메뉴 건너뛰기




Volumn 1, Issue 2, 2005, Pages 17-36

Identity Theft and E-Fraud as Critical CRM Concerns

Author keywords

CRM; e commerce; e fraud; e security; empirical studies; identity theft; knowledge workers; models

Indexed keywords


EID: 85001817345     PISSN: 15481115     EISSN: 15481123     Source Type: Journal    
DOI: 10.4018/jeis.2005040102     Document Type: Article
Times cited : (54)

References (25)
  • 3
    • 84900133919 scopus 로고    scopus 로고
    • Retrieved from http://www.bbbonline. org/privacy/answer.asp#2
    • BBBOnLine. (2004). Seal programs. Retrieved from http://www.bbbonline. org/privacy/answer.asp#2
    • (2004) Seal programs
  • 4
    • 85001656472 scopus 로고    scopus 로고
    • ComputerWorld, (July 16) Retrieved from http://www.computerworld.com/printthis/2003/0,4814,82911,00.html
    • Drake, J. (2003). How to take the offense on identity theft. ComputerWorld, (July 16). Retrieved from http://www.computerworld.com/printthis/2003/0,4814,82911,00.html
    • (2003) How to take the offense on identity theft
    • Drake, J.1
  • 5
    • 84900175334 scopus 로고    scopus 로고
    • Retrieved from https://www.econsumer.equifax.com/consumer/ forward.ehtml?forward=default
    • Equifax. (2004). Equifax personal solutions. Retrieved from https://www.econsumer.equifax.com/consumer/ forward.ehtml?forward=default
    • (2004) Equifax personal solutions
  • 6
    • 0031225351 scopus 로고    scopus 로고
    • Strategy and the new economics of information
    • September/October
    • Evans, P. & Wurster, T. (1997). Strategy and the new economics of information. Harvard Business Review, (September/October), 71–82.
    • (1997) Harvard Business Review , pp. 71-82
    • Evans, P.1    Wurster, T.2
  • 7
    • 84900224830 scopus 로고    scopus 로고
    • Retrieved from http://www. e x p e r i a n. c o m / i d e n t i t y _ f r a u d / fraud_prevention.html
    • Experian. (2004). Experian personal services. Retrieved from http://www. e x p e r i a n. c o m / i d e n t i t y _ f r a u d / fraud_prevention.html
    • (2004) Experian personal services
  • 8
    • 84900123881 scopus 로고    scopus 로고
    • Identity theft losses expected to hit $2 trillion by 2005
    • (May 22) Retrieved from http://itmanagement.earthWeb. com/secu/print.php/2211101
    • Gaudin, S. (2003). Identity theft losses expected to hit $2 trillion by 2005. IT Management: Security, (May 22). Retrieved from http://itmanagement.earthWeb. com/secu/print.php/2211101
    • (2003) IT Management: Security
    • Gaudin, S.1
  • 10
    • 0344219790 scopus 로고    scopus 로고
    • An examination of privacy policies in Fortune 500 Web sites
    • Liu, C. & Arnett, K. (2002). An examination of privacy policies in Fortune 500 Web sites. Mid-American Journal of Business, 17, 13–21.
    • (2002) Mid-American Journal of Business , vol.17 , pp. 13-21
    • Liu, C.1    Arnett, K.2
  • 11
    • 0346406657 scopus 로고    scopus 로고
    • Human identification theory and the identity theft problem
    • LoPucki, L. (2001). Human identification theory and the identity theft problem. Texas Law Review, 80, 89–135.
    • (2001) Texas Law Review , vol.80 , pp. 89-135
    • LoPucki, L.1
  • 12
    • 0346338316 scopus 로고    scopus 로고
    • How well do consumers protect themselves from identity theft?
    • Milne, G. (2003). How well do consumers protect themselves from identity theft? The Journal of Consumer Affairs, 37, 388–405.
    • (2003) The Journal of Consumer Affairs , vol.37 , pp. 388-405
    • Milne, G.1
  • 13
    • 85001656466 scopus 로고    scopus 로고
    • Identity theft: What can you do to protect your clients?
    • Oehlers, P. (2004). Identity theft: What can you do to protect your clients? Journal of Financial Service Professionals, 58, 20–23.
    • (2004) Journal of Financial Service Professionals , vol.58 , pp. 20-23
    • Oehlers, P.1
  • 14
    • 84900085483 scopus 로고    scopus 로고
    • The newest identity thieves: Parents
    • (April 7) Retrieved from http://moneycentral.msn.com/content/Banking/FnancialPrivacy/P77623.asp
