Financial Identity Theft (Record no. 16094)

000 -LEADER
fixed length control field 02913nam a22004335i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310145539.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110929s2011 ne | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789067048149
978-90-6704-814-9
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number K5000-5582
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 345
Edition number 23
264 #1 -
-- The Hague, The Netherlands :
-- T. M. C. Asser Press,
-- 2011.
912 ## -
-- ZDB-2-SHU
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name van der Meulen, Nicole S.
Relator term author.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Financial Identity Theft
Medium [electronic resource] :
Remainder of title Context, Challenges and Countermeasures /
Statement of responsibility, etc by Nicole S. van der Meulen.
300 ## - PHYSICAL DESCRIPTION
Extent XIV, 306 p.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Information Technology and Law Series,
International Standard Serial Number 1570-2782 ;
Volume number/sequential designation 21
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Definitional Dilemmas -- State as Protector -- State as Provider -- Financial Service Providers -- Consumers -- The Others -- From Piece to Puzzle.
520 ## - SUMMARY, ETC.
Summary, etc When identity theft first emerged as a problem of public policy in the United States, during the last decade of the twentieth century, the rest of the world was still fast asleep. This changed several years later as other countries awakened to similar problems and a sense of potential urgency surrounding the topic of identity theft began to spread. Identity theft, especially as a result of developments in digital technology, became a threat worthy of social and political attention. With its (gradual) spread the need increases to understand how identity theft occurs and how perpetrators of the crime manage to take advantage of developments within contemporary society. For such an understanding it is vital to assess the effectiveness of current countermeasures and introduce innovative ones.   This book provides such an understanding through an in-depth comparative analysis which illustrates how and to what extent states, financial service providers, consumers, and others facilitate the occurrence of financial identity theft in the United States and the Netherlands. Its comprehensive and interdisciplinary approach makes the book essential background reading for policy makers and scholars in Information Technology, Criminology and Public policy to develop strategies for the fight against identity theft.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Law.
Topical term or geographic name as entry element Computers
General subdivision Law and legislation.
Topical term or geographic name as entry element Criminal Law.
Topical term or geographic name as entry element Law.
Topical term or geographic name as entry element Criminal Law.
Topical term or geographic name as entry element Legal Aspects of Computing.
Topical term or geographic name as entry element e-Commerce/e-business.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9789067048132
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-90-6704-814-9
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-02AUM Main Library2014-04-02 2014-04-02 E-Book   AUM Main Library345