = {Participatory detection of identity theft on mobile social platforms}, booktitle = {2017 {IEEE} Global Conference on Signal and Information Processing, GlobalSIP 2017, Montreal, QC, Canada, November 14-16, 2017}, pages = {833--837}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GlobalSIP.2017.8309077}, doi = {10.1109/GLOBALSIP.2017.8309077}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globalsip/LorimerDK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/WangYLR17, author = {Jingguo Wang and Adel Yazdanmehr and Yuan Li and H. Raghav Rao}, editor = {Yong Jin Kim and Ritu Agarwal and Jae Kyu Lee}, title = {Opting for Identity Theft Protection Services: The Role of Anticipated Distress}, booktitle = {Proceedings of the International Conference on Information Systems - Transforming Society with Digital Innovation, {ICIS} 2017, Seoul, South Korea, December 10-13, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/icis2017/Security/Presentations/14}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icis/WangYLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istas/GoodeL17, author = {Sigi Goode and David Lacey}, title = {Designing and evaluating two interventions to improve identity theft recovery outcomes}, booktitle = {2017 {IEEE} International Symposium on Technology and Society, {ISTAS} 2017, Sydney, Australia, August 10-11, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISTAS.2017.8318976}, doi = {10.1109/ISTAS.2017.8318976}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/istas/GoodeL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/WangLYJ17, author = {Cheng Wang and Jing Luo and Bo Yang and Changjun Jiang}, editor = {Liehuang Zhu and Sheng Zhong}, title = {On Complementary Effect of Blended Behavioral Analysis for Identity Theft Detection in Mobile Social Networks}, booktitle = {Mobile Ad-hoc and Sensor Networks - 13th International Conference, {MSN} 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {747}, pages = {32--44}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-8890-2\_3}, doi = {10.1007/978-981-10-8890-2\_3}, timestamp = {Sun, 03 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/msn/WangLYJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcomp/WangYL17, author = {Cheng Wang and Bo Yang and Jing Luo}, title = {Identity Theft Detection in Mobile Social Networks Using Behavioral Semantics}, booktitle = {2017 {IEEE} International Conference on Smart Computing, {SMARTCOMP} 2017, Hong Kong, China, May 29-31, 2017}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SMARTCOMP.2017.7947016}, doi = {10.1109/SMARTCOMP.2017.7947016}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartcomp/WangYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/Villar-Rodriguez16, author = {Esther Villar{-}Rodriguez and Javier Del Ser and Ana I. Torre{-}Bastida and Miren Nekane Bilbao and Sancho Salcedo{-}Sanz}, title = {A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {4}, pages = {1385--1395}, year = {2016}, url = {https://doi.org/10.1002/cpe.3633}, doi = {10.1002/CPE.3633}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/Villar-Rodriguez16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecpods/AbubakarZJH16, author = {Aisha Abubakar and Pooneh Bagheri Zadeh and Helge Janicke and Richard Howley}, title = {Root cause analysis {(RCA)} as a preliminary tool into the investigation of identity theft}, booktitle = {2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, United Kingdom, June 13-14, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberSecPODS.2016.7502349}, doi = {10.1109/CYBERSECPODS.2016.7502349}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecpods/AbubakarZJH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/WalshHC16, author = {Gianfranco Walsh and Patrick Hille and Mark Cleveland}, title = {Fearing Online Identity Theft: a Segmentation Study of Online Customers}, booktitle = {24th European Conference on Information Systems, {ECIS} 2016, Istanbul, Turkey, June 12-15, 2016}, pages = {Research--in--Progress Paper 10}, year = {2016}, url = {http://aisel.aisnet.org/ecis2016\_rip/10}, timestamp = {Sat, 12 Nov 2016 17:38:24 +0100}, biburl = {https://dblp.org/rec/conf/ecis/WalshHC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdse/AlbarracinDP16, author = {Camilo Albarracin and Brayan S. Reyes Daza and Octavio J. Salcedo Parra}, editor = {Tran Khanh Dang and Roland R. Wagner and Josef K{\"{u}}ng and Nam Thoai and Makoto Takizawa and Erich J. Neuhold}, title = {Information and Identity Theft Without {ARP} Spoofing in {LAN} Environments}, booktitle = {Future Data and Security Engineering - Third International Conference, {FDSE} 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10018}, pages = {164--171}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48057-2\_11}, doi = {10.1007/978-3-319-48057-2\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/fdse/AlbarracinDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/AlashoorBZ16, author = {Tawfiq Alashoor and Richard L. Baskerville and Ruilin Zhu}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Privacy and Identity Theft Recovery Planning: An Onion Skin Model}, booktitle = {49th Hawaii International Conference on System Sciences, {HICSS} 2016, Koloa, HI, USA, January 5-8, 2016}, pages = {3696--3705}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HICSS.2016.461}, doi = {10.1109/HICSS.2016.461}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/AlashoorBZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/KimK16, author = {A.