The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Cyber-Identity Theft
|
Author(s): Angeline Grace Close (University of Georgia, USA, North Georgia College and State University, USA, and University of Nevada, Las Vegas, USA), George M. Zinkhan (University of Georgia, USA)and R. Zachary Finney (University of South Alabama, USA)
Copyright: 2006
Pages: 4
Source title:
Encyclopedia of E-Commerce, E-Government, and Mobile Commerce
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59140-799-7.ch028
Purchase
|
Abstract
Internet technology facilitates “faceless” transactions. At the same time, a new set of risks arises. In this article, we focus on the Internet-related risks associated with identity theft. Specifically, our objectives are to explain electronic-based identity theft (i.e., cyber-identity theft) and to explore the impact of cyber-identity theft on consumers, businesses, organizations and public policies. Our article makes two specific contributions to the identity theft literature: (a) it explains identity theft as it relates to the Internet and (b) it defines key methods of cyber-identity theft.
Related Content
Imen Hilali, Jamel Eddine Gharbi.
© 2026.
32 pages.
|
Thouraya Othman Hmidi.
© 2026.
18 pages.
|
Rupa Rathee, Monika Singh, Inderjeet Maurya.
© 2026.
24 pages.
|
Sihem ben Saad.
© 2026.
32 pages.
|
Hemant Gupta, Swarnava Sengupta, Mrinmoy Bhattacharjee, Sugandha Gajanan Ghadi.
© 2026.
16 pages.
|
Deepali Nilesh Pulekar, Pritesh Pradeep Somani, Vishwanathan Hariharan Iyer, Prachi Wani, Chinmoy Goswami.
© 2026.
36 pages.
|
A. S. Anurag, M. Johnpaul.
© 2026.
32 pages.
|
|
|