Abstract

The Internet has made it easier for individuals and organizations to communicate and conduct business online. At the same time, personal, commercial, and government information has become a target for identity theft. The incidences of identity theft have increased substantially in the Internet age. Increasing news reports of bank/credit cards theft, as-sumed identity for economical and criminal activities has created a growing concern for individuals, businesses, and governments. As a result, it’s become an important and urgent task for us to find managerial and technical solutions to combat identity fraud and theft. Solutions to identity theft problem must deal with multiple parties and coordinated ef-forts must be made among concerned parties. This paper is to provide a comprehensive view of identity theft issue from system planner’s perspective. The roles of identity owner, issuer, checker, and protector, are examined to provide a starting point for organizational and information systems design.

Highlights

  • Identify theft problem has been one of the major concerns for individuals, businesses, and governments in the Internet age

  • The importance of Wang et al.’s and Zachman’s frameworks for system planning to combat identity theft is that it provides a comprehensive view of various roles and their relationships in the identity chain

  • We believe that combating identity theft will require coordination of identity owner, issuer, checker, and protector

Read more

Summary

Introduction

Identify theft problem has been one of the major concerns for individuals, businesses, and governments in the Internet age. Tremendous efforts have been made over the past decade by governments, businesses, and academic research community of various disciplines to understand the issues and to find solutions for combating the problems from the aspects of social and technological, legislative and law enforcement, and business and management. The report provides an excellent starting point for government agencies, private businesses, and consumers in combating identity theft It is useful for public policy formulation. While aforementioned US government strategic plan and recommendations suggested in various studies are useful in dealing with public policies, understanding the nature of identity theft, and finding solutions in combating identity theft, they are limited in the sense of covering the scope of the issues. The purpose of this paper is to demonstrate how the Zachman framework can be applied to the conceptual model by Wang et al [10] to provide a comprehensive and complete view of the identity theft problem

Identity Theft Conceptual Framework
Schedule
Zachman’s System Framework
A Framework for Identity Theft Issue
Identity Owner
Identity Issuer
Identity Checker
Identity Protector
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call