Systems Plan for Combating Identity Theft – A Theoretical Framework

Read  full  paper  at:http://www.scirp.org/journal/PaperInformation.aspx?PaperID=102#.VNsVLizQrzE

The Internet has made it easier for individuals and organizations to communicate and conduct business online. At the same time, personal, commercial, and government information has become a target for identity theft. The incidences of identity theft have increased substantially in the Internet age. Increasing news reports of bank/credit cards theft, as-sumed identity for economical and criminal activities has created a growing concern for individuals, businesses, and governments. As a result, it’s become an important and urgent task for us to find managerial and technical solutions to combat identity fraud and theft. Solutions to identity theft problem must deal with multiple parties and coordinated ef-forts must be made among concerned parties. This paper is to provide a comprehensive view of identity theft issue from system planner’s perspective. The roles of identity owner, issuer, checker, and protector, are examined to provide a starting point for organizational and information systems design.

Cite this paper

S. Ji, S. Chao and Q. Min, “Systems Plan for Combating Identity Theft – A Theoretical Framework,” Journal of Service Science and Management, Vol. 1 No. 2, 2008, pp. 143-152. doi: 10.4236/jssm.2008.12015.

References

[1] G. R. Gordon, N.A. Willox Jr., D.J. Rebovich, T.M. Regan, and J.B. Gordon. “Identity Fraud: A Critical Na-tional and Global Threat”, Journal of Economic Crime Management, 2004, 2 (1), pp. 1-48.
[2] P. Lawson and J. Lawford, “Identity Theft: The Need for Consumer Protection.” Ottawa, Canada: The Public Inter-est Advocacy Center Working Paper, 2003, ISBN 1-895060-59-1.
[3] A. R. Gonzales and D.P. Majoras, “Combating Identity Theft: A Strategic Plan”, 2007, Office of the President: U.S. Department of Justice.
[4] S. Sproule and N. Archer, “Defining Identity Theft – A Discussion Paper”, 2006, Prepared for the Ontario Re-search Network in Electronic Commerce (ORNEC) Iden-tity Theft Research Program, April 6, 2006, pp. 1-37.
[5] R. N. Mayer, “Defending Your Financial Privacy: The Benefits and Limits of Self-Help”, American Association for the Advancement of Retirees (Ed.), February 2006.
[6] E. M. Eisenstein, “Identity Theft: An Exploratory Study with Implications for Marketers”, Journal of Business Re-search, forthcoming, 2008.
[7] K. S. Koong, L.C. Liu, S. Bai, and Lin, “Identity Theft in the USA: Evidence from 2002 to 2006”, International Journal of Mobile Communications, 2008, 6(2), pp. 199 – 216.
[8] Q. Min, S. Ji, and Q. Zhong, “An Overview of Identity Theft: Governance and Research Trend”, Journal of Pub-lic Management, 2007, 4 (1), pp. 49 – 55 (in Chinese).
[9] G. R. Newman and M.M. McNally, “Identity Theft Litera-ture Review”, U.S. Department of Justice, July 2005, http://www.ncjrs.gov/pdffiles1/nij/grants/210459.pdf.
[10] W. J. Wang, Y.F. Yuan, and N. Archer, “A TheoreticalFramework for Combating Identity Theft”, IEEE Privacy & Security, March/April 2006, pp. 30-38.
[11] J. Zachman, “A Framework for Information Systems Ar-chitecture”, IBM Systems Journal, 1987, 26 (3), pp. 454-471.
[12] O’Rourke, C., N. Fishman, and W. Selkow, Enterprise Architecture Using the Zachman Framework, Thompson Course Technology, 2003, Boston.
[13] Synovate, “Federal Trade Commission – 2006 Identity Theft Survey Report”, 2006, McLean, VA, pp. 1-108.
[14] R. V. Clarke, “Shoplifting”, U.S. Department of Justice, COPS, and Center for Problem Oriented Policing, 2001, Retrieved from http://www.popcenter.org/Problems/ prob-lem-shoplifting.htm.
[15] K. Dolan, “Internet Auction Fraud: The Silent Victims”, Journal of Economic Crime Management, 2004, 2 (1), pp. 1-22.
