IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Mitigation of Identity Theft in the Information Age

Mitigation of Identity Theft in the Information Age
View Sample PDF
Author(s): Reggie Becker (Emerson Electric, USA), Mark B. Schmidt (St. Cloud State University, USA)and Allen C. Johnston (University of Louisana Monroe, USA)
Copyright: 2007
Pages: 6
Source title: Encyclopedia of Information Ethics and Security
Source Author(s)/Editor(s): Marian Quigley (Monash University, Australia)
DOI: 10.4018/978-1-59140-987-8.ch067

Purchase

View Mitigation of Identity Theft in the Information Age on the publisher's website for pricing and purchasing information.

Abstract

The information age is characterized by unprecedented levels of information sharing, connectivity, and convenience. Along with the expediency afforded us by electronic commerce (e-commerce), online banking, e-mail reminders, and electronic government (e-government) services comes a degree of dependence on the information technology that drives these processes. Moreover, these processes are inherently insecure, thereby generating an unparalleled level of concern for computer security and identity theft, in particular. This article will discuss identity theft techniques and describe how readers can avoid it.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom