3[3]GERARD G J,HILLISON W,PACINI C.Identity Theft:The US Legal Environment and Organizations' Related Responsibil ities[J].Journal of Finance Crime,2004,12(1):33-43.
4[4]MERCURI R T.Scoping Identity Theft[J].Communications of the ACM,2006,49(5):17-21.
6[6]CLARKE R.Human Identification in Information Systems:Management Challenges and Public Policy Issues[J].Information Technology & People,1994,7(4):6-37.
7[7]LOPUCKI L M.Human Identification Theory and Identity Theft Problem[J].Texas Law Review,2001,80(1):89-136.
8[8]WILLOX N A,REGAN T.Identity Fraud:Providing a Solution[J].Journal of Economic Crime Management,2002,1(1):2-17.
9[9]U.S.Government.Committee on WaysandMeans:Identity Theft Facts and Figures[R/OL].[2004-12-18].http://waysandmeans.house.gov/media/pdf/ss/factsfigures.pdf.
10[10]LAWSON P,LAWFORD J.Identity Theft:The Need for Consumer Protection[R].Ottawa,Canada:The Public Interest Advocacy Center Working Paper,2003.