[16] E. J. Potter, “Customer Authentication: The Evolution of Signature Verification in Financial Institutions”, Journal of Economic Crime Management, 2002, 1 (1), pp. 1-19.
[17] R. Pinheiro, “Preventing Identity Theft Using Trusted Authenticators”, Journal of Economic Crime Management, 2004, 2 (1), pp. 1-16.
[18] M. Shreve, “Employers Slow To Recognize Identity Theft”, Business Insurance, 2004, 38 (36), p. 4.
[19] S.J. Wells, “Stolen Identity”, HR Magazine, 2002, 47 (12), pp 30-38.
[20] D. Cadrain, “Liability for Employee Identity Theft Is Growing”, HR Magazine, 2005, 50 (6), pp. 35-40.
[21] N. B. Zabriskie, “Fraud by Consumers”, Journal of Retail-ing, 1973, 48 (4), pp. 22-27.
[22] R. E. Wilkes, “Fraudulent Behavior by Consumers”, Jour-nal of Marketing, 1978, 42 (4), pp. 67-75.
[23] J. R. Shah and M.B. Murtaza, “Effective Customer Rela-tionship Management through Web Services”, Journal of Computer Information Systems, 2005, 46 (1), pp. 98-109
[24] R. J. Canter, “Successful CRM Hinges on Data Quality”, DestinationCRM.com, April 30, 2002, retrieved from http://www.destinationcrm.com/articles/default.asp?articleid=2177.
[25] G. Tomko, “Biometrics As A Privacy-Enhancing Tech-nology: Friend Or Foe Of Privacy?”, Paper presented at the Privacy Laws & Business, the 9th Privacy Commis-sioners’/Data Protection Authorities Workshop, 15 Sep-tember, 1998. Santiago de Compostela, Spain. Retrieved from http://www.ct.gov/dss/cwp/view.asp?a=2349&q=304844
[26] J. D. Woodward, “Biometrics: Privacy’s Foe or Privacy’s Friend?” Proceedings of the IEEE, 1997, 85 (9), pp. 1480-1492.
[27] J. Grijpink, “Biometrics And Identity Fraud Protection – Two Barriers To Realizing The Benefits Of Biometrics – A Chain Perspective On Biometrics, And Identity Fraud”, Computer Law & Security Report, 2005a, 21 (2), pp. 138-145.
[28] J. Grijpink, “Biometrics And Identity Fraud Protection – Two Barriers To Realizing The Benefits Of Biometrics – A Chain Perspective On Biometrics, And Identity Fraud – Part II”, Computer Law & Security Report, 2005b, 21 (3), pp. 249-256.
[29] Computer Weekly, “Biometrics Accuracy Will Depend on Registration”, Computer Weekly, 2/10/2004, p. 26.
[30] Verisign, “White Paper: The Merchant Supply Chain – Dangers, Challenges, and Solutions”, 05/20/2005, http://www.verisign.com/static/005292.pdf.
[31] R. Behar, “Never Heard Of Acxiom? Chances Are It’s Heard Of You”, Fortune, 2/23/2004, 149 (4), pp. 140-148.
[32] S.H. Wildstrom, “Your Data, Naked on the Net”, Business Week Online, 2/9/2006, p. 20.
[33] D. Gillin, “The Federal Trade Commission and Internet Privacy”, Marketing Research, 2000, 12 (3), pp. 39-41.
[34] G. Hulme, “Lack of trust hampering online direct market-ing”, B to B, 10/10/2005, 90 (12), p. 4.
[35] The New York Times, To Fight Identity Theft, a Call for Banks to Disclose All Incidents, March 21, 2007, Busi-ness/Financial Desk; SECTC.
[36] Financial Executive, “Computer Disposal Raises Legal Issues”, Financial Executive, 2003, 19 (7), pp.11-12.
[37] G.R. Gordon and N.A. Willox Jr., “Using Identity Authen-tication and Eligibility Assessment to Mitigate the Risk of Improper Payments”, Journal of Economic Crime Man-agement, 2005, 3 (1), pp 1-24.
[38] Federal Trade Commission (2006), “Consumer Fraud and Identity Theft Complaint Data, January – December 2005”, http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf.                 eww150211lx
[39] London School of Economics and Political Science, “The Identity Project: An Assessment of the UK Identity Cards Bill and Its Implication”, June 2005, pp. 1 – 318, retrieved from http://is2.lse.ac.uk/idcard/identityreport.pdf.
Advertisements

发表评论

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / 更改 )

Twitter picture

You are commenting using your Twitter account. Log Out / 更改 )

Facebook photo

You are commenting using your Facebook account. Log Out / 更改 )

Google+ photo

You are commenting using your Google+ account. Log Out / 更改 )

Connecting to %s