Understanding victims of identity theft: Preliminary insights

Turville, K, Yearwood, John Leighton and Miller, C 2010, Understanding victims of identity theft: Preliminary insights, in Proceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010, IEEE, Piscataway, N.J., pp. 60-68, doi: 10.1109/CTC.2010.12.

Attached Files
Name Description MIMEType Size Downloads

Title Understanding victims of identity theft: Preliminary insights
Author(s) Turville, K
Yearwood, John LeightonORCID iD for Yearwood, John Leighton orcid.org/0000-0002-7562-6767
Miller, C
Conference location Ballarat, Vic.
Conference dates 2010/07/19 - 2010/07/20
Title of proceedings Proceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010
Publication date 2010
Start page 60
End page 68
Total pages 9
Publisher IEEE
Place of publication Piscataway, N.J.
ISBN 9780769541860
DOI 10.1109/CTC.2010.12
HERDC Research category EN.1 Other conference paper
Persistent URL http://hdl.handle.net/10536/DRO/DU:30100719

Document type: Conference Paper
Collection: Centre for Pattern Recognition and Data Analytics
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 5 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 4 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Thu, 27 Jul 2017, 13:12:56 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.