{-}Young Kim and Tae{-}Sung Kim}, editor = {Ting{-}Peng Liang and Shin{-}Yuan Hung and Patrick Y. K. Chau and She{-}I Chang}, title = {Factors Influencing the Intention to Adopt Identity Theft Protection Services: severity vs Vulnerability}, booktitle = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016, Chiayi, Taiwan, June 27 - July 1, 2016}, pages = {68}, year = {2016}, url = {http://aisel.aisnet.org/pacis2016/68}, timestamp = {Tue, 08 Nov 2016 09:28:09 +0100}, biburl = {https://dblp.org/rec/conf/pacis/KimK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LaceyZB16, author = {David Lacey and Jim Zaiss and K. Suzanne Barber}, title = {Understanding victim-enabled identity theft}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {196--202}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906926}, doi = {10.1109/PST.2016.7906926}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/LaceyZB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid16b, author = {Gideon Samid}, title = {Cyber Passport: Preventing Massive Identity Theft}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2016}, url = {http://eprint.iacr.org/2016/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istas/Helser15, author = {Susan Helser}, title = {{FIT:} Identity theft education: Study of text-based versus game-based learning}, booktitle = {2015 {IEEE} International Symposium on Technology and Society, {ISTAS} 2015, Dublin, Ireland, November 11-12, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISTAS.2015.7439437}, doi = {10.1109/ISTAS.2015.7439437}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/istas/Helser15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/SchroersT15, author = {Jessica Schroers and Pagona Tsormpatzoudi}, editor = {David Aspinall and Jan Camenisch and Marit Hansen and Simone Fischer{-}H{\"{u}}bner and Charles D. Raab}, title = {Identity-Theft Through e-Government Services - Government to Pay the Bill?}, booktitle = {Privacy and Identity Management. Time for a Revolution? - 10th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {476}, pages = {253--264}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-41763-9\_17}, doi = {10.1007/978-3-319-41763-9\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/SchroersT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BrenzaPP15, author = {Sebastian Brenza and Andre Pawlowski and Christina P{\"{o}}pper}, title = {A practical investigation of identity theft vulnerabilities in Eduroam}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {14:1--14:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766512}, doi = {10.1145/2766498.2766512}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BrenzaPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/HeCSS14, author = {Bing{-}Zhe He and Chien{-}Ming Chen and Yi{-}Ping Su and Hung{-}Min Sun}, title = {A defence scheme against Identity Theft Attack based on multiple social networks}, journal = {Expert Syst. Appl.}, volume = {41}, number = {5}, pages = {2345--2352}, year = {2014}, url = {https://doi.org/10.1016/j.eswa.2013.09.032}, doi = {10.1016/J.ESWA.2013.09.032}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/HeCSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/Mohan14, author = {Apurva Mohan}, title = {A medical domain collaborative anomaly detection framework for identifying medical identity theft}, booktitle = {2014 International Conference on Collaboration Technologies and Systems, {CTS} 2014, Minneapolis, MN, USA, May 19-23, 2014}, pages = {428--435}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CTS.2014.6867600}, doi = {10.1109/CTS.2014.6867600}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cts/Mohan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/YangMB14, author = {Yongpeng Yang and Monisha Manoharan and K. Suzanne Barber}, title = {Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories}, booktitle = {{IEEE} Joint Intelligence and Security Informatics Conference, {JISIC} 2014, The Hague, The Netherlands, 24-26 September, 2014}, pages = {184--191}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/JISIC.2014.35}, doi = {10.1109/JISIC.2014.35}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/YangMB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/RosoffCJ14, author = {Heather Rosoff and Jinshu Cui and Richard S. John}, editor = {Lorrie Faith Cranor and Lujo Bauer and Robert Biddle}, title = {Behavioral Experiments Exploring Victims' Response to Cyber-based Financial Fraud and Identity Theft Scenario Simulations}, booktitle = {Tenth Symposium on Usable Privacy and Security, {SOUPS} 2014, Menlo Park, CA, USA, July 9-11, 2014}, pages = {175--186}, publisher = {{USENIX} Association}, year = {2014}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/soups/RosoffCJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Richter13, author = {Wolfgang Richter}, title = {The scary reality of identity theft}, journal = {{XRDS}}, volume = {20}, number = {2}, pages = {16}, year = {2013}, url = {https://doi.org/10.1145/2542650}, doi = {10.1145/2542650}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Richter13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/BoseL13, author = {Indranil Bose and Alvin Chung Man Leung}, title = {The impact of adoption of identity theft countermeasures on firm value}, journal = {Decis. Support Syst.}, volume = {55}, number = {3}, pages = {753--763}, year = {2013}, url = {https://doi.org/10.1016/j.dss.2013.03.001}, doi = {10.1016/J.DSS.2013.03.