期刊文献+

身份盗用的发展及其治理和研究趋势 被引量:10

An Overview of Identity Theft-Governance and Research Trend
下载PDF
导出
摘要 身份盗用是指为了取得金钱、物品、服务等利益或者逃避义务和责任,盗窃他人身份证明信息以非法冒用他人身份的行为。根据西方发达国家的统计,身份盗用是近几年来发展最迅猛的犯罪活动,给个人、企业和社会都带来了巨大危害。中国作为一个经济迅猛发展、网民最多并渴望发展电子商务的国家,也日益面临着身份盗用的严重威胁。但我们对这一问题的认识还远远不够全面和深入。目的是要系统、全面的介绍身份盗用问题的内涵、发展,各国对身份盗用的治理实践以及学术界对这一问题的研究现状,以期为研究、预防和解决中国的身份盗用问题提供一定基础。为此,回顾了有关身份识别的理论;讨论了身份盗用的危害和影响范围、身份盗用的类型和过程;分析了身份盗用蔓延的原因以及身份盗用和身份欺诈的关系;并从政府治理、企业管理和消费者个人防护三个层面介绍了各国应对身份盗用的实践活动。最后讨论了对身份盗用问题的理论研究趋势和前景。作者希望引起学术同行们对身份盗用问题的重视,为深入研究中国的身份盗用问题起到抛砖引玉的作用。 Identity Theft, a perpetrator's intentionally obtaining other's identity information to personate him/her in order to pursue social and/or financial gain and to evade duties, has become one of the most severe and fastest growing problems around the world. Identity theft brings huge losses for individuals, businesses and society both financially and otherwise. As a booming country that wants to promote E-commerce, China is facing severe threat from Identity Theft. But most people do not have a good understanding of this emerging and urgent problem. This paper presents an overview of Identity Theft, focusing on giving a clue to study, prevent and solve this issue in China. In this paper, the authors discuss the related concepts, causes, scope, taxonomy, countermeasures and research trend of this issue in developed countries and furthermore explore the countermeasures from three perspectives, namely public governance, business management and individual protection, and some theory foundations on human identification. Finally, the research trend and prospect of this problem are also proposed. The authors hope this paper can arouse China's scholars to pay close attention to conducting in-depth research on Identity Theft problems.
出处 《公共管理学报》 2007年第1期49-55,共7页 Journal of Public Management
基金 国家自然科学基金资助项目(70602032)
关键词 身份盗用 身份识别理论 治理 研究趋势 Identity Theft Identification Theory Governance Research Trend
  • 相关文献

参考文献20

  • 1[1]ACPR.Standardization of Definitions of Identity Crime TermsDiscussion Paper[R/OL].[2005-10-12].http://www.acpr.gov.au/pdf/Standdefinit.pdf.
  • 2[2]SPROULE S,ARCHER N.Defining Identity Theft-A Discussion Paper[R].[s.l.]:[s.n.],2006.
  • 3[3]GERARD G J,HILLISON W,PACINI C.Identity Theft:The US Legal Environment and Organizations' Related Responsibil ities[J].Journal of Finance Crime,2004,12(1):33-43.
  • 4[4]MERCURI R T.Scoping Identity Theft[J].Communications of the ACM,2006,49(5):17-21.
  • 5[5]HAN R.Identity Theft Management:An Integrated Perspective[D].Carleton:Carleton University,2005.
  • 6[6]CLARKE R.Human Identification in Information Systems:Management Challenges and Public Policy Issues[J].Information Technology & People,1994,7(4):6-37.
  • 7[7]LOPUCKI L M.Human Identification Theory and Identity Theft Problem[J].Texas Law Review,2001,80(1):89-136.
  • 8[8]WILLOX N A,REGAN T.Identity Fraud:Providing a Solution[J].Journal of Economic Crime Management,2002,1(1):2-17.
  • 9[9]U.S.Government.Committee on WaysandMeans:Identity Theft Facts and Figures[R/OL].[2004-12-18].http://waysandmeans.house.gov/media/pdf/ss/factsfigures.pdf.
  • 10[10]LAWSON P,LAWFORD J.Identity Theft:The Need for Consumer Protection[R].Ottawa,Canada:The Public Interest Advocacy Center Working Paper,2003.

同被引文献37

引证文献10

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部