{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:48Z","timestamp":1750307928909,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231081","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"152-155","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The other side of identity theft"],"prefix":"10.1145","author":[{"given":"Kim","family":"Luong","sequence":"first","affiliation":[{"name":"Kennesaw State University, Dalton, GA"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bigda C. (2006). ID Theft: Are you the next victim? Money 35(5).  Bigda C. (2006). ID Theft: Are you the next victim? Money 35 (5)."},{"issue":"10","key":"e_1_3_2_1_2_1","first-page":"86","article-title":"But, Officer, that isn't me","volume":"59","author":"Davis K.","year":"2005","journal-title":"Kiplinger's Personal Finance"},{"key":"e_1_3_2_1_3_1","unstructured":"Halperin A. (2006). Behold the body biometric. Business Week Online.  Halperin A. (2006). Behold the body biometric. Business Week Online ."},{"key":"e_1_3_2_1_4_1","unstructured":"Hansen B. (2006). Exploding the Social Security Number Myth. American Banker 171(101).  Hansen B. (2006). Exploding the Social Security Number Myth. American Banker 171 (101)."},{"issue":"28","key":"e_1_3_2_1_5_1","first-page":"9","article-title":"Giving the thumb to Fraud","volume":"9","author":"Jepson K.","year":"2005","journal-title":"Credit Union Journal"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111640.1111641"},{"issue":"3","key":"e_1_3_2_1_7_1","first-page":"36","volume":"92","author":"Krause J.","year":"2006","journal-title":"Stolen Lives. ABA Journal"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"LoPucki L. M. (2001). Human identification theory and the identity theft problem. Texas Law Review 80(89).  LoPucki L. M. (2001). Human identification theory and the identity theft problem. Texas Law Review 80 (89).","DOI":"10.2139\/ssrn.263213"},{"key":"e_1_3_2_1_9_1","unstructured":"Moss V. Combating identity theft (2001). Credit Union magazine. 67(6) pp.83--84  Moss V. Combating identity theft (2001). Credit Union magazine. 67 (6) pp.83--84"},{"issue":"1","key":"e_1_3_2_1_10_1","first-page":"20","article-title":"Congress Assesses Data Security Proposals","volume":"40","author":"Moye S.","year":"2006","journal-title":"Information Management Journal"},{"key":"e_1_3_2_1_11_1","unstructured":"Peek L. (2003). Passports to carry eyeprint ID says Blunkett. Times The (United Kingdom).  Peek L. (2003). Passports to carry eyeprint ID says Blunkett. Times The (United Kingdom)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2307\/3491307"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600869955134"},{"issue":"12","key":"e_1_3_2_1_14_1","first-page":"32","volume":"34","author":"Sivy M.","year":"2005","journal-title":"Toddler Fraud. Money"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/0888431022000070458"},{"key":"e_1_3_2_1_16_1","unstructured":"StopIdentityTheft.org (2006). Georgia Stop Identity Theft Network. Retrieved on June 6 2006 from www.stopidentitytheft.org\/about.html.  StopIdentityTheft.org (2006). Georgia Stop Identity Theft Network. Retrieved on June 6 2006 from www.stopidentitytheft.org\/about.html."},{"key":"e_1_3_2_1_17_1","unstructured":"Tresniowki A. and Hammel S. (2005). The Great Pretender. People 64(22).  Tresniowki A. and Hammel S. (2005). The Great Pretender. People 64 (22)."},{"key":"e_1_3_2_1_18_1","unstructured":"Wikipedia-GLBA (2006). Gramm-Leach-Bliley Financial Services Modernization Act 0f 1999. Retrieved on June 6 2006 from http:\/\/en.wikipedia.org\/wiki\/Financial_Services_Modernization_Act.  Wikipedia-GLBA (2006). Gramm-Leach-Bliley Financial Services Modernization Act 0f 1999. Retrieved on June 6 2006 from http:\/\/en.wikipedia.org\/wiki\/Financial_Services_Modernization_Act."},{"volume-title":"Retrieved on","year":"2006","author":"Wikipedia-Biometrics","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Wikipedia-HIPAA (2006). Health Insurance Portability and Accountability Act. Retrieved on June 6 2006 from http:\/\/en.wikipedia.org\/wiki\/HIPAA.  Wikipedia-HIPAA (2006). Health Insurance Portability and Accountability Act. Retrieved on June 6 2006 from http:\/\/en.wikipedia.org\/wiki\/HIPAA."},{"key":"e_1_3_2_1_21_1","unstructured":"Whitehouse (2006). Fact Sheet: The President's Identity Theft Task Force. Retrieved on June 6 2006 from http:\/\/www.whitehouse.gov\/news\/releases\/2006\/05\/20060510-6.html.  Whitehouse (2006). Fact Sheet: The President's Identity Theft Task Force. Retrieved on June 6 2006 from http:\/\/www.whitehouse.gov\/news\/releases\/2006\/05\/20060510-6.html."}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231081","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231081"}},"subtitle":["not just a financial concern"],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":21,"alternative-id":["10.1145\/1231047.1231081","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231081","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}