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/BoseL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/BrionesCC13, author = {Jose Maria Briones and Mario Alejandro Coronel and Patricia Chavez{-}Burbano}, title = {Case of Study: Identity Theft in a University WLAN, Evil Twin and Cloned Authentication Web Interface}, journal = {Int. J. Web Appl.}, volume = {5}, number = {2}, pages = {66--73}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n2/2.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/BrionesCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0029553, author = {L. Jean Camp and M. Eric Johnson}, title = {The Economics of Financial and Medical Identity Theft}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-1-4614-1918-1}, doi = {10.1007/978-1-4614-1918-1}, isbn = {978-1-4614-1917-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0029553.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Mik12, author = {Eliza Mik}, title = {Mistaken identity, identity theft and problems of remote authentication in e-commerce}, journal = {Comput. Law Secur. Rev.}, volume = {28}, number = {4}, pages = {396--402}, year = {2012}, url = {https://doi.org/10.1016/j.clsr.2012.03.009}, doi = {10.1016/J.CLSR.2012.03.009}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/clsr/Mik12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel12, author = {Hal Berghel}, title = {Identity Theft and Financial Fraud: Some Strangeness in the Proportions}, journal = {Computer}, volume = {45}, number = {1}, pages = {86--89}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.16}, doi = {10.1109/MC.2012.16}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LaiLH12, author = {Fujun Lai and Dahui Li and Chang{-}Tseh Hsieh}, title = {Fighting identity theft: The coping perspective}, journal = {Decis. Support Syst.}, volume = {52}, number = {2}, pages = {353--363}, year = {2012}, url = {https://doi.org/10.1016/j.dss.2011.09.002}, doi = {10.1016/J.DSS.2011.09.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/LaiLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eg/SmithS12, author = {Amber A. Smith and Alan D. Smith}, title = {{CRM} and identity theft issues associated with e-ticketing of sports and entertainment}, journal = {Electron. Gov. an Int. J.}, volume = {9}, number = {1}, pages = {1--26}, year = {2012}, url = {https://doi.org/10.1504/EG.2012.044776}, doi = {10.1504/EG.2012.044776}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eg/SmithS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/irmj/ShareefK12, author = {Mahmud Akhter Shareef and Vinod Kumar}, title = {Prevent/Control Identity Theft: Impact on Trust and Consumers' Purchase Intention in {B2C} {EC}}, journal = {Inf. Resour. Manag. J.}, volume = {25}, number = {3}, pages = {30--60}, year = {2012}, url = {https://doi.org/10.4018/irmj.2012070102}, doi = {10.4018/IRMJ.2012070102}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/irmj/ShareefK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GhazizadehZMKT12, author = {Eghbal Ghazizadeh and Mazdak Zamani and Jamalul{-}lail Ab Manan and Reza Khaleghparast and Ali Taherian}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A trust based model for federated identity architecture to mitigate identity theft}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {376--381}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470834/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/GhazizadehZMKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Biri11, author = {Aroua Biri}, title = {Proposition de nouveaux m{\'{e}}canismes de protection contre l'usurpation d'identit{\'{e}} pour les fournisseurs de services Internet. (Proposal for new protections against identity theft for ISPs)}, school = {Telecom {\&} Management SudParis, {\'{E}}vry, Essonne, France}, year = {2011}, url = {https://tel.archives-ouvertes.fr/tel-01166537}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Biri11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GroverBC11, author = {Amit Grover and Hal Berghel and Dennis Cobb}, title = {The State of the Art in Identity Theft}, journal = {Adv. Comput.}, volume = {83}, pages = {1--50}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00001-1}, doi = {10.1016/B978-0-12-385510-7.00001-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GroverBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbdcn/Smith11, author = {Alan D. Smith}, title = {Linking the Popularity of Online Trading with Consumers' Concerns for Reputation and Identity Theft}, journal = {Int. J. Bus. Data Commun. Netw.}, volume = {7}, number = {1}, pages = {1--35}, year = {2011}, url = {https://doi.org/10.4018/jbdcn.2011010101}, doi = {10.4018/JBDCN.2011010101}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbdcn/Smith11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/Helser11, author = {S. Helser}, title = {An interdisciplinary approach to address identity theft education}, journal = {{SIGCAS} Comput. Soc.}, volume = {41}, number = {2}, pages = {38--50}, year = {2011}, url = {https://doi.org/10.1145/2095272.2095276}, doi = {10.1145/2095272.2095276}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/Helser11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/PodhradskyDC11, author = {Ashley L. Podhradsky and Rob D'Ovidio and Cindy Casey}, editor = {Vallabh Sambamurthy and Mohan Tanniru}, title = {Identity Theft and Used Gaming Consoles: Recovering Personal Information from Xbox 360 Hard Drives}, booktitle = {A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, {AMCIS} 2011, Detroit, Michigan, USA, August 4-8 2011}, publisher = {Association for Information Systems}, year = {2011}, url = {http://aisel.aisnet.org/amcis2011\_submissions/54}, timestamp = {Thu, 11 Apr 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/PodhradskyDC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/ShahO11, author = {Mahmood Hussain Shah and Romanus Izuchukwu Okeke}, title = {A Framework for Internal Identity Theft Prevention in Retail Industry}, booktitle = {European Intelligence and Security Informatics Conference, {EISIC} 2011, Athens, Greece, September 12-14, 2011}, pages = {366--371}, publisher = {{IEEE} Computer Soecity}, year = {2011}, url = {https://doi.org/10.1109/EISIC.2011.29}, doi = {10.1109/EISIC.2011.