2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) 2007
DOI: 10.1109/hicss.2007.172
|View full text |Cite
|
Sign up to set email alerts
|

Development of a Conceptual Framework for Managing Identity Fraud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(21 citation statements)
references
References 3 publications
0
21
0
Order By: Relevance
“…These studies have presented fraud management concept in the form of frameworks. These include; fraud management lifecycle framework by Wilhelm (2004), identity fraud enterprise management framework by Jamieson, et al (2007), Action-event identity theft management framework by Kumar et al (2007) and role-based framework by Shah and Okeke (2011).…”
Section: Understanding Identity Fraud Management Processmentioning
confidence: 99%
“…These studies have presented fraud management concept in the form of frameworks. These include; fraud management lifecycle framework by Wilhelm (2004), identity fraud enterprise management framework by Jamieson, et al (2007), Action-event identity theft management framework by Kumar et al (2007) and role-based framework by Shah and Okeke (2011).…”
Section: Understanding Identity Fraud Management Processmentioning
confidence: 99%
“…For practitioners, this highlights the need to educate consumers in the necessity of employing all forms of identity theft protection. This research also fills, although without great effect, a 'hole' in models between the 'macro' models that explain the overall functioning of identity thef t and fraud ( Eisenstein 2008, Jamieson, Winchester andSmith 2007) and 'micro' models that concentrate on specific aspects of identity thef t such as personal information disclosure (Norberg, Home and Home 2007), the effects of privacy seals (Rifon LaRose and Choi 2005), and consumer behaviour in on-line environments (Milne, Labrecque andCromer 2009, Milne, Rohm andBahl 2004) The limitations are that the population studied is within a Canadian context and that the sample was obtained through an Internet panel survey. The study is therefore subject to the biases that this context might entail.…”
Section: Resultsmentioning
confidence: 82%
“…Eisenstein (2008) constructed a model using parameters derived from surveys which accurately predicts the level of identity fraud but only for 'new account' fraud. Jamieson, Winchester and Smith (2007) proposed a model of enterprise fraud management. In addition to these 'macro' models, there are some 'micro' models that address specific aspects of consumer behaviour concerning identity theft such as personal information disclosure (Norberg, Home and Home 2007), the effects of privacy seals (Rifon LaRose and Choi 2005), and behaviour in the on-line environment (Milne, Labrecque andCromer 2009, Milne, Rohm andBahl 2004).…”
Section: Introductionmentioning
confidence: 99%
“…The frameworks discussed above are summarised in the framework. The Furlan and Bajec (2008), Jamieson et al (2007) and Wilhelm (2004) frameworks share the most similarities. However, some differences exist.…”
Section: Framework Comparisonsmentioning
confidence: 99%