Identity fraud: Unterschied zwischen den Versionen

300 Bytes hinzugefügt ,  13:22, 12. Apr. 2009
K
Zeile 126: Zeile 126:


==Literatur==
==Literatur==
* Choi, K. (2008). Computer Crime Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2(1).


* Hoofnagle, Chris Jay (2007): ''Identity Theft: Making The Known Unknowns Known.'' In: ''Harvard Journal of Law & Technology'', Volume 21, Number 1, Fall 2007. Im Internet abrufbar unter:[http://ssrn.com/abstract=969441]
* Hoofnagle, Chris Jay (2007): ''Identity Theft: Making The Known Unknowns Known.'' In: ''Harvard Journal of Law & Technology'', Volume 21, Number 1, Fall 2007. Im Internet abrufbar unter:[http://ssrn.com/abstract=969441]
:Recherche: 19.07.2008 Letztes Update: unbekannt
:Recherche: 19.07.2008 Letztes Update: unbekannt
* Jaishankar, K. (2008). Identity related Crime in the Cyberspace: Examining Phishing and its impact. International Journal of Cyber Criminology, 2(1).


*McNally, Megan M., Graeme R. Newman (2008) Perspectives on Identity Theft. The Criminal Justice Press.
*McNally, Megan M., Graeme R. Newman (2008) Perspectives on Identity Theft. The Criminal Justice Press.
383

Bearbeitungen