Academia.eduAcademia.edu

A contextual framework for combating identity theft

2000, IEEE Security & Privacy Magazine

Abstract

WenJie Wang is a postdoctoral fellow at the DeGroote School of Business, McMaster University, and an associate professor at Donghua University in China. Her research interests include identity theft, identity management, risk management, and security and privacy. Wang has a PhD in control theory and control engineering from China Textile University. Contact her at [email protected]. Yufei Yuan holds the Wayne C. Fox Chair in Business Innovation and is a professor of information systems at the DeGroote School of Business, McMaster University, Canada. His research interests include identity theft, mobile commerce, security and privacy, and Web-based negotiation support systems. Yuan has a PhD in computer information systems from the University of Michigan. Contact him at [email protected]. Norm Archer is a Professor Emeritus in the Management Science and Information Systems Area at the DeGroote School of Business, McMaster University, and a special advisor to the McMaster eBusiness Center. His research interests are in topics that relate to e-business, including identity theft, business-tobusiness implementations, wireless e-health, knowledge management, and the human-computer interface. Contact him at [email protected].

Key takeaways

  • In this article, we define identity as both the identity certificate and the information that can uniquely identify the owner; as such, they're the main targets of most identity theft.
  • The framework can help multiple parties understand the identity theft problem and develop better identity security solutions.
  • An identity owner is an individual who is the subject of his or her identity and who has the legal right to own and use it.
  • Database security technologies can also prevent identity information theft, and PKI technologies can protect digital certificates and identity information in online transactions.
  • It's important for identity security managers to study how to apply risk management in the context of combating identity theft, considering such aspects as identity theft risk assessment and security policy development and implementation.