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/ShahO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MeucciPP11, author = {Filippo Meucci and Laura Pierucci and Neeli R. Prasad}, title = {Identity Theft Detection Based on Neural Network Non-Linearity Identification in {OFDM} System}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2011, Kyoto, Japan, 5-9 June, 2011}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/icc.2011.5963091}, doi = {10.1109/ICC.2011.5963091}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/MeucciPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istas/Helser11, author = {Susan Helser}, title = {An interdisciplinary approach to address identity theft education}, booktitle = {2011 {IEEE} International Symposium on Technology and Society, {ISTAS} 2011, Chicago, IL, USA, May 23-25, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISTAS.2011.7160601}, doi = {10.1109/ISTAS.2011.7160601}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/istas/Helser11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AimeurS11, author = {Esma A{\"{\i}}meur and David Sch{\"{o}}nfeld}, title = {The ultimate invasion of privacy: Identity theft}, booktitle = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011, 19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada}, pages = {24--31}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PST.2011.5971959}, doi = {10.1109/PST.2011.5971959}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/AimeurS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/Tiller11, author = {James S. Tiller}, editor = {Rebecca Herold}, title = {Identity Theft}, booktitle = {Encyclopedia of Information Assurance}, publisher = {Taylor {\&} Francis}, year = {2011}, url = {https://doi.org/10.1081/E-EIA-120046290}, doi = {10.1081/E-EIA-120046290}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/Tiller11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijuc/NagyNA10, author = {Naya Nagy and Marius Nagy and Selim G. Akl}, title = {Hypercomputation in a Cryptographic Setting: Solving the Identity Theft Problem Using Quantum Memories?}, journal = {Int. J. Unconv. Comput.}, volume = {6}, number = {5}, pages = {375--398}, year = {2010}, url = {http://www.oldcitypublishing.com/journals/ijuc-home/ijuc-issue-contents/ijuc-volume-6-number-5-2010/ijuc-6-5-p-375-398/}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijuc/NagyNA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ciechanowicz10a, author = {Chez Ciechanowicz}, title = {Identity Theft and Reconstruction}, journal = {Inf. Secur. Tech. Rep.}, volume = {15}, number = {2}, pages = {41}, year = {2010}, url = {https://doi.org/10.1016/j.istr.2010.12.001}, doi = {10.1016/J.ISTR.2010.12.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ciechanowicz10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eva/Sporton10, author = {Gregory Sporton}, editor = {Alan Seal and Jonathan P. Bowen and Kia Ng}, title = {Creative identity theft: issues for artists in collaborative online environments}, booktitle = {Electronic Visualisation and the Arts, {EVA} 2010, London, UK, 5-7 July 2010}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2010}, url = {http://ewic.bcs.org/content/ConWebDoc/36086}, timestamp = {Fri, 27 Aug 2021 10:57:10 +0200}, biburl = {https://dblp.org/rec/conf/eva/Sporton10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/RomanoskySA10, author = {Sasha Romanosky and Richard Sharp and Alessandro Acquisti}, title = {Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal?}, booktitle = {9th Annual Workshop on the Economics of Information Security, {WEIS} 2010, Harvard University, Cambridge, MA, USA, June 7-8, 2010}, year = {2010}, url = {http://weis2010.econinfosec.org/papers/session1/weis2010\_romanosky.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:46 +0200}, biburl = {https://dblp.org/rec/conf/weis/RomanoskySA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/forensics/Chen10, author = {Thomas M. Chen}, editor = {Chang{-}Tsun Li}, title = {Identity Theft through the Web}, booktitle = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions}, pages = {379--395}, publisher = {{IGI} Global}, year = {2010}, url = {https://doi.org/10.4018/978-1-60566-836-9.ch016}, doi = {10.4018/978-1-60566-836-9.CH016}, timestamp = {Tue, 16 May 2017 14:01:55 +0200}, biburl = {https://dblp.org/rec/reference/forensics/Chen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eg/RyooOSC09, author = {Jungwoo Ryoo and Tae Hwan Oh and Seungjae Shin and Young B. Choi}, title = {A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems}, journal = {Electron. Gov. an Int. J.