|
|
|
|
LEADER |
03080nam a22005295i 4500 |
001 |
978-1-4614-1918-1 |
003 |
DE-He213 |
005 |
20151204153557.0 |
007 |
cr nn 008mamaa |
008 |
120321s2012 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781461419181
|9 978-1-4614-1918-1
|
024 |
7 |
|
|a 10.1007/978-1-4614-1918-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Camp, L. Jean.
|e author.
|
245 |
1 |
4 |
|a The Economics of Financial and Medical Identity Theft
|h [electronic resource] /
|c by L. Jean Camp, M. Eric Johnson.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2012.
|
300 |
|
|
|a XII, 168 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Identity in Economics, and in Context -- Modern Technological and Traditional Social Identities -- Identity Theft -- Defeating the Greatest Masquerade -- Secrecy, Privacy, Identity -- Security and Privacy as Market Failures -- Identity Theft in Healthcare -- Healthcare Data: Protections and Hemorrhages -- Technologies of Identity -- Identity Scenarios -- Scenario IV: Ubiquitous Identity Theft -- Closing -- References.
|
520 |
|
|
|a Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Health informatics.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Biometrics (Biology).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Health Informatics.
|
650 |
2 |
4 |
|a Biometrics.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Johnson, M. Eric.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781461419174
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4614-1918-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|