    • Pulliam-Weston, L. (2004). The newest identity thieves: Parents. MSN Money, (April 7). Retrieved from http://moneycentral.msn.com/content/Banking/FnancialPrivacy/P77623.asp
    • (2004) MSN Money
    • Pulliam-Weston, L.1
  • 16
    • 84900138975 scopus 로고    scopus 로고
    • New frontiers in the identity theft war
    • (June 20) Retrieved from http://www.crmbuyer. com/perl/story/21718.html
    • Ray, T. (2003). New frontiers in the identity theft war. CRM Buyer, (June 20). Retrieved from http://www.crmbuyer. com/perl/story/21718.html
    • (2003) CRM Buyer
    • Ray, T.1
  • 17
    • 0347083998 scopus 로고    scopus 로고
    • Counteracting identity fraud in the Information Age: The Identity Theft and Assumption Deterrence Act
    • Saunders, K. & Zucker, B. (1999). Counteracting identity fraud in the Information Age: The Identity Theft and Assumption Deterrence Act. International Review of Law, Computers and Technology, 13, 183–192.
    • (1999) International Review of Law, Computers and Technology , vol.13 , pp. 183-192
    • Saunders, K.1    Zucker, B.2
  • 18
    • 0348089527 scopus 로고    scopus 로고
    • Loyalty and e-marketing issues: Customer retention on the Web
    • Smith, A.D. (2002). Loyalty and e-marketing issues: Customer retention on the Web. Quarterly Journal of Electronic Commerce, 3, 141–161.
    • (2002) Quarterly Journal of Electronic Commerce , vol.3 , pp. 141-161
    • Smith, A.D.1
  • 19
    • 0036063961 scopus 로고    scopus 로고
    • Information management of automated data capture: An overview of technical developments
    • Smith, A.D. & Offodile, F. (2002). Information management of automated data capture: An overview of technical developments. Information Management and Computer Security, 10(3), 109–118.
    • (2002) Information Management and Computer Security , vol.10 , Issue.3 , pp. 109-118
    • Smith, A.D.1    Offodile, F.2
  • 20
    • 0036063532 scopus 로고    scopus 로고
    • Application service providers (ASP): Moving downstream to enhance competitive advantage
    • Smith, A.D. & Rupp, W.T. (2002a). Application service providers (ASP): Moving downstream to enhance competitive advantage. Information Management and Computer Security, 10(2), 64–72.
    • (2002) Information Management and Computer Security , vol.10 , Issue.2 , pp. 64-72
    • Smith, A.D.1    Rupp, W.T.2
  • 21
    • 0036036094 scopus 로고    scopus 로고
    • Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers
    • Smith, A.D. & Rupp, W.T. (2002b). Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers. Information Management and Computer Security, 10(4), 178–183.
    • (2002) Information Management and Computer Security , vol.10 , Issue.4 , pp. 178-183
    • Smith, A.D.1    Rupp, W.T.2
  • 22
    • 54249130859 scopus 로고    scopus 로고
    • The science of biometric identification
    • Smith, C. (2003). The science of biometric identification. Australian Science Teachers Journals, 49, 34–39.
    • (2003) Australian Science Teachers Journals , vol.49 , pp. 34-39
    • Smith, C.1
  • 23
    • 84900059076 scopus 로고    scopus 로고
    • Retrieved from http:// www. t r a n s u n i o n. c o m / c o n t e n t /page.jsp?id=/personalsolutions/general/data/FraudInformation.xml
    • TransUnion. (2004). TransUnion personal solutions. Retrieved from http:// www. t r a n s u n i o n. c o m / c o n t e n t /page.jsp?id=/personalsolutions/general/data/FraudInformation.xml
    • (2004) TransUnion personal solutions
  • 24
    • 84900232561 scopus 로고    scopus 로고
    • Retrieved from http://www.usa.visa.com/business/merchants/cisp_index.html
    • VisaUSA. (2004). Cardholder information security program. Retrieved from http://www.usa.visa.com/business/merchants/cisp_index.html
    • (2004) Cardholder information security program
  • 25
    • 85001607017 scopus 로고    scopus 로고
    • Protect your privacy: 10 simple steps
    • Retrieved from http://moneycentral.msn.com/content/Banking/FinancialPrivacy/P33715.asp
    • Wuorio, J. (2004). Protect your privacy: 10 simple steps. MSN Money. Retrieved from http://moneycentral.msn.com/content/Banking/FinancialPrivacy/P33715.asp
    • (2004) MSN Money
    • Wuorio, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.