Keywords: دزدی هویت; Information system; Identity theft; E-commerce; Crime; Security;
مقالات ISI ترجمه شده دزدی هویت
مقالات ISI دزدی هویت (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: دزدی هویت; Identity theft; Fraud alert; Data breach; Consumer protection; Credit report; D12; G02; G22; C23;
Keywords: دزدی هویت; Identity theft; Text mining; News stories; PII attributes; Named entity recognition;
Keywords: دزدی هویت; Adversarial attacks; Identity theft; Information security; Intrusion detection; Masquerade attacks;
Keywords: دزدی هویت; Identity theft; Expertise; Criminal decision-making
Keywords: دزدی هویت; Social networks; Digital watermarks; Identity theft; Privacy
Keywords: دزدی هویت; Cybercrime; Phishing; Identity theft; Routine activities theory; Online deviance
The impact of adoption of identity theft countermeasures on firm value
Keywords: دزدی هویت; Countermeasures; Event study; Identity theft; Information security; Information security investment; Subsampling
Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation
Keywords: دزدی هویت; Boosting; Conditional Random Field; Identity theft; Impersonated entity discovery; Latent Dirichlet Allocation; Machine learning; Named entity; Natural language processing; PhishingAUC, Area Under Receiver Operating Characteristic; CRF, Conditional Random
Mistaken identity, identity theft and problems of remote authentication in e-commerce
Keywords: دزدی هویت; Identity theft; e-commerce; Authentication; Digital signatures
Using automated individual white-list to protect web digital identities
Keywords: دزدی هویت; Individual white-list; Web digital identity; Identity theft; Naïve Bayesian classifier; Anti-phishing; Anti-pharming
Fighting identity theft: The coping perspective
Keywords: دزدی هویت; Identity theft; Security; Coping; Self-efficacy; Perceived effectiveness; Social influence
Addressing identity crime in crime management information systems: Definitions, classification, and empirics
Keywords: دزدی هویت; Identity crime; Identity fraud; Identity theft; Identity deception; Computer crime; Internet; Information systems security (ISS); Taxonomy; Personnel identifying information (PII); Crime management information systems
Planning for the succession of digital assets
Keywords: دزدی هویت; Succession planning; Digital assets; Digital property; Digital will; Digital executor services; Identity theft
Socio-technological phishing prevention
Keywords: دزدی هویت; Phishing; Identity theft; e-stealing; e-theft
Health Care Fraud: Stopping Nurse Imposters
Keywords: دزدی هویت; health care fraud; identity theft; nurse imposter; Nurse Practice Act; professional integrity; professional regulation and licensure
Privacy and personal data protection in China: An update for the year end 2009
Keywords: دزدی هویت; PR China; Privacy; Personal data protection; Identity theft; Human-flesh searching; China Internet network information center
The mandatory notification of data breaches: Issues arising for Australian and EU legal developments
Keywords: دزدی هویت; Data breach notification; Data protection; Information privacy; Identity theft; Information security
Data breaches and identity theft
Keywords: دزدی هویت; D83; E42; G28; Identity theft; Identity fraud; Data breach; Fraud; Money; Search;
Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements
Keywords: دزدی هویت; Multi-dimensional credentialing; Privacy; Digital certificate; Public key encryption; Blind certification; Identity theft; Anonymity; X.509; Veiled certificate
A survey of signature based methods for financial fraud detection
Keywords: دزدی هویت; Fraud detection; Account signatures; Behaviour scoring; User profiling; Fraud management; Identity theft
Identity theft: An exploratory study with implications for marketers
Keywords: دزدی هویت; Identity theft; System dynamics; Security freezes
Binary Vickrey auction — A robust and efficient multi-unit sealed-bid online auction protocol against buyer multi-identity bidding
Keywords: دزدی هویت; Auctions; Multi-unit auctions; False-name bids; Identity theft; Electronic commerce; Mechanism design; Vickrey auctions; Double auctions