[1]
|
G. R. Gordon, N.A. Willox Jr., D.J. Rebovich, T.M. Regan, and J.B. Gordon. “Identity Fraud: A Critical Na-tional and Global Threat”, Journal of Economic Crime Management, 2004, 2 (1), pp. 1-48.
|
[2]
|
P. Lawson and J. Lawford, “Identity Theft: The Need for Consumer Protection.” Ottawa, Canada: The Public Inter-est Advocacy Center Working Paper, 2003, ISBN 1-895060-59-1.
|
[3]
|
A. R. Gonzales and D.P. Majoras, “Combating Identity Theft: A Strategic Plan”, 2007, Office of the President: U.S. Department of Justice.
|
[4]
|
S. Sproule and N. Archer, “Defining Identity Theft – A Discussion Paper”, 2006, Prepared for the Ontario Re-search Network in Electronic Commerce (ORNEC) Iden-tity Theft Research Program, April 6, 2006, pp. 1-37.
|
[5]
|
R. N. Mayer, “Defending Your Financial Privacy: The Benefits and Limits of Self-Help”, American Association for the Advancement of Retirees (Ed.), February 2006.
|
[6]
|
E. M. Eisenstein, “Identity Theft: An Exploratory Study with Implications for Marketers”, Journal of Business Re-search, forthcoming, 2008.
|
[7]
|
K. S. Koong, L.C. Liu, S. Bai, and Lin, “Identity Theft in the USA: Evidence from 2002 to 2006”, International Journal of Mobile Communications, 2008, 6(2), pp. 199 - 216.
|
[8]
|
Q. Min, S. Ji, and Q. Zhong, “An Overview of Identity Theft: Governance and Research Trend”, Journal of Pub-lic Management, 2007, 4 (1), pp. 49 – 55 (in Chinese).
|
[9]
|
G. R. Newman and M.M. McNally, “Identity Theft Litera-ture Review”, U.S. Department of Justice, July 2005, http://www.ncjrs.gov/pdffiles1/nij/grants/210459.pdf.
|
[10]
|
W. J. Wang, Y.F. Yuan, and N. Archer, “A TheoreticalFramework for Combating Identity Theft”, IEEE Privacy & Security, March/April 2006, pp. 30-38.
|
[11]
|
J. Zachman, “A Framework for Information Systems Ar-chitecture”, IBM Systems Journal, 1987, 26 (3), pp. 454-471.
|
[12]
|
O’Rourke, C., N. Fishman, and W. Selkow, Enterprise Architecture Using the Zachman Framework, Thompson Course Technology, 2003, Boston.
|
[13]
|
Synovate, “Federal Trade Commission – 2006 Identity Theft Survey Report”, 2006, McLean, VA, pp. 1-108.
|
[14]
|
R. V. Clarke, “Shoplifting”, U.S. Department of Justice, COPS, and Center for Problem Oriented Policing, 2001, Retrieved from http://www.popcenter.org/Problems/ prob-lem-shoplifting.htm.
|
[15]
|
K. Dolan, “Internet Auction Fraud: The Silent Victims”, Journal of Economic Crime Management, 2004, 2 (1), pp. 1-22.
|
[16]
|
E. J. Potter, “Customer Authentication: The Evolution of Signature Verification in Financial Institutions”, Journal of Economic Crime Management, 2002, 1 (1), pp. 1-19.
|
[17]
|
R. Pinheiro, “Preventing Identity Theft Using Trusted Authenticators”, Journal of Economic Crime Management, 2004, 2 (1), pp. 1-16.
|
[18]
|
M. Shreve, “Employers Slow To Recognize Identity Theft”, Business Insurance, 2004, 38 (36), p. 4.
|
[19]
|
S.J. Wells, “Stolen Identity”, HR Magazine, 2002, 47 (12), pp 30-38.
