| 000 | 03074nam a22005295i 4500 | ||
|---|---|---|---|
| 001 | 978-1-4614-1918-1 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083244.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 120321s2012 xxu| s |||| 0|eng d | ||
| 020 |
_a9781461419181 _9978-1-4614-1918-1 |
||
| 024 | 7 |
_a10.1007/978-1-4614-1918-1 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aUR _2bicssc |
|
| 072 | 7 |
_aUTN _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aCamp, L. Jean. _eauthor. |
|
| 245 | 1 | 4 |
_aThe Economics of Financial and Medical Identity Theft _h[electronic resource] / _cby L. Jean Camp, M. Eric Johnson. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2012. |
|
| 300 |
_aXI, 166p. 10 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aIdentity in Economics, and in Context -- Modern Technological and Traditional Social Identities -- Identity Theft -- Defeating the Greatest Masquerade -- Secrecy, Privacy, Identity -- Security and Privacy as Market Failures -- Identity Theft in Healthcare -- Healthcare Data: Protections and Hemorrhages -- Technologies of Identity -- Identity Scenarios -- Scenario IV: Ubiquitous Identity Theft -- Closing -- References. | |
| 520 | _aFinancial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 |
_aMedical records _xData processing. |
|
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aBiometrics. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aHealth Informatics. |
| 650 | 2 | 4 | _aBiometrics. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 700 | 1 |
_aJohnson, M. Eric. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9781461419174 |
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-1918-1 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c101160 _d101160 |
||