IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber-Identity Theft

Cyber-Identity Theft
View Sample PDF
Author(s): Angeline Grace Close (University of Georgia, USA, North Georgia College and State University, USA, and University of Nevada, Las Vegas, USA), George M. Zinkhan (University of Georgia, USA)and R. Zachary Finney (University of South Alabama, USA)
Copyright: 2006
Pages: 4
Source title: Encyclopedia of E-Commerce, E-Government, and Mobile Commerce
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59140-799-7.ch028

Purchase

View Cyber-Identity Theft on the publisher's website for pricing and purchasing information.

Abstract

Internet technology facilitates “faceless” transactions. At the same time, a new set of risks arises. In this article, we focus on the Internet-related risks associated with identity theft. Specifically, our objectives are to explain electronic-based identity theft (i.e., cyber-identity theft) and to explore the impact of cyber-identity theft on consumers, businesses, organizations and public policies. Our article makes two specific contributions to the identity theft literature: (a) it explains identity theft as it relates to the Internet and (b) it defines key methods of cyber-identity theft.

Related Content

Simriti Popli, Gabriel Wasswa. © 2024. 12 pages.
Pooja Lekhi. © 2024. 8 pages.
Shailey Singh. © 2024. 12 pages.
Shailey Singh. © 2024. 9 pages.
Tanuj Surve, Tuan Nguyen. © 2024. 17 pages.
Pawan Kumar, Sanjay Taneja, Mukul Bhatnagar, Arvinder K. Kaur. © 2024. 17 pages.
Azadeh Eskandarzadeh. © 2024. 15 pages.
Body Bottom