| 000 | 03644nam a22004935i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-68614-1 | ||
| 003 | DE-He213 | ||
| 005 | 20250710084007.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2007 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387686141 _a99780387686141 |
||
| 024 | 7 |
_a10.1007/978-0-387-68614-1 _2doi |
|
| 082 | 0 | 4 |
_a570.15195 _223 |
| 100 | 1 |
_aCamp, L. Jean. _eauthor. |
|
| 245 | 1 | 0 |
_aEconomics of Identity Theft: Avoidance, Causes and Possible Cures _h[recurso electrónico] / _cby L. Jean Camp. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2007. |
|
| 300 |
_aXV, 184 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aIdentity in Economics, and in Context -- Modern Technological and Traditional Social Identities -- Identity Theft -- Who Owns You? -- Defeating the Greatest Masquerade -- Secrecy, Privacy, Identity -- Security and Privacy as Market Failures -- Trusting Code and Trusting Hardware -- Technologies of Identity -- Anonymous Identifiers -- Digital Signatures -- Strengths and Weaknesses of Biometrics -- Reputation -- Scenario I: Your Credentials Please -- Scenario II: Universal National Identifier -- Scenario III: Sets of attributes -- Scenario IV: Ubiquitous Identity Theft -- Closing. | |
| 520 | _aToday, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information. Together, these points illustrate that the near-term search for cheap identity management is a formula for long-term fraud resulting in ever-increasing identity theft. The Economics of Identity Theft: Avoidance, Causes and Possible Cures, a professional book, discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and the placement of biometric security in an economically broken system, which results in a broken biometric system. The final chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status. In conclusion, four startling previews of the future are written as scenarios. The Economics of Identity Theft: Avoidance, Causes and Possible Cures is designed for a professional audience composed of practitioners and researchers. This book is also suitable as a secondary text for advanced-level students in computer science, economics and several other disciplines. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aCOMPUTER COMMUNICATION NETWORKS. | |
| 650 | 0 | _aDATA PROTECTION. | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aBIOMETRICS. | |
| 650 | 0 | _aECONOMICS. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aBIOMETRICS. |
| 650 | 2 | 4 | _aSYSTEMS AND DATA SECURITY. |
| 650 | 2 | 4 | _aECONOMICS/MANAGEMENT SCIENCE, GENERAL. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aCOMPUTER COMMUNICATION NETWORKS. |
| 650 | 2 | 4 | _aECONOMIC SYSTEMS. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387345895 |
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-0-387-68614-1 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c57996 _d57996 |
||