Systems Plan for Combating Identity Theft – A Theoretical Framework

  • Ji S
  • Chao S
  • Min Q
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

The Internet has made it easier for individuals and organizations to communicate and conduct business online. At the same time, personal, commercial, and government information has become a target for identity theft. The incidences of identity theft have increased substantially in the Internet age. Increasing news reports of bank/credit cards theft, assumed identity for economical and criminal activities has created a growing concern for individuals, businesses, and governments. As a result, it's become an important and urgent task for us to find managerial and technical solutions to combat identity fraud and theft. Solutions to identity theft problem must deal with multiple parties and coordinated efforts must be made among concerned parties. This paper is to provide a comprehensive view of identity theft issue from system planner's perspective. The roles of identity owner, issuer, checker, and protector, are examined to provide a starting point for organizational and information systems design.

Cite

CITATION STYLE

APA

Ji, S., Chao, S. S., & Min, Q.-F. (2008). Systems Plan for Combating Identity Theft – A Theoretical Framework. Journal of Service Science and Management, 01(02), 143–152. https://doi.org/10.4236/jssm.2008.12015

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free