}, volume = {6}, number = {1}, pages = {19--40}, year = {2009}, url = {https://doi.org/10.1504/EG.2009.022591}, doi = {10.1504/EG.2009.022591}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eg/RyooOSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MoirW09, author = {Iain Moir and George R. S. Weir}, title = {Contact centres and identity theft}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {2}, number = {1}, pages = {92--100}, year = {2009}, url = {https://doi.org/10.1504/IJESDF.2009.023879}, doi = {10.1504/IJESDF.2009.023879}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MoirW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/interactions/Whitson09, author = {Jennifer R. Whitson}, title = {Feature - Identity theft and the challenges of caring for your virtual self}, journal = {Interactions}, volume = {16}, number = {2}, pages = {41--45}, year = {2009}, url = {https://doi.org/10.1145/1487632.1487642}, doi = {10.1145/1487632.1487642}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/interactions/Whitson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aciids/Kolaczek09, author = {Grzegorz Kolaczek}, editor = {Ngoc Thanh Nguyen and Huynh Phan Nguyen and Adam Grzech}, title = {An Approach to Identity Theft Detection Using Social Network Analysis}, booktitle = {First Asian Conference on Intelligent Information and Database Systems, {ACIIDS} 2009, Dong hoi, Quang binh, Vietnam, April 1-3, 2009}, pages = {78--81}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACIIDS.2009.44}, doi = {10.1109/ACIIDS.2009.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aciids/Kolaczek09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/KlenkKEC09, author = {Andreas Klenk and Holger Kinkelin and Christoph Eunicke and Georg Carle}, editor = {Evangelos P. Markatos and Manuel Costa}, title = {Preventing identity theft with electronic identity cards and the trusted platform module}, booktitle = {Proceedings of the Second European Workshop on System Security, {EUROSEC} 2009, Nuremburg, Germany, March 31, 2009}, pages = {44--51}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1519144.1519151}, doi = {10.1145/1519144.1519151}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/KlenkKEC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/SchulzeS09, author = {Marion Schulze and Mahmood Hussain Shah}, editor = {Claude Godart and Norbert Gronau and Sushil K. Sharma and G{\'{e}}r{\^{o}}me Canals}, title = {The Step Method - Battling Identity Theft Using E-Retailers' Websites}, booktitle = {Software Services for e-Business and e-Society, 9th {IFIP} {WG} 6.1 Conference on e-Business, e-Services and e-Society, {I3E} 2009, Nancy, France, September 23-25, 2009. Proceedings}, series = {{IFIP}}, volume = {305}, pages = {173--183}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04280-5\_15}, doi = {10.1007/978-3-642-04280-5\_15}, timestamp = {Tue, 14 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/i3e/SchulzeS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MoskovitchFMKMCLHMRE09, author = {Robert Moskovitch and Clint Feher and Arik Messerman and Niklas Kirschnick and Tarik Mustafic and Seyit Ahmet {\c{C}}amtepe and Bernhard L{\"{o}}hlein and Ulrich Heister and Sebastian M{\"{o}}ller and Lior Rokach and Yuval Elovici}, title = {Identity theft, computers and behavioral biometrics}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings}, pages = {155--160}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISI.2009.5137288}, doi = {10.1109/ISI.2009.5137288}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MoskovitchFMKMCLHMRE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/RoberdsS09, author = {William Roberds and Stacey L. Schreft}, title = {Data Breaches and Identity Theft}, booktitle = {8th Annual Workshop on the Economics of Information Security, {WEIS} 2009, University College London, England, UK, June 24-25, 2009}, year = {2009}, url = {http://weis09.infosecon.net/files/121/index.html}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/RoberdsS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/BilgeSBK09, author = {Leyla Bilge and Thorsten Strufe and Davide Balzarotti and Engin Kirda}, editor = {Juan Quemada and Gonzalo Le{\'{o}}n and Yo{\"{e}}lle S. Maarek and Wolfgang Nejdl}, title = {All your contacts are belong to us: automated identity theft attacks on social networks}, booktitle = {Proceedings of the 18th International Conference on World Wide Web, {WWW} 2009, Madrid, Spain, April 20-24, 2009}, pages = {551--560}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1526709.1526784}, doi = {10.1145/1526709.1526784}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/BilgeSBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/bio/X09qi, editor = {Stan Z. Li and Anil K. Jain}, title = {Identity Theft Reduction}, booktitle = {Encyclopedia of Biometrics}, pages = {715}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-73003-5\_2265}, doi = {10.1007/978-0-387-73003-5\_2265}, timestamp = {Fri, 27 Oct 2017 15:34:05 +0200}, biburl = {https://dblp.org/rec/reference/bio/X09qi.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmc/KoongLBL08, author = {Kai S. Koong and Lai C. Liu and Shuming Bai and Binshan Lin}, title = {Identity theft in the {USA:} evidence from 2002 to 2006}, journal = {Int. J. Mob. Commun.