Identity fraud: Unterschied zwischen den Versionen

8 Bytes hinzugefügt ,  13:24, 12. Apr. 2009
K
Zeile 127: Zeile 127:
==Literatur==
==Literatur==


* Choi, K. (2008). Computer Crime Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2(1).
* Choi, K. (2008). Computer Crime Victimization and Integrated Theory: An Empirical Assessment. ''International Journal of Cyber Criminology'', 2(1).


* Hoofnagle, Chris Jay (2007): ''Identity Theft: Making The Known Unknowns Known.'' In: ''Harvard Journal of Law & Technology'', Volume 21, Number 1, Fall 2007. Im Internet abrufbar unter:[http://ssrn.com/abstract=969441]
* Hoofnagle, Chris Jay (2007): ''Identity Theft: Making The Known Unknowns Known.'' In: ''Harvard Journal of Law & Technology'', Volume 21, Number 1, Fall 2007. Im Internet abrufbar unter:[http://ssrn.com/abstract=969441]
:Recherche: 19.07.2008 Letztes Update: unbekannt
:Recherche: 19.07.2008 Letztes Update: unbekannt


* Jaishankar, K. (2008). Identity related Crime in the Cyberspace: Examining Phishing and its impact. International Journal of Cyber Criminology, 2(1).
* Jaishankar, K. (2008). Identity related Crime in the Cyberspace: Examining Phishing and its impact. ''International Journal of Cyber Criminology'', 2(1).


*McNally, Megan M., Graeme R. Newman (2008) Perspectives on Identity Theft. The Criminal Justice Press.
*McNally, Megan M., Graeme R. Newman (2008) Perspectives on Identity Theft. The Criminal Justice Press.
383

Bearbeitungen