Identity Theft

Personal Data Security

Reference:

Lininger, R., & Vines, R. D. (2005). Identity theft protection: How to protect your finances, credit, and bank accounts from identity theft and fraud. John Wiley & Sons.

Labrecque, L. I., Markos, E., Swain, K., & Pena, P. (2021). Digital deception: Understanding consumer vulnerability to identity theft in the digital age. https://www-sciencedirect-com.library.sheridanc.on.ca/science/article/pii/S0019850124000452

Davis, J. (2005). Curb card skimming. Credit Union Magazine, 71(9), 60. Curb Card Skimming - ProQuest

TRAI warns against fake calls threatening mobile disconnection. (2025). Voice & Data. Retrieved from https://www.proquest.com/trade-journals/trai-warns-against-fake-calls-threatening-mob

Harrell, E., & Langton, L. (2013). Victims of identity theft, 2012. U.S. Department of Justice. http://www.bjs.gov/content/pub/pdf/vit12.pdf

Watts, S. (2016). Secure authentication is the only solution for vulnerable public Wi-Fi. Computer Fraud & Security, 2016(1), 18–20. https://www-sciencedirect-com.library.sheridanc.on.ca/science/article/pii/S1361372316300094

Cybersecurity & Infrastructure Security Agency. (2022). Choosing and protecting passwords. U.S. Department of Homeland Security. https://www.cisa.gov/news-events/news/choosing-and-protecting-passwords

Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, XiaoFeng Wang, NDSS 14 (20140, 23-26, 2014 https://www-sciencedirect-com.library.sheridanc.on.ca/science/article/pii/S0167404819301105#bib0011

Nalin Asanka Gamagedara Arachchilage, Steve Love, Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behaviour, 38, 304–312. https://www-sciencedirect-com.library.sheridanc.on.ca/science/article/pii/S0747563219302778#bib3

Watts, S. (2016). Secure authentication is the only solution for vulnerable public WiFi. Computer Fraud & Security, 2016(1), 18–20. https://www.sciencedirect.com/science/article/abs/pii/S1361372316300094