|
|
|
|
LEADER |
03211nam a22004935i 4500 |
001 |
978-90-6704-814-9 |
003 |
DE-He213 |
005 |
20151204152632.0 |
007 |
cr nn 008mamaa |
008 |
110929s2011 ne | s |||| 0|eng d |
020 |
|
|
|a 9789067048149
|9 978-90-6704-814-9
|
024 |
7 |
|
|a 10.1007/978-90-6704-814-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a K4240-4343
|
050 |
|
4 |
|a K1401-1578.25
|
072 |
|
7 |
|a LN
|2 bicssc
|
072 |
|
7 |
|a LAW051000
|2 bisacsh
|
082 |
0 |
4 |
|a 343.099
|2 23
|
100 |
1 |
|
|a van der Meulen, Nicole S.
|e author.
|
245 |
1 |
0 |
|a Financial Identity Theft
|h [electronic resource] :
|b Context, Challenges and Countermeasures /
|c by Nicole S. van der Meulen.
|
264 |
|
1 |
|a The Hague, The Netherlands :
|b T. M. C. Asser Press,
|c 2011.
|
300 |
|
|
|a XIV, 306 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Technology and Law Series,
|x 1570-2782 ;
|v 21
|
505 |
0 |
|
|a Introduction -- Definitional Dilemmas -- State as Protector -- State as Provider -- Financial Service Providers -- Consumers -- The Others -- From Piece to Puzzle.
|
520 |
|
|
|a When identity theft first emerged as a problem of public policy in the United States, during the last decade of the twentieth century, the rest of the world was still fast asleep. This changed several years later as other countries awakened to similar problems and a sense of potential urgency surrounding the topic of identity theft began to spread. Identity theft, especially as a result of developments in digital technology, became a threat worthy of social and political attention. With its (gradual) spread the need increases to understand how identity theft occurs and how perpetrators of the crime manage to take advantage of developments within contemporary society. For such an understanding it is vital to assess the effectiveness of current countermeasures and introduce innovative ones. This book provides such an understanding through an in-depth comparative analysis which illustrates how and to what extent states, financial service providers, consumers, and others facilitate the occurrence of financial identity theft in the United States and the Netherlands. Its comprehensive and interdisciplinary approach makes the book essential background reading for policy makers and scholars in Information Technology, Criminology and Public policy to develop strategies for the fight against identity theft.
|
650 |
|
0 |
|a Law.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
|
0 |
|a International law.
|
650 |
|
0 |
|a Intellectual property
|x Law and legislation.
|
650 |
1 |
4 |
|a Law.
|
650 |
2 |
4 |
|a International IT and Media Law, Intellectual Property Law.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789067048132
|
830 |
|
0 |
|a Information Technology and Law Series,
|x 1570-2782 ;
|v 21
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-90-6704-814-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SHU
|
950 |
|
|
|a Humanities, Social Sciences and Law (Springer-11648)
|