}, volume = {6}, number = {2}, pages = {199--216}, year = {2008}, url = {https://doi.org/10.1504/IJMC.2008.016577}, doi = {10.1504/IJMC.2008.016577}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmc/KoongLBL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KlingsheimH08, author = {Andr{\'{e}} N. Klingsheim and Kjell J{\o}rgen Hole}, editor = {Gene Tsudik}, title = {Identity Theft: Much Too Easy? {A} Study of Online Systems in Norway}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {192--196}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_17}, doi = {10.1007/978-3-540-85230-8\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/KlingsheimH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isips/Crescenzo08, author = {Giovanni Di Crescenzo}, editor = {Cecilia S. Gal and Paul B. Kantor and Michael E. Lesk}, title = {On the Statistical Dependency of Identity Theft on Demographics}, booktitle = {Protecting Persons While Protecting the People, Second Annual Workshop on Information Privacy and National Security, {ISIPS} 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5661}, pages = {122--137}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-10233-2\_12}, doi = {10.1007/978-3-642-10233-2\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/isips/Crescenzo08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Tallon08, author = {Mar{\'{\i}}a Luisa Garc{\'{\i}}a Tall{\'{o}}n}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain}, booktitle = {{ISSE} 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain}, pages = {307--312}, publisher = {Vieweg+Teubner}, year = {2008}, url = {https://doi.org/10.1007/978-3-8348-9283-6\_32}, doi = {10.1007/978-3-8348-9283-6\_32}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/Tallon08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/RomanoskyTA08, author = {Sasha Romanosky and Rahul Telang and Alessandro Acquisti}, title = {Do Data Breaches Disclosure Laws Reduce Identity Theft?}, booktitle = {7th Annual Workshop on the Economics of Information Security, {WEIS} 2008, Dartmouth College, Hanover, NH, USA, June 25-28, 2008}, year = {2008}, url = {http://weis2008.econinfosec.org/papers/Romanosky.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/RomanoskyTA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0029552, author = {L. Jean Camp}, title = {Economics of Identity Theft - Avoidance, Causes and Possible Cures}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-68614-1}, doi = {10.1007/978-0-387-68614-1}, isbn = {978-0-387-34589-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0029552.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bliss/LinYQ07, author = {Kun Lin and Lin Yuan and Gang Qu}, editor = {Adrian Stoica and Tughrul Arslan and Daniel Howard and Tai{-}Hoon Kim and Ahmed O. El{-}Rayis}, title = {SecureGo: {A} Hardware-Software Co-Protection against Identity Theft in Online Transaction}, booktitle = {2007 {ECSIS} Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, {BLISS} 2007, Edinburgh, United Kingdom, 9-10 August 2007}, pages = {59--64}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/BLISS.2007.30}, doi = {10.1109/BLISS.2007.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bliss/LinYQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SteynKD07, author = {Tjaart Steyn and Hennie A. Kruger and Lynette Drevin}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {Identity Theft - Empirical evidence from a Phishing Exercise}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {193--203}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_17}, doi = {10.1007/978-0-387-72367-9\_17}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SteynKD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/ethics/BeckerSJ07, author = {Reggie Becker and Mark B. Schmidt and Allen C. Johnston}, editor = {Marian Quigley}, title = {Mitigation of Identity Theft in the Information Age}, booktitle = {Encyclopedia of Information Ethics and Security}, pages = {451--456}, publisher = {{IGI} Global}, year = {2007}, url = {http://www.igi-global.com/Bookstore/chapter.aspx?titleid=13510}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/ethics/BeckerSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/ethics/Mahmood07, author = {Omer Mahmood}, editor = {Marian Quigley}, title = {Dilemmas of Online Identity Theft}, booktitle = {Encyclopedia of Information Ethics and Security}, pages = {143--149}, publisher = {{IGI} Global}, year = {2007}, url = {http://www.igi-global.com/Bookstore/chapter.aspx?titleid=13465}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/ethics/Mahmood07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Mercuri06, author = {Rebecca T. Mercuri}, title = {Scoping identity theft}, journal = {Commun. {ACM}}, volume = {49}, number = {5}, pages = {17--21}, year = {2006}, url = {https://doi.org/10.1145/1125944.1125961}, doi = {10.1145/1125944.1125961}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Mercuri06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KoopsL06, author = {Bert{-}Jaap Koops and Ronald Leenes}, title = {Identity theft, identity fraud and/or identity-related crime - Definitions matter}, journal = {Datenschutz und Datensicherheit}, volume = {30}, number = {9}, pages = {553--556}, year = {2006}, url = {https://doi.org/10.1007/s11623-006-0141-2}, doi = {10.1007/S11623-006-0141-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KoopsL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WangYA06, author = {Wenjie Wang and Yufei Yuan and Norman P. Archer}, title = {A Contextual Framework for Combating Identity Theft}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {2}, pages = {30--38}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.31}, doi = {10.1109/MSP.2006.31}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/WangYA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Sweeney06, author = {Latanya Sweeney}, title = {Protecting Job Seekers from Identity Theft}, journal = {{IEEE} Internet Comput.