Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
Fraud
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
134.155.108.49:8890
associated with source
dataset(s)
Attributes
Values
rdfs:label
Fraud
is
dcterms:subject
of
Web-cramming
Profile-squatting
Typosquatter
Second chance offer
Pyramid Scheme
Northern California Computer Crime Task Force
Putting an End to Account-Hijacking Identity Theft
National Fraud Authority
Report on Phishing: A Report to the Minister of Public Safety and Emergency Preparedness Canada and the Attorney General of the United States
Antifraud Locator using EBT Retailer Transactions
Detecting Deception
Cybershopping: Protecting Yourself When Buying Online
Privacy and authentication management
FTC v. Carlos Pereira
Data diddling
Identity fraud
Misrepresentation
Fraud alert
Credit card fraud
Business record theft
Protecting Consumers Online
CyFin
Identity Theft Assistance Center
Holiday Phishing and Online Cyber Scams
Hidden dialer
Repudiation of transaction
Ponzi scheme
Fraud and Computer Data Matching
Trust in Ads
Telecommunications: Update on State-Level Cramming Complaints and Enforcement Actions
Mobile Telephone Crime
Hitman scam
Astrological reading scam
Skimmer
Identitytheft.gov
FTC v. Atkinson
Cyberfraud
Employment fraud
Work-at-home scam
FTC v. Advertising Strategies, LLC
Unfair trade practices
Cookie manipulation
Document fraud
Communications Fraud Control Association
Repudiation of data
ATM fraud
Benefit fraud
Mobile cramming
Recommendations of the OECD Council Concerning Guidelines for Consumer Protection in the Context of Electronic Commerce
Falsification
Fake check scheme
Phisher
Carderplanet
Operation Cure All
Inter-jurisdictional Identity Management and Authentication Task Force
E-personation
Twishing
Vishing
Telecommunications fraud
Account fraud
Consumer Sentinel
Wire fraud
Money mule
OECD Guidelines for Protecting Consumers from Fraudulent and Deceptive Commercial Practices Across Borders
Bid shielding
Survey scam
Binational Working Group on Cross-Border Mass Marketing Fraud
Shivers v. Sweda Int'l
President's Council on Integrity and Efficiency
Section 5 of the FTC Act
Identity-Related Crime: A Threat Assessment
Fraud resolution systems
U.S. v. Digilio
CERT.Brazil
Advisory to Financial Institutions on Cyber-Events and Cyber-Enabled Crime
Identity Crisis ... What to Do If Your Identity is Stolen
Identity-related crime
Accusystems v. Honeywell Information Systems
Surf Days
Identity crime
Executive Order 13402
Cross-site scripting flaws
Internet fraud
Credit card number generator
False pretenses
Investment fraud
FTC v. Audiotex Connection
A Bank Customer’s Guide to Cybersecurity
Impersonation
Mail fraud
Carding
Microsoft Lottery
Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business
MTV Networks v. Curry
Telemarketing fraud
National Fraud Information Center
Strand v. Librascope
Account take over attack
Identity Theft Enforcement Interagency Working Group
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 3
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software