A comprehensive readiness assessment framework for identity theft safeguards in web-based electronic government systems

Identity theft is becoming more commonplace as the number of criminals taking advantage of the World Wide Web to lure their victims increases. The users of web-based electronic government systems are certainly not immune to this trend although the governmental organisations of various levels (federal, state and local governments) are taking steps to adopt the best possible safeguards to prevent identity theft on their websites. Despite their enthusiasm to protect citizens, governmental organisations currently lack assessment methods specifically designed to measure the effectiveness of safeguards they deploy. To address this problem, we propose a comprehensive readiness assessment framework.

[1]  Amir Hayat,et al.  Proposed Framework for an Interoperable Electronic Identity Management System , 2006 .

[2]  Paul Beynon-Davies,et al.  Personal identity management and electronic government: The case of the national identity card in the UK , 2007, J. Enterp. Inf. Manag..

[3]  Sebastian Clauß,et al.  Identity management and its support of multilateral security , 2001, Comput. Networks.

[4]  Ibrahim Kushchu,et al.  Uses of Mobile Government in Developing Countries , 2004 .

[5]  France Bélanger,et al.  A framework for e-government: privacy implications , 2006, Bus. Process. Manag. J..

[6]  Brendan Van Alsenoy,et al.  Due processing of personal data in eGovernment? , 2008, Datenschutz und Datensicherheit - DuD.

[7]  L. Jean Camp Identity, authentication, and identifiers in digital government , 2003, Proceedings. International Symposium on Technology and Society, 2003. Crime Prevention, Security and Design. 2003..

[8]  Jeffrey Roy National identity and continental interoperablity: does Canada need a new identity card? , 2006 .

[9]  L. Jean Camp,et al.  Identity in Digital Government , 2004 .

[10]  Peter Alterman The US Federal PKI and the Federal Bridge Certification Authority , 2001, Comput. Networks.

[11]  Milind Sathye,et al.  Fraud in e-government transactions risks and remedies , 2004 .

[12]  Stephen Mason Validating identity for the electronic environment , 2004, Comput. Law Secur. Rev..

[13]  M. Caloyannides,et al.  US e-government authentication framework and programs , 2003 .

[14]  Young B. Choi,et al.  A quantification model using P3P in privacy control for telecommunications service management , 2005, Int. J. Serv. Stand..

[15]  Abu Hassan,et al.  IDENTITY THEFT: WHAT CAN WE LEARNED? , 2001 .

[16]  Sharif As-Saber,et al.  Information technology law and e-government: a developing country perspective , 2006 .

[17]  A. Emigh,et al.  Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures , 2005 .

[18]  John A. Taylor,et al.  Identity Management as Public Innovation: Looking beyond ID Cards and Authentication Systems , 2005 .