Posts By David A. Streat

Complete references and links for Identity theft blog

Here are the references and links to additional resources that my have been left out of my post yesterday. Identity Theft Resources http://www.legalstoc.com/2009/01/07/ftc-to-congress-enact-standards-to-reduce-identity-theft/?http://www.howtostopidentitytheftnow.comwww.creditcards.comwww.consumer.gov/idthefthttp://www.cstb.org/web/project_authenticationhttp://www.humanresources.org/media/resources/resource_209.pdfhttp://portal.acm.org/citation.cfm?id=1082290.1082305http://iospress.metapress.com/content/frcjv8nfemh5dxc9/http://www.anti-phishing.org/http://www.verisign.com/products-services/index.htmlhttp://web.njit.edu/~bieber/CIS677F04/stafford-spyware-cais2004.pdfhttp://theprivacyplace.org/blog/wp-content/uploads/2008/07/tr-2006-18u.pdfhttp://www.springerlink.com/content/w7877437n43u72hq/http://www.loms-itea.org/deliverables/LOMS_D6.3_v1.0.pdfhttp://webpages.cs.luc.edu/~pld/courses/ethics/spr07/rfid/eckfeldt.pdfhttp://www.govtech.com/gt/418253http://www.experian.com/http://www.transunion.com/http://www.equifax.com References Buell, D. & Sandhu, R. (2003). Identity management. IEEE Computer Society, 1-3. Milne, G. R. (2003). How well do consumers protect themselves from identity theft? The Journal of Consumer Affairs, (37)Read… Read more »

Why protecting your personal information is important

Why protecting your personal information is important.pptx Today private companies, government agencies and other organizations large and small are spending an enormous amount of time and money to protect growing collections of information and data. All the while, hackers, identity thieves, and terrorists remain one-step ahead of information security experts and information protection programs. AttachedRead… Read more »