skip to content
Identity theft Preview this item
ClosePreview this item
Checking...

Identity theft

Author: A W Buckey; Drew Procaccino
Publisher: Minneapolis, Minnesota : Core Library, an imprint of Abdo Publishing, [2019] ©2020
Series: Privacy in the digital age (Core Library (Firm))
Edition/Format:   Print book : Elementary and junior high school : EnglishView all editions and formats
Summary:
Many people store and share personal information online. This information is part of a person's identity. Identity thieves can find and steal this information. Identity Theft explores how people can protect themselves from identity theft.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Juvenile works
Juvenile literature
Material Type: Elementary and junior high school
Document Type: Book
All Authors / Contributors: A W Buckey; Drew Procaccino
ISBN: 9781532118920 1532118929
OCLC Number: 1089546383
Target Audience: Ages 9-13.
Description: 48 pages : color illustrations ; 24 cm.
Contents: Operation Swiper --
What is identity? --
Digital identity theft --
The harm of identity theft --
Prevention and response --
Identity theft protection --
Fast facts --
Stop and think --
Glossary --
Online resources --
Learn more.
Series Title: Privacy in the digital age (Core Library (Firm))
Responsibility: by A. W. Buckey ; content consultant, Drew Procaccino.

Abstract:

Many people store and share personal information online. This information is part of a person's identity. Identity thieves can find and steal this information. Identity Theft explores how people can protect themselves from identity theft.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1089546383<\/a>> # Identity theft<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1089546383<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/mnu<\/a>> ;\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Unknown \'gen\' value: ejh<\/span>\" ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/identity_theft_law_and_legislation<\/a>> ; # Identity theft--Law and legislation<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/juvenile_nonfiction_computers_internet_&_social_media<\/a>> ; # JUVENILE NONFICTION \/ Computers \/ Internet & Social Media<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Place\/united_states<\/a>> ; # United States.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/juvenile_nonfiction_technology_electricity_&_electronics<\/a>> ; # JUVENILE NONFICTION \/ Technology \/ Electricity & Electronics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/personal_information_management<\/a>> ; # Personal information management<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/privacy_right_of_united_states<\/a>> ; # Privacy, Right of--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/computer_crimes<\/a>> ; # Computer crimes<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/juvenile_nonfiction_health_&_daily_living_safety<\/a>> ; # JUVENILE NONFICTION \/ Health & Daily Living \/ Safety<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/identity_theft_prevention<\/a>> ; # Identity theft--Prevention<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/internet_safety_measures<\/a>> ; # Internet--Safety measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/online_identity_theft<\/a>> ; # Online identity theft<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/internet_security_measures<\/a>> ; # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/privacy_right_of<\/a>> ; # Privacy, Right of<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Person\/buckey_a_w<\/a>> ; # A. W. Buckey<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contentRating<\/a> \"Ages 9-13.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Person\/procaccino_drew<\/a>> ; # Drew Procaccino<\/span>\n\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2020<\/span>\" ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Many people store and share personal information online. This information is part of a person\'s identity. Identity thieves can find and steal this information. Identity Theft explores how people can protect themselves from identity theft.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Operation Swiper -- What is identity? -- Digital identity theft -- The harm of identity theft -- Prevention and response -- Identity theft protection -- Fast facts -- Stop and think -- Glossary -- Online resources -- Learn more.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/8964259768<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Juvenile works<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Series\/privacy_in_the_digital_age_core_library_firm<\/a>> ; # Privacy in the digital age (Core Library (Firm))<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Series\/privacy_in_the_digital_age<\/a>> ; # Privacy in the digital age<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Identity theft<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1089546383<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781532118920<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1089546383<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Person\/buckey_a_w<\/a>> # A. W. Buckey<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Buckey<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"A. W.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"A. W. Buckey<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Person\/procaccino_drew<\/a>> # Drew Procaccino<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Procaccino<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Drew<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Drew Procaccino<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Place\/united_states<\/a>> # United States.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Series\/privacy_in_the_digital_age<\/a>> # Privacy in the digital age<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1089546383<\/a>> ; # Identity theft<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy in the digital age<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Series\/privacy_in_the_digital_age_core_library_firm<\/a>> # Privacy in the digital age (Core Library (Firm))<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1089546383<\/a>> ; # Identity theft<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy in the digital age (Core Library (Firm))<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/computer_crimes<\/a>> # Computer crimes<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/identity_theft_law_and_legislation<\/a>> # Identity theft--Law and legislation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Identity theft--Law and legislation<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/identity_theft_prevention<\/a>> # Identity theft--Prevention<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Identity theft--Prevention<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/internet_safety_measures<\/a>> # Internet--Safety measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--Safety measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/internet_security_measures<\/a>> # Internet--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/juvenile_nonfiction_computers_internet_&_social_media<\/a>> # JUVENILE NONFICTION \/ Computers \/ Internet & Social Media<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"JUVENILE NONFICTION \/ Computers \/ Internet & Social Media<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/juvenile_nonfiction_health_&_daily_living_safety<\/a>> # JUVENILE NONFICTION \/ Health & Daily Living \/ Safety<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"JUVENILE NONFICTION \/ Health & Daily Living \/ Safety<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/juvenile_nonfiction_technology_electricity_&_electronics<\/a>> # JUVENILE NONFICTION \/ Technology \/ Electricity & Electronics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"JUVENILE NONFICTION \/ Technology \/ Electricity & Electronics<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/online_identity_theft<\/a>> # Online identity theft<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Online identity theft<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/personal_information_management<\/a>> # Personal information management<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Personal information management<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/privacy_right_of<\/a>> # Privacy, Right of<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy, Right of<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/8964259768#Topic\/privacy_right_of_united_states<\/a>> # Privacy, Right of--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Privacy, Right of--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/mnu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"mnu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781532118920<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1532118929<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781532118920<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n