Author:
Tan Felix Ter Chian,Guo Zixiu,Cahalane Michael,Cheng Daniel
Funder
Dr Jan Ondrus for his kind advice and invaluable comments on the previous drafts of this paper
Subject
Information Systems and Management,Information Systems,Management Information Systems
Reference97 articles.
1. Addressing identity crime in crime management information systems: definitions, classification, and empirics;Jamieson;Comput. Law Secur. Rev.,2012
2. APATE: a novel approach for automated credit card transaction fraud detection using network-based extensions;Van Vlasselaer;Decis. Support Syst.,2015
3. http://www.cybersource.com/en-ANZ/company/news/view.php?page_id=2172, accessed (25.07.14) (2014).
4. ‘Fear of cyber-identity theft and related fraudulent activity’;Roberts;Psychiatry Psychol. Law,2013
5. http://www.gartner.com/technology/reprints.do?id=1-1QLGACN&ct=140210&st=sb accessed (15.04.14).
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献