scispace - formally typeset
Open AccessJournal ArticleDOI

Systems Plan for Combating Identity Theft – A Theoretical Framework

Shaobo Ji, +2 more
- 10 Aug 2008 - 
- Vol. 01, Iss: 2, pp 143-152
TLDR
In this article, the roles of identity owner, issuer, checker, and protector are examined to provide a starting point for organizational and information systems design to combat identity fraud and theft.
Abstract
The Internet has made it easier for individuals and organizations to communicate and conduct business online. At the same time, personal, commercial, and government information has become a target for identity theft. The incidences of identity theft have increased substantially in the Internet age. Increasing news reports of bank/credit cards theft, as-sumed identity for economical and criminal activities has created a growing concern for individuals, businesses, and governments. As a result, it’s become an important and urgent task for us to find managerial and technical solutions to combat identity fraud and theft. Solutions to identity theft problem must deal with multiple parties and coordinated ef-forts must be made among concerned parties. This paper is to provide a comprehensive view of identity theft issue from system planner’s perspective. The roles of identity owner, issuer, checker, and protector, are examined to provide a starting point for organizational and information systems design.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Information security management needs more holistic approach

TL;DR: It is found that numerous activities of management, particularly development and execution of information security policy, awareness, compliance training, development of effective enterprise information architecture, IT infrastructure management, business and IT alignment and human resources management, had a significant impact on the quality of management of Information security.
Dissertation

The prevention of internal identity theft-related crimes : a case study research of the UK online retail companies

TL;DR: In this article, a case study of the UK Online Retail Companies was conducted to investigate the use of role-based framework (RBF) for the prevention of Internal Identity Theft-Related Crimes (IIDTRC).
References
More filters
Journal ArticleDOI

Fraudulent Behavior by Consumers

TL;DR: In this paper, the authors estimate that store losses due to shoplifting now amount to a hidden tax of $150 on each family in the United States every year as a result of these losses being passed on to customers in the form of higher prices.
Journal ArticleDOI

Biometrics: privacy's foe or privacy's friend?

TL;DR: This paper contends that while biometric concerns may pose legitimate privacy concerns, these issues can be adequately addressed and in the final analysis, biometrics emerges as privacy's friend.
Book

Enterprise Architecture Using the Zachman Framework

TL;DR: Part 1 Reasons: ubiquity - understanding the Zachman framework part 2 Framing the framework: science commerce psychology technology in commerce systems development the Zach man framework for enterprise architecture and part 3 Implementing the Framework: dynamical framework.
Journal ArticleDOI

Identity theft: An exploratory study with implications for marketers

TL;DR: The authors used a system dynamics model to explore policy options dealing with identity theft and to provide implications for marketers, concluding that the current approach to combating identity theft will not work and that inexpensive security freezes could be effective, because they result in a nonlinear reduction in identity theft that is similar to the "herd immunity" seen in epidemiology.

Internet Auction Fraud: The Silent Victims

Kyo M. Dolan
TL;DR: In 2003, an online victimization survey was conducted in conjunction with the National White Collar Crime Center as mentioned in this paper, which revealed that eBay is the most utilized Internet auction house, most victims reported the crime to the auction house; more than half of the victims did not research the sellers; and non-delivery of the product was the method most commonly utilized.