Share This Article:

Systems Plan for Combating Identity Theft – A Theoretical Framework

Abstract Full-Text HTML Download Download as PDF (Size:103KB) PP. 143-152
DOI: 10.4236/jssm.2008.12015    5,007 Downloads   9,728 Views   Citations

ABSTRACT

The Internet has made it easier for individuals and organizations to communicate and conduct business online. At the same time, personal, commercial, and government information has become a target for identity theft. The incidences of identity theft have increased substantially in the Internet age. Increasing news reports of bank/credit cards theft, as-sumed identity for economical and criminal activities has created a growing concern for individuals, businesses, and governments. As a result, it’s become an important and urgent task for us to find managerial and technical solutions to combat identity fraud and theft. Solutions to identity theft problem must deal with multiple parties and coordinated ef-forts must be made among concerned parties. This paper is to provide a comprehensive view of identity theft issue from system planner’s perspective. The roles of identity owner, issuer, checker, and protector, are examined to provide a starting point for organizational and information systems design.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

S. Ji, S. Chao and Q. Min, "Systems Plan for Combating Identity Theft – A Theoretical Framework," Journal of Service Science and Management, Vol. 1 No. 2, 2008, pp. 143-152. doi: 10.4236/jssm.2008.12015.

References

[1] G. R. Gordon, N.A. Willox Jr., D.J. Rebovich, T.M. Regan, and J.B. Gordon. “Identity Fraud: A Critical Na-tional and Global Threat”, Journal of Economic Crime Management, 2004, 2 (1), pp. 1-48.
[2] P. Lawson and J. Lawford, “Identity Theft: The Need for Consumer Protection.” Ottawa, Canada: The Public Inter-est Advocacy Center Working Paper, 2003, ISBN 1-895060-59-1.
[3] A. R. Gonzales and D.P. Majoras, “Combating Identity Theft: A Strategic Plan”, 2007, Office of the President: U.S. Department of Justice.
[4] S. Sproule and N. Archer, “Defining Identity Theft – A Discussion Paper”, 2006, Prepared for the Ontario Re-search Network in Electronic Commerce (ORNEC) Iden-tity Theft Research Program, April 6, 2006, pp. 1-37.
[5] R. N. Mayer, “Defending Your Financial Privacy: The Benefits and Limits of Self-Help”, American Association for the Advancement of Retirees (Ed.), February 2006.
[6] E. M. Eisenstein, “Identity Theft: An Exploratory Study with Implications for Marketers”, Journal of Business Re-search, forthcoming, 2008.
[7] K. S. Koong, L.C. Liu, S. Bai, and Lin, “Identity Theft in the USA: Evidence from 2002 to 2006”, International Journal of Mobile Communications, 2008, 6(2), pp. 199 - 216.
[8] Q. Min, S. Ji, and Q. Zhong, “An Overview of Identity Theft: Governance and Research Trend”, Journal of Pub-lic Management, 2007, 4 (1), pp. 49 – 55 (in Chinese).
[9] G. R. Newman and M.M. McNally, “Identity Theft Litera-ture Review”, U.S. Department of Justice, July 2005, http://www.ncjrs.gov/pdffiles1/nij/grants/210459.pdf.
[10] W. J. Wang, Y.F. Yuan, and N. Archer, “A TheoreticalFramework for Combating Identity Theft”, IEEE Privacy & Security, March/April 2006, pp. 30-38.
[11] J. Zachman, “A Framework for Information Systems Ar-chitecture”, IBM Systems Journal, 1987, 26 (3), pp. 454-471.
[12] O’Rourke, C., N. Fishman, and W. Selkow, Enterprise Architecture Using the Zachman Framework, Thompson Course Technology, 2003, Boston.
[13] Synovate, “Federal Trade Commission – 2006 Identity Theft Survey Report”, 2006, McLean, VA, pp. 1-108.
[14] R. V. Clarke, “Shoplifting”, U.S. Department of Justice, COPS, and Center for Problem Oriented Policing, 2001, Retrieved from http://www.popcenter.org/Problems/ prob-lem-shoplifting.htm.
