Systems Plan for Combating Identity Theft – A Theoretical Framework

HTML  Download Download as PDF (Size: 103KB)  PP. 143-152  
DOI: 10.4236/jssm.2008.12015    5,784 Downloads   11,445 Views  Citations

ABSTRACT

The Internet has made it easier for individuals and organizations to communicate and conduct business online. At the same time, personal, commercial, and government information has become a target for identity theft. The incidences of identity theft have increased substantially in the Internet age. Increasing news reports of bank/credit cards theft, as-sumed identity for economical and criminal activities has created a growing concern for individuals, businesses, and governments. As a result, it’s become an important and urgent task for us to find managerial and technical solutions to combat identity fraud and theft. Solutions to identity theft problem must deal with multiple parties and coordinated ef-forts must be made among concerned parties. This paper is to provide a comprehensive view of identity theft issue from system planner’s perspective. The roles of identity owner, issuer, checker, and protector, are examined to provide a starting point for organizational and information systems design.

Share and Cite:

S. Ji, S. Chao and Q. Min, "Systems Plan for Combating Identity Theft – A Theoretical Framework," Journal of Service Science and Management, Vol. 1 No. 2, 2008, pp. 143-152. doi: 10.4236/jssm.2008.12015.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.