,

Complete references and links for Identity theft blog

Here are the references and links to additional resources that my have been left out of my post yesterday.

Identity Theft Resources

http://www.legalstoc.com/2009/01/07/ftc-to-congress-enact-standards-to-reduce-identity-theft/?
http://www.howtostopidentitytheftnow.com
www.creditcards.com
www.consumer.gov/idtheft
http://www.cstb.org/web/project_authentication
http://www.humanresources.org/media/resources/resource_209.pdf
http://portal.acm.org/citation.cfm?id=1082290.1082305
http://iospress.metapress.com/content/frcjv8nfemh5dxc9/
http://www.anti-phishing.org/
http://www.verisign.com/products-services/index.html
http://web.njit.edu/~bieber/CIS677F04/stafford-spyware-cais2004.pdf
http://theprivacyplace.org/blog/wp-content/uploads/2008/07/tr-2006-18u.pdf
http://www.springerlink.com/content/w7877437n43u72hq/
http://www.loms-itea.org/deliverables/LOMS_D6.3_v1.0.pdf
http://webpages.cs.luc.edu/~pld/courses/ethics/spr07/rfid/eckfeldt.pdf
http://www.govtech.com/gt/418253
http://www.experian.com/
http://www.transunion.com/
http://www.equifax.com

References

Buell, D. & Sandhu, R. (2003). Identity management. IEEE Computer Society, 1-3.

Milne, G. R. (2003). How well do consumers protect themselves from identity theft? The Journal of Consumer Affairs, (37) (2), 388-402.

Newman, G. R., & McNally, M. M. (2005). Identity theft literature review. Retrieved from http://www.uspi.org/identity%20theft.pdf

Pato, J. (2003). Identity management: Setting context. Trusted Systems Lab, Hewlett-Packard Laboratories.

Rogak, L. (2009). All you need to know to be a smart credit cardholder: 10 things you should know about identity theft.

www.creditcards.com/credit-card-news/help/10-things-you-should-know-about-identity-theft-6000.php

Salow, H. & Thorner, M. (2009). FTC to Congress: Enact standards to reduce identity theft. DLA Piper Publications.

Streat, D. A. (2009) Identity theft and identity management. Technology Report for Week 2, AMDS 8316, Walden University, 2-12.

Swartz, N. (2009). Will red flags detour ID theft? Information Management, 38-41.

Leave a Comment

One Comment

Leave a Reply