000 | 03044nam a22004575i 4500 | ||
---|---|---|---|
001 | u378179 | ||
003 | SIRSI | ||
005 | 20160812084540.0 | ||
007 | cr nn 008mamaa | ||
008 | 110929s2011 ne | s |||| 0|eng d | ||
020 |
_a9789067048149 _9978-90-6704-814-9 |
||
040 | _cMX-MeUAM | ||
050 | 4 | _aK5000-5582 | |
082 | 0 | 4 |
_a345 _223 |
100 | 1 |
_avan der Meulen, Nicole S. _eauthor. |
|
245 | 1 | 0 |
_aFinancial Identity Theft _h[recurso electrónico] : _bContext, Challenges and Countermeasures / _cby Nicole S. van der Meulen. |
264 | 1 |
_aThe Hague, The Netherlands : _bT. M. C. Asser Press, _c2011. |
|
300 |
_aXIV, 306 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Technology and Law Series, _x1570-2782 ; _v21 |
|
505 | 0 | _aIntroduction -- Definitional Dilemmas -- State as Protector -- State as Provider -- Financial Service Providers -- Consumers -- The Others -- From Piece to Puzzle. | |
520 | _aWhen identity theft first emerged as a problem of public policy in the United States, during the last decade of the twentieth century, the rest of the world was still fast asleep. This changed several years later as other countries awakened to similar problems and a sense of potential urgency surrounding the topic of identity theft began to spread. Identity theft, especially as a result of developments in digital technology, became a threat worthy of social and political attention. With its (gradual) spread the need increases to understand how identity theft occurs and how perpetrators of the crime manage to take advantage of developments within contemporary society. For such an understanding it is vital to assess the effectiveness of current countermeasures and introduce innovative ones. This book provides such an understanding through an in-depth comparative analysis which illustrates how and to what extent states, financial service providers, consumers, and others facilitate the occurrence of financial identity theft in the United States and the Netherlands. Its comprehensive and interdisciplinary approach makes the book essential background reading for policy makers and scholars in Information Technology, Criminology and Public policy to develop strategies for the fight against identity theft. | ||
650 | 0 | _aLaw. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 | _aCriminal Law. | |
650 | 1 | 4 | _aLaw. |
650 | 2 | 4 | _aCriminal Law. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
650 | 2 | 4 | _ae-Commerce/e-business. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9789067048132 |
830 | 0 |
_aInformation Technology and Law Series, _x1570-2782 ; _v21 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-90-6704-814-9 |
596 | _a19 | ||
942 | _cLIBRO_ELEC | ||
999 |
_c206059 _d206059 |