This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
September/October 2007 (vol. 5 no. 5)
pp. 3-4
Fred B. Schneider, Cornell University
IEEE Security & Privacy's associate editor in chief discusses technology's role in identity fraud and identity theft.

1. US Gov't. Accountability Office, Personal Information: Data Breaches Are Frequent but Evidence of Resulting Identity Theft Is Limited; However, The Full Extent Is Unknown, GAO-07-737, June 2007; www.gao.gov/new.itemsd07737.pdf.
1. US Gov't. Accountability Office, Personal Information: Data Breaches Are Frequent but Evidence of Resulting Identity Theft Is Limited; However, The Full Extent Is Unknown, GAO-07-737, June 2007; www.gao.gov/new.itemsd07737.pdf.
1. US Gov't. Accountability Office, Personal Information: Data Breaches Are Frequent but Evidence of Resulting Identity Theft Is Limited; However, The Full Extent Is Unknown, GAO-07-737, June 2007; www.gao.gov/new.itemsd07737.pdf.

Index Terms:
From the Editors, identity fraud, identity theft, authentication
Citation:
Fred B. Schneider, "Technology Scapegoats and Policy Saviors," IEEE Security & Privacy, vol. 5, no. 5, pp. 3-4, Sept.-Oct. 2007, doi:10.1109/MSP.2007.124
Usage of this product signifies your acceptance of the Terms of Use.