[15] K. Dolan, “Internet Auction Fraud: The Silent Victims”, Journal of Economic Crime Management, 2004, 2 (1), pp. 1-22.
[16] E. J. Potter, “Customer Authentication: The Evolution of Signature Verification in Financial Institutions”, Journal of Economic Crime Management, 2002, 1 (1), pp. 1-19.
[17] R. Pinheiro, “Preventing Identity Theft Using Trusted Authenticators”, Journal of Economic Crime Management, 2004, 2 (1), pp. 1-16.
[18] M. Shreve, “Employers Slow To Recognize Identity Theft”, Business Insurance, 2004, 38 (36), p. 4.
[19] S.J. Wells, “Stolen Identity”, HR Magazine, 2002, 47 (12), pp 30-38.
[20] D. Cadrain, “Liability for Employee Identity Theft Is Growing”, HR Magazine, 2005, 50 (6), pp. 35-40.
[21] N. B. Zabriskie, “Fraud by Consumers”, Journal of Retail-ing, 1973, 48 (4), pp. 22-27.
[22] R. E. Wilkes, “Fraudulent Behavior by Consumers”, Jour-nal of Marketing, 1978, 42 (4), pp. 67-75.
[23] J. R. Shah and M.B. Murtaza, “Effective Customer Rela-tionship Management through Web Services”, Journal of Computer Information Systems, 2005, 46 (1), pp. 98-109
[24] R. J. Canter, “Successful CRM Hinges on Data Quality”, DestinationCRM.com, April 30, 2002, retrieved from http://www.destinationcrm.com/articles/default.asp?articleid=2177.
[25] G. Tomko, “Biometrics As A Privacy-Enhancing Tech-nology: Friend Or Foe Of Privacy?”, Paper presented at the Privacy Laws & Business, the 9th Privacy Commis-sioners’/Data Protection Authorities Workshop, 15 Sep-tember, 1998. Santiago de Compostela, Spain. Retrieved from http://www.ct.gov/dss/cwp/view.asp?a=2349&q=304844
[26] J. D. Woodward, "Biometrics: Privacy's Foe or Privacy's Friend?" Proceedings of the IEEE, 1997, 85 (9), pp. 1480-1492.
[27] J. Grijpink, “Biometrics And Identity Fraud Protection - Two Barriers To Realizing The Benefits Of Biometrics - A Chain Perspective On Biometrics, And Identity Fraud”, Computer Law & Security Report, 2005a, 21 (2), pp. 138-145.
[28] J. Grijpink, “Biometrics And Identity Fraud Protection - Two Barriers To Realizing The Benefits Of Biometrics - A Chain Perspective On Biometrics, And Identity Fraud - Part II”, Computer Law & Security Report, 2005b, 21 (3), pp. 249-256.
[29] Computer Weekly, “Biometrics Accuracy Will Depend on Registration”, Computer Weekly, 2/10/2004, p. 26.
[30] Verisign, “White Paper: The Merchant Supply Chain – Dangers, Challenges, and Solutions”, 05/20/2005, http://www.verisign.com/static/005292.pdf.
[31] R. Behar, “Never Heard Of Acxiom? Chances Are It's Heard Of You”, Fortune, 2/23/2004, 149 (4), pp. 140-148.
[32] S.H. Wildstrom, “Your Data, Naked on the Net”, Business Week Online, 2/9/2006, p. 20.
[33] D. Gillin, “The Federal Trade Commission and Internet Privacy”, Marketing Research, 2000, 12 (3), pp. 39-41.
[34] G. Hulme, “Lack of trust hampering online direct market-ing”, B to B, 10/10/2005, 90 (12), p. 4.
[35] The New York Times, To Fight Identity Theft, a Call for Banks to Disclose All Incidents, March 21, 2007, Busi-ness/Financial Desk; SECTC.
[36] Financial Executive, “Computer Disposal Raises Legal Issues”, Financial Executive, 2003, 19 (7), pp.11-12.
[37] G.R. Gordon and N.A. Willox Jr., “Using Identity Authen-tication and Eligibility Assessment to Mitigate the Risk of Improper Payments”, Journal of Economic Crime Man-agement, 2005, 3 (1), pp 1-24.
[38] Federal Trade Commission (2006), “Consumer Fraud and Identity Theft Complaint Data, January – December 2005”, http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf.
[39] London School of Economics and Political Science, “The Identity Project: An Assessment of the UK Identity Cards Bill and Its Implication”, June 2005, pp. 1 – 318, retrieved from http://is2.lse.ac.uk/idcard/identityreport.pdf.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.