Abstract
The Internet has made it easier for individuals and organizations to communicate and conduct business online. At the same time, personal, commercial, and government information has become a target for identity theft. The incidences of identity theft have increased substantially in the Internet age. Increasing news reports of bank/credit cards theft, assumed identity for economical and criminal activities has created a growing concern for individuals, businesses, and governments. As a result, it's become an important and urgent task for us to find managerial and technical solutions to combat identity fraud and theft. Solutions to identity theft problem must deal with multiple parties and coordinated efforts must be made among concerned parties. This paper is to provide a comprehensive view of identity theft issue from system planner's perspective. The roles of identity owner, issuer, checker, and protector, are examined to provide a starting point for organizational and information systems design.
Cite
CITATION STYLE
Ji, S., Chao, S. S., & Min, Q.-F. (2008). Systems Plan for Combating Identity Theft – A Theoretical Framework. Journal of Service Science and Management, 01(02), 143–152. https://doi.org/10.4236/jssm.2008.12015
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.