Identity Theft: A Reference Handbook: Contemporary World Issues
Autor Sandra K. Hoffman, Tracy G. McGinleyen Limba Engleză Hardback – 14 dec 2009
What are the common forms of identity theft? Who are the most likely targets? What is law enforcement doing to counter a crime perpetrated not only by petty thieves and sophisticated con artists, but by terrorists, money-launderers, and those involved in human trafficking, drug trafficking, and illegal immigration? Identity Theft: A Reference Handbook examines these questions and more.
With the 1998 Identity Theft and Assumption Deterrence Act as its starting point, this informative volume begins by explaining the federal, state, and global definitions of identity theft and how the lack of a standardized approach masks the true pervasiveness of the problem. In addition to addressing the crime's perpetrators, methods, and victims, the book also looks at what individuals, businesses, and the government are doing-and should consider doing-to curb the growth of this crime.
Din seria Contemporary World Issues
- nou
Preț: 354.94 lei - 45%
Preț: 282.22 lei - nou
Preț: 354.94 lei - 45%
Preț: 284.19 lei -
Preț: 110.47 lei - 45%
Preț: 283.24 lei - nou
Preț: 359.04 lei - nou
Preț: 152.86 lei - 45%
Preț: 282.27 lei -
Preț: 110.03 lei - nou
Preț: 358.24 lei - 45%
Preț: 283.24 lei - 45%
Preț: 282.65 lei - nou
Preț: 152.88 lei - 45%
Preț: 282.74 lei - 45%
Preț: 282.65 lei - 45%
Preț: 283.33 lei - 45%
Preț: 283.52 lei - 45%
Preț: 283.09 lei - 45%
Preț: 283.52 lei - 45%
Preț: 283.93 lei - 45%
Preț: 284.39 lei - 45%
Preț: 283.04 lei - 45%
Preț: 283.73 lei - 43%
Preț: 283.98 lei - 45%
Preț: 284.46 lei - 44%
Preț: 236.17 lei - 50%
Preț: 260.33 lei - 45%
Preț: 285.06 lei - 45%
Preț: 258.50 lei - 45%
Preț: 284.46 lei - 55%
Preț: 236.17 lei - 55%
Preț: 234.25 lei - 44%
Preț: 236.79 lei - 45%
Preț: 286.28 lei - 45%
Preț: 258.50 lei - 45%
Preț: 298.95 lei -
Preț: 283.24 lei - 45%
Preț: 234.35 lei - 45%
Preț: 284.46 lei - 45%
Preț: 285.68 lei - 45%
Preț: 257.88 lei - 55%
Preț: 236.07 lei - 48%
Preț: 298.95 lei - 45%
Preț: 234.35 lei - 45%
Preț: 234.25 lei - 45%
Preț: 285.09 lei - 44%
Preț: 236.07 lei
Preț: 258.45 lei
Preț vechi: 469.85 lei
-45%
Puncte Express: 388
Preț estimativ în valută:
45.75€ • 53.33$ • 39.63£
45.75€ • 53.33$ • 39.63£
Carte disponibilă
Livrare economică 06-20 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781598841435
ISBN-10: 1598841432
Pagini: 280
Dimensiuni: 152 x 229 x 25 mm
Greutate: 0.54 kg
Editura: Bloomsbury Publishing
Colecția ABC-CLIO
Seria Contemporary World Issues
Locul publicării:New York, United States
ISBN-10: 1598841432
Pagini: 280
Dimensiuni: 152 x 229 x 25 mm
Greutate: 0.54 kg
Editura: Bloomsbury Publishing
Colecția ABC-CLIO
Seria Contemporary World Issues
Locul publicării:New York, United States
Cuprins
Preface,
1 Background and History,
What Is Identity Theft?,
Personal Identity Theft,
Business Identity Theft,
The History of Identity Theft,
Jacob and Esau,
Cade's Rebellion of 1450,
Sarah Wilson in Colonial America,
Czar Nicholas II and His Family,
The Great Imposter,
The Most Misused Social Security Number in History,
The Chicago Debacle,
The First Documented Multinational Internet Bank Robbery,
An Early Case of Credit Card Fraud,
The First Internet Murder,
Who Are the Perpetrators?,
Opportunity Takers or Makers,
Gender,
Age,
Ethnicity,
Criminal History,
Country of Origin,
Affiliation with Other Crimes,
Affiliation with Other Criminals,
Who Are the Victims?,
