Case processing delays and tax account errors increased hardship for victims of identity theft / / Treasury Inspector General for Tax Administration |
Pubbl/distr/stampa | [Washington, D.C.] : , : Treasury Inspector General for Tax Administration, , 2013 |
Descrizione fisica | 1 online resource (27 pages) : color illustrations |
Soggetto topico |
Identity theft
Tax refunds - United States Victims of crimes - Services for - Government policy - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910704977403321 |
[Washington, D.C.] : , : Treasury Inspector General for Tax Administration, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data security breaches : notification laws, legislation and identity theft / / Patricia Diaz and William C. Long, editors |
Pubbl/distr/stampa | New York : , : Nova Publishers, , [2013] |
Descrizione fisica | 1 online resource (134 pages) : color illustrations |
Disciplina | 343.730999 |
Collana | American Political, Economic, and Security Issues |
Soggetto topico |
Data protection - Law and legislation
Computer security Identity theft Disclosure of information - Law and legislation Privacy, Right of |
ISBN | 1-62257-736-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910148708403321 |
New York : , : Nova Publishers, , [2013] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection has improved : however, identity theft continues to result in billions of dollars in potentially fraudulent tax refunds / / Treasury Inspector General for Tax Administration |
Pubbl/distr/stampa | [Washington, D.C.] : , : Treasury Inspector General for Tax Administration, , 2013 |
Descrizione fisica | 1 online resource (34 pages) |
Soggetto topico |
Identity theft
Tax refunds - United States Fraud - Prevention - Government policy - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Detection has improved |
Record Nr. | UNINA-9910704977603321 |
[Washington, D.C.] : , : Treasury Inspector General for Tax Administration, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Federal Trade Commission [[electronic resource] ] : 2006 identity theft survey report / / prepared for Federal Trade Commission ; prepared by Synovate |
Pubbl/distr/stampa | McLean, VA : , : Federal Trade Commission, Synovate, , [2007] |
Descrizione fisica | 1 online resource (108 pages) : illustrations, charts |
Soggetto topico |
False personation
Identity theft Privacy, Right of Consumer protection |
Soggetto genere / forma | Statistics. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Federal Trade Commission |
Record Nr. | UNINA-9910700527803321 |
McLean, VA : , : Federal Trade Commission, Synovate, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Field hearing on Social Security numbers and child identity theft [[electronic resource] ] : hearing before the Subcommittee on Social Security of the Committee on Ways and Means, U.S. House of Representatives, One Hundred Twelfth Congress, first session, September 1, 2011 |
Pubbl/distr/stampa | Washington : , : U.S. G.P.O., , 2012 |
Descrizione fisica | 1 online resource (iii, 80 pages) |
Soggetto topico |
Identity theft - United States
Identity theft - Texas Identification numbers, Personal - Access control - United States Social security records - Access control - United States Fraud - United States Fraud Identification numbers, Personal - Access control Identity theft Social security records - Access control |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Field hearing on Social Security numbers and child identity theft |
Record Nr. | UNINA-9910702060803321 |
Washington : , : U.S. G.P.O., , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The future of identity in financial services : threats, challenges, and opportunities : hearing before the Task Force on Artificial Intelligence of the Committee on Financial Services, U.S. House of Representatives, One Hundred Sixteenth Congress, first session, September 12, 2019 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
Descrizione fisica | 1 online resource (v, 159 pages) : illustrations |
Soggetto topico |
Artificial intelligence
Identity theft Commercial crimes |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Future of identity in financial services |
Record Nr. | UNINA-9910715165003321 |
Washington : , : U.S. Government Publishing Office, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity theft : assessing the problem and efforts to combat it : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, first session, December 15, 2003 |
Descrizione fisica | 1 online resource (iii, 74 p.) |
Altri autori (Persone) | BroderBetsy |
Soggetto topico |
Consumer protection - United States
Identity theft - United States Privacy, Right of - United States Identity theft Witnesses, FTC |
Soggetto non controllato |
Consumer protection
Identity theft Privacy, right of False personation Reference Social science Law |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Identity Theft |
Record Nr. | UNINA-9910689602103321 |
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity Theft and Fraud : Evaluating and Managing Risk / / Norm Archer ... [et al.] |
Autore | Archer Norm |
Pubbl/distr/stampa | Ottawa, ON : , : University of Ottawa Press, , 2012 |
Descrizione fisica | 1 online resource (369 p.) |
Disciplina | 364.16/330971 |
Altri autori (Persone) | ArcherNorman P |
Collana | Critical issues in risk management |
Soggetto topico |
Gestion du risque
Fraude Vol d'identite Gestion du risque - Canada Fraude - Canada - Prevention Fraude - Canada Vol d'identite - Canada - Prevention Vol d'identite - Canada Risk management Fraud Identity theft Risk management - Canada Fraud - Canada - Prevention Fraud - Canada Identity theft - Canada - Prevention Identity theft - Canada |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-06089-5
9786613773968 0-7766-1992-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 Introduction -- Chapter 2 Understanding Identity Theft and Fraud Chapter -- 3 Risk and Trust Chapter -- 4 Information Sources for IDTF -- Chapter 5 The Nature and Scope of IDTF -- Chapter 6 Measuring IDTF -- Chapter 7 Managing the Risks of Data Theft, Identity Theft and Fraud -- Chapter 8 A Lifecycle Approach to Identity Asset Protection -- Chapter 9 Employee Responsibility for Risks to Identity Assets -- Chapter 10 Consumer and Business Perspectives -- Chapter 11 Technical Perspectives on Security -- Chapter 12 Evaluating and Managing Organizational Readiness for Security and IDTF Risks -- Chapter 13 A Research Agenda for Identity Theft and Fraud Risks -- Chapter 14 Monitoring Trends: Indexes of Identity Theft and Fraud -- Chapter 15 Overview of the Book and a Glimpse of the Future -- Glossary. |
Record Nr. | UNINA-9910157816903321 |
Archer Norm | ||
Ottawa, ON : , : University of Ottawa Press, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Identity theft in today's world [[electronic resource] /] / Megan McNally |
Autore | McNally Megan M |
Pubbl/distr/stampa | Santa Barbara, Calif., : Praeger, c2012 |
Descrizione fisica | 1 online resource (229 p.) |
Disciplina | 364.16/33 |
Collana | Global crime and justice |
Soggetto topico |
Identity theft
Identity theft - Prevention |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-36457-3
9786613364579 0-313-37589-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The identity equation -- The identity theft equation -- The universal script -- A matter of perspective -- The life and times of IDT -- Around the beginning -- Somewhere in the middle -- Just below the surface -- The end for now -- Don't be a victim -- Don't panic. |
Record Nr. | UNINA-9910458032303321 |
McNally Megan M | ||
Santa Barbara, Calif., : Praeger, c2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
Autore | Hadnagy Christopher |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2015] |
Descrizione fisica | 1 online resource (227 p.) |
Disciplina |
363.25
363.259680973 |
Soggetto topico |
Phishing
Identity theft |
ISBN | 1-118-95849-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the Amygdala
Wash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological Response Things to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is Caring My Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good" I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source Applications SET: Social-Engineer Toolkit |
Record Nr. | UNINA-9910131151303321 |
Hadnagy Christopher | ||
Indianapolis, Indiana : , : Wiley, , [2015] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|