}, volume = {10}, number = {2}, pages = {74--78}, year = {2006}, url = {https://doi.org/10.1109/MIC.2006.40}, doi = {10.1109/MIC.2006.40}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Sweeney06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/ChenH06, author = {Thomas Chen and Peter Henry}, title = {A Review of: "\emph{Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft}. By Markus Jakobsson and Steven Myers, Editors"}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {147--149}, year = {2006}, url = {https://doi.org/10.1080/15567280601044580}, doi = {10.1080/15567280601044580}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/ChenH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Emigh06, author = {Aaron Emigh}, title = {The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {245--260}, year = {2006}, url = {https://doi.org/10.1080/15567280601049985}, doi = {10.1080/15567280601049985}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Emigh06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Henry06, author = {Peter Henry}, title = {A Review of: "\emph{Phishing Exposed: Uncover Secrets from the Dark Side}. By Lance James \emph{Phishing: Cutting the Identity Theft Line}. By Rachel Lininger and Russell Dean Uines"}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {261--262}, year = {2006}, url = {https://doi.org/10.1080/15567280601047492}, doi = {10.1080/15567280601047492}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Henry06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Delaitre06, author = {Sabine Dela{\^{\i}}tre}, title = {Risk Management approach on identity theft in biometric systems context}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {982}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.113}, doi = {10.1109/ARES.2006.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Delaitre06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Luong06, author = {Kim Luong}, title = {The other side of identity theft: not just a financial concern}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {152--155}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231081}, doi = {10.1145/1231047.1231081}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Luong06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Newman06, author = {Robert C. Newman}, title = {Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {68--78}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231064}, doi = {10.1145/1231047.1231064}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/Newman06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/Bose06, author = {Ranjit Bose}, title = {Intelligent Technologies for Managing Fraud and Identity Theft}, booktitle = {Third International Conference on Information Technology: New Generations {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}}, pages = {446--451}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ITNG.2006.78}, doi = {10.1109/ITNG.2006.78}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/Bose06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/MarshallT05, author = {Angus M. Marshall and Brian C. Tompsett}, title = {Identity theft in an online world}, journal = {Comput. Law Secur. Rev.}, volume = {21}, number = {2}, pages = {128--137}, year = {2005}, url = {https://doi.org/10.1016/j.clsr.2005.02.004}, doi = {10.1016/J.CLSR.2005.02.004}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/clsr/MarshallT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsonline/Goth05h, author = {Greg Goth}, title = {Identity Theft Solutions Disagree on Problem}, journal = {{IEEE} Distributed Syst. Online}, volume = {6}, number = {8}, year = {2005}, url = {https://doi.org/10.1109/MDSO.2005.41}, doi = {10.1109/MDSO.2005.41}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsonline/Goth05h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eg/Smith05a, author = {Alan D. Smith}, title = {Identity theft as a threat to {CRM} and e-commerce}, journal = {Electron. Gov. an Int. J.}, volume = {2}, number = {2}, pages = {219--246}, year = {2005}, url = {https://doi.org/10.1504/EG.2005.007096}, doi = {10.1504/EG.2005.007096}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eg/Smith05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijeis/SmithL05, author = {Alan D. Smith and Allen R. Lias}, title = {Identity Theft and E-Fraud as Critical {CRM} Concerns}, journal = {Int. J. Enterp. Inf. Syst.}, volume = {1}, number = {2}, pages = {17--36}, year = {2005}, url = {https://doi.org/10.4018/jeis.2005040102}, doi = {10.4018/JEIS.2005040102}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijeis/SmithL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tasm/Elbirt05, author = {Adam J. Elbirt}, title = {Who are you? How to protect against identity theft}, journal = {{IEEE} Technol. Soc. Mag.}, volume = {24}, number = {2}, pages = {5--8}, year = {2005}, url = {https://doi.org/10.1109/MTAS.2005.1442375}, doi = {10.1109/MTAS.2005.1442375}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tasm/Elbirt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/Sweeney05, author = {Latanya Sweeney}, title = {{AI} Technologies to Defeat Identity Theft Vulnerabilities}, booktitle = {{AI} Technologies for Homeland Security, Papers from the 2005 {AAAI} Spring Symposium, Technical Report SS-05-01, Stanford, California, USA, March 21-23, 2005}, pages = {136--138}, publisher = {{AAAI}}, year = {2005}, url = {http://www.aaai.org/Library/Symposia/Spring/2005/ss05-01-024.php}, timestamp = {Sat, 18 Feb 2012 12:25:28 +0100}, biburl = {https://dblp.org/rec/conf/aaaiss/Sweeney05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/YurcikL05, author = {William Yurcik and Chao Liu}, title = {A first step toward detecting {SSH} identity