“A Lifecycle Approach to Identity Asset Protection.” Identity Theft and Fraud: Evaluating and Managing Risk, by Norm Archer et al., University of Ottawa Press, Ottawa, 2012, pp. 154–186, www.jstor.org/stable/j.ctt5vkcdw.10. Accessed 30 July 2021.
Archer, N., Sproule, S., Yuan, Y., Guo, K., & Xiang, J. (2012). A Lifecycle Approach to Identity Asset Protection. In Identity Theft and Fraud: Evaluating and Managing Risk (pp. 154-186). Ottawa: University of Ottawa Press. Retrieved July 30, 2021, from http://www.jstor.org/stable/j.ctt5vkcdw.10
Archer, Norm, Susan Sproule, Yufei Yuan, Ken Guo, and Junlian Xiang. "A Lifecycle Approach to Identity Asset Protection." In Identity Theft and Fraud: Evaluating and Managing Risk, 154-86. Ottawa: University of Ottawa Press, 2012. Accessed July 30, 2021. http://www.jstor.org/stable/j.ctt5vkcdw.10.
Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley…)
Export a Text file (For BibTex)
Note: Always review your references and make any necessary corrections before using. Pay attention to names, capitalization, and dates.