Systems Plan for Combating Identity Theft - A Theoretical Framework

The incidences of identity theft have increased substantially in the Internet age. Increasing news reports of bank/credit cards theft, assumed identity for economical and criminal activities has created a growing concern for individuals, businesses, and governments. As a result, it's become an important and urgent task for organizations to find managerial and technical solutions to combat identity fraud and theft. Solutions to identity theft problem must deal with multiple parties and coordinated efforts must be made among concerned parties. This paper is to provide a comprehensive view of identity theft issue from system planner's perspective. The roles of identity owner, issuer, checker, and protector, are examined to provide a starting point for organizational and information systems design.

[1]  E. Eisenstein Identity theft: An exploratory study with implications for marketers , 2008 .

[2]  Binshan Lin,et al.  Identity theft in the USA: evidence from 2002 to 2006 , 2008, Int. J. Mob. Commun..

[3]  Wenjie Wang,et al.  A contextual framework for combating identity theft , 2006, IEEE Security & Privacy.

[4]  R. N. Mayer Defending Your Financial Privacy: The Benefits and Limits of Self-Help , 2006 .

[5]  Jaymeen R. Shah,et al.  Effective Customer Relationship Management through Web Services , 2005, J. Comput. Inf. Syst..

[6]  G. Newman,et al.  Identity Theft Literature Review , 2005 .

[7]  Edgar A. Whitley,et al.  The identity project: an assessment of the UK Identity Cards Bill and its implications , 2005 .

[8]  J.H.A.M. Grijpink,et al.  Biometrics and identity fraud protection: Two barriers to realizing the benefits of biometrics - A chain perspective on biometrics, and identity fraud - Part II , 2005, Comput. Law Secur. Rev..

[9]  Norman A. Willox,et al.  Using Identity Authentication and Eligibility Assessment to Mitigate the Risk of Improper Payments , 2005 .

[10]  Yufei Yuan,et al.  A theoretical framework for combating identity theft , 2004 .

[11]  Thomas M. Regan,et al.  Identity Fraud: A Critical National and Global Threat , 2004 .

[12]  Kyo M. Dolan Internet Auction Fraud: The Silent Victims , 2004 .

[13]  Carol O'Rourke,et al.  Enterprise Architecture Using the Zachman Framework , 2003 .

[14]  Edward J. Potter Customer Authentication: The Evolution of Signature Verification in Financial Institutions , 2002 .

[15]  John D. Woodward,et al.  Biometrics: privacy's foe or privacy's friend? , 1997, Proc. IEEE.

[16]  John A. Zachman,et al.  A Framework for Information Systems Architecture , 1987, IBM Syst. J..

[17]  R. Wilkes Fraudulent Behavior by Consumers , 1978 .

[18]  R. Posner The Federal Trade Commission , 1969 .

[19]  J. Baird Shoplifting , 1963, British medical journal.