Types of Identity Theft,
Geographical Location,
Age,
References,
2 Problems, Controversies, and Solutions,
The Victims' Experiences,
Methods of Detection and Time Lapse,
Types of Identity Theft and the Restoration Period,
Effects on Relationships,
Emotional and Medical Concerns,
Financial Losses,
The Second Insult,
Sources and Methods Used by Perpetrators to Access Identities,
Trends and Special Issues,
Tax Fraud,
Medical Fraud,
Real Estate Loan Fraud,
Offshoring Identities,
Data Breaches,
The Hidden Costs of the Crime,
Solving the Identity Theft Problem,
Responsibility Theories,
Government Responses,
References,
3 Worldwide Perspective,
Canada,
United Kingdom,
Mexico,
Russia,
South Africa,
Asia,
The Threat to International and Homeland Security,
References,
4 Chronology,
5 Biographical Sketches,
Abagnale, Frank, Jr. (1948-),
Ashcroft, John (1942-) U.S. Attorney General,
Bliley, Thomas Jerome, Jr. (1932-) U.S. Representative (R-Va.),
Bowen, Debra (1955-) California Secretary of State,
Calderon, Charles (1950-) State Senator (D-Calif.),
Cantwell, Maria (1958-) U.S. Senator (D-Wash.),
Carter, Steve (1954-) Indiana Attorney General,
Cogdill, David (1950-) State Assembly (R-Calif.),
Cuccinelli, Ken (1968-) State Senator (R-Va.),
Feinstein, Dianne (1933-) U.S. Senator (D-Calif.),
Foley, Linda,
Frank, Mari,
Givens, Beth,
Gramm, William Philip (1942-) U.S. Senator (R-Tex.),
Kaine, Timothy M. (1958-) Governor (D-Va.),
Kyl, Jon (1942-) U.S. Senator (R-Ariz.),
Leach, James Albert Smith (1942-) U.S. Representative (R-Iowa),
Leahy, Patrick (1940-) U.S. Senator (D-Vt.),
Madigan, Lisa (1966-) Illinois Attorney General,
May, Johnny,
Oller, Thomas (1958-) State Assemblyman (R-Calif.),
Ostergren, Betty "B. J.",
Paterson, David A. (1954-) Governor (D-N.Y.),
Petro, James (1948-) Ohio Attorney General,
Poochigian, Charles (1949-) State Senator (R-Calif.),
Simitian, Joe (1953-) State Senator (D-Calif.),
Specter, Arlen (1930-) U.S. Senator (R-Pa.),
Torlakson, Tom (1949-) State Assemblyman (D-Calif.),
Wyland, Mark (1946-) State Senator (R-Calif.),
6 Data and Documents,
Executive Summary Consumer Fraud and Identity Theft Complaint Data January-December 2008,
President's Identity Theft Task Force,
Identity Theft and Assumption Deterrence Act,
Title V of the Gramm-Leach-Bliley Act, 1999,
7 Directory of Organizations, Associations, and Agencies,
8 Resources,
Print Resources,
Books,
Journals and Magazines,
Pamphlets/Booklets,
Nonprint Resources,
Glossary,
Index,
About the Author,
1 Background and History,
What Is Identity Theft?,
Personal Identity Theft,
Business Identity Theft,
The History of Identity Theft,
Jacob and Esau,
Cade's Rebellion of 1450,
Sarah Wilson in Colonial America,
Czar Nicholas II and His Family,
The Great Imposter,
The Most Misused Social Security Number in History,
The Chicago Debacle,
The First Documented Multinational Internet Bank Robbery,
An Early Case of Credit Card Fraud,
The First Internet Murder,
Who Are the Perpetrators?,
Opportunity Takers or Makers,
Gender,
Age,
Ethnicity,
Criminal History,
Country of Origin,
Affiliation with Other Crimes,
Affiliation with Other Criminals,
Who Are the Victims?,
Types of Identity Theft,
Geographical Location,
Age,
References,
2 Problems, Controversies, and Solutions,
The Victims' Experiences,
Methods of Detection and Time Lapse,
Types of Identity Theft and the Restoration Period,
Effects on Relationships,
Emotional and Medical Concerns,
Financial Losses,
The Second Insult,