theft in {HPC} cluster environments: discriminating masqueraders based on command behavior}, booktitle = {5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 9-12 May, 2005, Cardiff, {UK}}, pages = {111--120}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CCGRID.2005.1558542}, doi = {10.1109/CCGRID.2005.1558542}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/YurcikL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/MadsenKT05, author = {Paul Madsen and Yuzo Koga and Kenji Takahashi}, editor = {Vijay Atluri and Pierangela Samarati and Atsuhiro Goto}, title = {Federated identity management for protecting users from {ID} theft}, booktitle = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005}, pages = {77--83}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102486.1102500}, doi = {10.1145/1102486.1102500}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dim/MadsenKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/MoustakasDR05, author = {Evangelos Moustakas and Penny Duquenoy and C. Ranganathan}, title = {Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {239--248}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Thu, 23 Jun 2016 15:53:29 +0200}, biburl = {https://dblp.org/rec/conf/eciw/MoustakasDR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/OorschotS05, author = {Paul C. van Oorschot and Stuart G. Stubblebine}, editor = {Andrew S. Patrick and Moti Yung}, title = {Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {31--43}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_3}, doi = {10.1007/11507840\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/OorschotS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/human/KwonM05, author = {Taekyoung Kwon and Hyeonjoon Moon}, editor = {Shinji Shimojo and Shingo Ichii and Tok Wang Ling and Kwan Ho Song}, title = {Multi-modal Techniques for Identity Theft Prevention}, booktitle = {Web and Communication Technologies and Internet-Related Social Issues - {HSI} 2005, 3rd International Conference on Human.Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3597}, pages = {291--300}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11527725\_30}, doi = {10.1007/11527725\_30}, timestamp = {Sat, 19 Oct 2019 20:10:03 +0200}, biburl = {https://dblp.org/rec/conf/human/KwonM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/SohV04, author = {Gim Hiong Soh and Timo Vuori}, title = {New Form of Identity {(ID)} Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {27--36}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 09:42:27 +0100}, biburl = {https://dblp.org/rec/conf/aism/SohV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LuA04, author = {HongQian Karen Lu and Asad M. Ali}, editor = {Kan Zhang and Yuliang Zheng}, title = {Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {342--353}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_29}, doi = {10.1007/978-3-540-30144-8\_29}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/isw/LuA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChouLTM04, author = {Neil Chou and Robert Ledesma and Yuka Teraguchi and John C. Mitchell}, title = {Client-Side Defense Against Web-Based Identity Theft}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2004, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2004}, url = {https://www.ndss-symposium.org/ndss2004/client-side-defense-against-web-based-identity-theft/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChouLTM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ShostackS04, author = {Adam Shostack and Paul Syverson}, editor = {L. Jean Camp and Stephen Lewis}, title = {What Price Privacy? - and why identity theft is about neither identity nor theft}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {129--142}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_10}, doi = {10.1007/1-4020-8090-5\_10}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/ShostackS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/McCarty03a, author = {Bill McCarty}, title = {Automated Identity Theft}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {5}, pages = {89--92}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1236244}, doi = {10.1109/MSECP.2003.1236244}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/McCarty03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Fichtman01, author = {Paul Fichtman}, title = {Preventing Credit Card Fraud and Identity Theft: {A} Primer for Online Merchants}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {10}, number = {5}, pages = {1--8}, year = {2001}, url = {https://doi.org/10.1201/1086/43315.10.5.20011101/31721.8}, doi = {10.1201/1086/43315.10.5.20011101/31721.8}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Fichtman01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Poore01b, author = {Ralph Spencer Poore}, title = {Identity Theft: Who Are You Anyway?}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {10}, number = {3}, pages = {1--6}, year = {2001}, url = {https://doi.org/10.1201/1086/43316.10.3.20010701/31724.3}, doi = {10.1201/1086/43316.10.3.20010701/31724.3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Poore01b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Berghel00, author = {Hal Berghel}, title = {Identity Theft, Social Security Numbers, and the Web}, journal = {Commun. {ACM}}, volume = {43}, number = {2}, pages = {17--21}, year = {2000}, url = {https://doi.org/10.1145/328236.328114}, doi = {10.1145/328236.328114}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Berghel00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.