|
[20]
|
D. Cadrain, “Liability for Employee Identity Theft Is Growing”, HR Magazine, 2005, 50 (6), pp. 35-40.
|
[21]
|
N. B. Zabriskie, “Fraud by Consumers”, Journal of Retail-ing, 1973, 48 (4), pp. 22-27.
|
[22]
|
R. E. Wilkes, “Fraudulent Behavior by Consumers”, Jour-nal of Marketing, 1978, 42 (4), pp. 67-75.
|
[23]
|
J. R. Shah and M.B. Murtaza, “Effective Customer Rela-tionship Management through Web Services”, Journal of Computer Information Systems, 2005, 46 (1), pp. 98-109
|
[24]
|
R. J. Canter, “Successful CRM Hinges on Data Quality”, DestinationCRM.com, April 30, 2002, retrieved from http://www.destinationcrm.com/articles/default.asp?articleid=2177.
|
[25]
|
G. Tomko, “Biometrics As A Privacy-Enhancing Tech-nology: Friend Or Foe Of Privacy?”, Paper presented at the Privacy Laws & Business, the 9th Privacy Commis-sioners’/Data Protection Authorities Workshop, 15 Sep-tember, 1998. Santiago de Compostela, Spain. Retrieved from http://www.ct.gov/dss/cwp/view.asp?a=2349&q=304844
|
[26]
|
J. D. Woodward, "Biometrics: Privacy's Foe or Privacy's Friend?" Proceedings of the IEEE, 1997, 85 (9), pp. 1480-1492.
|
[27]
|
J. Grijpink, “Biometrics And Identity Fraud Protection - Two Barriers To Realizing The Benefits Of Biometrics - A Chain Perspective On Biometrics, And Identity Fraud”, Computer Law & Security Report, 2005a, 21 (2), pp. 138-145.
|
[28]
|
J. Grijpink, “Biometrics And Identity Fraud Protection - Two Barriers To Realizing The Benefits Of Biometrics - A Chain Perspective On Biometrics, And Identity Fraud - Part II”, Computer Law & Security Report, 2005b, 21 (3), pp. 249-256.
|
[29]
|
Computer Weekly, “Biometrics Accuracy Will Depend on Registration”, Computer Weekly, 2/10/2004, p. 26.
|
[30]
|
Verisign, “White Paper: The Merchant Supply Chain – Dangers, Challenges, and Solutions”, 05/20/2005, http://www.verisign.com/static/005292.pdf.
|
[31]
|
R. Behar, “Never Heard Of Acxiom? Chances Are It's Heard Of You”, Fortune, 2/23/2004, 149 (4), pp. 140-148.
|
[32]
|
S.H. Wildstrom, “Your Data, Naked on the Net”, Business Week Online, 2/9/2006, p. 20.
|
[33]
|
D. Gillin, “The Federal Trade Commission and Internet Privacy”, Marketing Research, 2000, 12 (3), pp. 39-41.
|
[34]
|
G. Hulme, “Lack of trust hampering online direct market-ing”, B to B, 10/10/2005, 90 (12), p. 4.
|
[35]
|
The New York Times, To Fight Identity Theft, a Call for Banks to Disclose All Incidents, March 21, 2007, Busi-ness/Financial Desk; SECTC.
|
[36]
|
Financial Executive, “Computer Disposal Raises Legal Issues”, Financial Executive, 2003, 19 (7), pp.11-12.
|
[37]
|
G.R. Gordon and N.A. Willox Jr., “Using Identity Authen-tication and Eligibility Assessment to Mitigate the Risk of Improper Payments”, Journal of Economic Crime Man-agement, 2005, 3 (1), pp 1-24.
|
[38]
|
Federal Trade Commission (2006), “Consumer Fraud and Identity Theft Complaint Data, January – December 2005”, http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf.
|
[39]
|
London School of Economics and Political Science, “The Identity Project: An Assessment of the UK Identity Cards Bill and Its Implication”, June 2005, pp. 1 – 318, retrieved from http://is2.lse.ac.uk/idcard/identityreport.pdf.
|