000 03044nam a22004575i 4500
001 u378179
003 SIRSI
005 20160812084540.0
007 cr nn 008mamaa
008 110929s2011 ne | s |||| 0|eng d
020 _a9789067048149
_9978-90-6704-814-9
040 _cMX-MeUAM
050 4 _aK5000-5582
082 0 4 _a345
_223
100 1 _avan der Meulen, Nicole S.
_eauthor.
245 1 0 _aFinancial Identity Theft
_h[recurso electrónico] :
_bContext, Challenges and Countermeasures /
_cby Nicole S. van der Meulen.
264 1 _aThe Hague, The Netherlands :
_bT. M. C. Asser Press,
_c2011.
300 _aXIV, 306 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Technology and Law Series,
_x1570-2782 ;
_v21
505 0 _aIntroduction -- Definitional Dilemmas -- State as Protector -- State as Provider -- Financial Service Providers -- Consumers -- The Others -- From Piece to Puzzle.
520 _aWhen identity theft first emerged as a problem of public policy in the United States, during the last decade of the twentieth century, the rest of the world was still fast asleep. This changed several years later as other countries awakened to similar problems and a sense of potential urgency surrounding the topic of identity theft began to spread. Identity theft, especially as a result of developments in digital technology, became a threat worthy of social and political attention. With its (gradual) spread the need increases to understand how identity theft occurs and how perpetrators of the crime manage to take advantage of developments within contemporary society. For such an understanding it is vital to assess the effectiveness of current countermeasures and introduce innovative ones.   This book provides such an understanding through an in-depth comparative analysis which illustrates how and to what extent states, financial service providers, consumers, and others facilitate the occurrence of financial identity theft in the United States and the Netherlands. Its comprehensive and interdisciplinary approach makes the book essential background reading for policy makers and scholars in Information Technology, Criminology and Public policy to develop strategies for the fight against identity theft.
650 0 _aLaw.
650 0 _aComputers
_xLaw and legislation.
650 0 _aCriminal Law.
650 1 4 _aLaw.
650 2 4 _aCriminal Law.
650 2 4 _aLegal Aspects of Computing.
650 2 4 _ae-Commerce/e-business.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9789067048132
830 0 _aInformation Technology and Law Series,
_x1570-2782 ;
_v21
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-90-6704-814-9
596 _a19
942 _cLIBRO_ELEC
999 _c206059
_d206059