Identity Theft Handbook

Author: Martin T. Biegelman  

Publisher: John Wiley & Sons Inc‎

Publication year: 2009

E-ISBN: 9780470444764

P-ISBN(Hardback):  9780470179994

Subject: F2 Economic Planning and Management

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Not a week goes by when identity theft isn t mentioned in the media or that a Congressional outcry isn t heard about this unrelenting crime. The first authoritative book on identity theft, Identity Theft Handbook is written by a career professional who has spent over 25 years investigating and preventing identity theft in both the public and private sectors. Its rich real-world content includes interviews with government and private sector thought leaders. As well, the costs of identity theft, future trends, and prevention guidance is discussed. For investigators, auditors, and managers.

Chapter

Contents

pp.:  1 – 11

About the Author

pp.:  11 – 17

Foreword

pp.:  17 – 19

Preface

pp.:  19 – 21

Acknowledgments

pp.:  21 – 25

Chapter 3: How Identity Theft Occurs

pp.:  41 – 55

Chapter 4: Student Loan Fraud and the Theft of Identity

pp.:  55 – 73

Chapter 5: Nigerian Criminal Enterprises

pp.:  73 – 85

Chapter 6: Methamphetamine, the Mails, and Check Washing

pp.:  85 – 101

Chapter 7: The Violent Side of Identity Theft

pp.:  101 – 113

Chapter 8: Medical Identity Theft

pp.:  113 – 125

Chapter 9: Fake IDs

pp.:  125 – 141

Chapter 10: Legislation and Criminal Statutes

pp.:  141 – 157

Chapter 11: Law Enforcement Efforts

pp.:  157 – 179

Chapter 12: Teens and Young Adults as Victims and Perpetrators

pp.:  179 – 191

Chapter 13: Victims and Victimization

pp.:  191 – 205

Chapter 14: The San Diego Experience

pp.:  205 – 219

Chapter 15: The Rich, the Famous, and the Dead Get No Peace

pp.:  219 – 233

Chapter 16: Identity Theft Goes Global

pp.:  233 – 249

Chapter 17: Privacy and Data Breaches

pp.:  249 – 267

Chapter 18: Identity Theft Research

pp.:  267 – 291

Chapter 19: The Center for Identity Management and Information Protection

pp.:  291 – 305

Chapter 20: Preventing Identity Theft: 21 Rules You Must Use

pp.:  305 – 323

Chapter 21: Future of Identity Theft

pp.:  323 – 341

Appendix: Designing an Effective Identity Theft Red Flags Rule Compliance Program

pp.:  341 – 357

INDEX

pp.:  357 – 367

LastPages

pp.:  367 – 378

The users who browse this book also browse