Sources and Methods Used by Perpetrators to Access Identities,
Trends and Special Issues,
Tax Fraud,
Medical Fraud,
Real Estate Loan Fraud,
Offshoring Identities,
Data Breaches,
The Hidden Costs of the Crime,
Solving the Identity Theft Problem,
Responsibility Theories,
Government Responses,
References,
3 Worldwide Perspective,
Canada,
United Kingdom,
Mexico,
Russia,
South Africa,
Asia,
The Threat to International and Homeland Security,
References,
4 Chronology,
5 Biographical Sketches,
Abagnale, Frank, Jr. (1948-),
Ashcroft, John (1942-) U.S. Attorney General,
Bliley, Thomas Jerome, Jr. (1932-) U.S. Representative (R-Va.),
Bowen, Debra (1955-) California Secretary of State,
Calderon, Charles (1950-) State Senator (D-Calif.),
Cantwell, Maria (1958-) U.S. Senator (D-Wash.),
Carter, Steve (1954-) Indiana Attorney General,
Cogdill, David (1950-) State Assembly (R-Calif.),
Cuccinelli, Ken (1968-) State Senator (R-Va.),
Feinstein, Dianne (1933-) U.S. Senator (D-Calif.),
Foley, Linda,
Frank, Mari,
Givens, Beth,
Gramm, William Philip (1942-) U.S. Senator (R-Tex.),
Kaine, Timothy M. (1958-) Governor (D-Va.),
Kyl, Jon (1942-) U.S. Senator (R-Ariz.),
Leach, James Albert Smith (1942-) U.S. Representative (R-Iowa),
Leahy, Patrick (1940-) U.S. Senator (D-Vt.),
Madigan, Lisa (1966-) Illinois Attorney General,
May, Johnny,
Oller, Thomas (1958-) State Assemblyman (R-Calif.),
Ostergren, Betty "B. J.",
Paterson, David A. (1954-) Governor (D-N.Y.),
Petro, James (1948-) Ohio Attorney General,
Poochigian, Charles (1949-) State Senator (R-Calif.),
Simitian, Joe (1953-) State Senator (D-Calif.),
Specter, Arlen (1930-) U.S. Senator (R-Pa.),
Torlakson, Tom (1949-) State Assemblyman (D-Calif.),
Wyland, Mark (1946-) State Senator (R-Calif.),
6 Data and Documents,
Executive Summary Consumer Fraud and Identity Theft Complaint Data January-December 2008,
President's Identity Theft Task Force,
Identity Theft and Assumption Deterrence Act,
Title V of the Gramm-Leach-Bliley Act, 1999,
7 Directory of Organizations, Associations, and Agencies,
8 Resources,
Print Resources,
Books,
Journals and Magazines,
Pamphlets/Booklets,
Nonprint Resources,
Glossary,
Index,
About the Author,
Recenzii
. . . a welcome addition to academic and community library Criminology reference collections in general, and should be considered essential reading by anyone having to deal with identity theft or its threat in their own lives.
This resource is highly recommended for al libraries and anyone seeking information about this growing problem and what is being done to prevent it in the future.
Clearly and precisely written, this volume offers extremely helpful references at the end of chapters. A plethora of recent publications are devoted to this topic, but few are arranged as reference handbooks or are so easy to consult. This book will be useful in both academic and public libraries. Summing Up: Recommended. Lower-level undergraduates and above; general readers.
This resource is highly recommended for al libraries and anyone seeking information about this growing problem and what is being done to prevent it in the future.
Clearly and precisely written, this volume offers extremely helpful references at the end of chapters. A plethora of recent publications are devoted to this topic, but few are arranged as reference handbooks or are so easy to consult. This book will be useful in both academic and public libraries. Summing Up: Recommended. Lower-level undergraduates and above; general readers.