期刊文献+

美国身份盗用的有关情况及监管措施研究

The Research on US Identity Theft and Supervision Policy
下载PDF
导出
摘要 近年来,身份盗用(未经授权使用他人身份识别信息的未遂或确认欺诈)事件在美国增长非常迅速,美国政府对此非常重视,连续出台了多项法律法规及监管措施,形成了较为完善的监管框架。研究和借鉴美国相关经验对我国应对类似问题具有重要的现实意义。 In recent years, the events of identity theft (attempted or confirmed fraud caused by unauthorized use oflD information of others) are growing very fast in the United States. The US government has attached great importance to this issue and continuously issued a number of laws and regulations which form a relatively perfect regulatory framework. Studying and drawing lessons from US is of great practical significance for China to deal with the similar problems.
作者 占云生
出处 《西部金融》 2016年第2期30-32,共3页 West China Finance
关键词 金融消费者保护 身份盗用 financial consumer protection identity theft
  • 相关文献

参考文献8

  • 1IAmerican Bankers Association (ABA). 2002. ABA Deposit Account Fraud Survey Report.
  • 2Anti-Phishing Working Group. 2004. Phishing Attack Trends Report (June).
  • 3Chamberlain, Chuck. 2004. Identity Protection. United States Postal Service.
  • 4Chipman, Andrea. 2004. Technology (A Special Report). Stealing You: The Latest on Identity Theft: How They Do It-and How You can Protect Yourself. Wall Street Journal (Eastern Edition), April 26, p. R8.
  • 5陈立峰.浅议身份盗用犯罪问题[J].江西公安专科学校学报,2005(6):63-66. 被引量:4
  • 6杨欣欣.美国如何打击身份盗窃犯罪[J].吉林公安高等专科学校学报,2010,25(5):84-87. 被引量:2
  • 7闵庆飞,季绍波,仲秋雁.身份盗用的发展及其治理和研究趋势[J].公共管理学报,2007,4(1):49-55. 被引量:10
  • 8They Do It-and How You can Protect Yourself. Wall Street Journal (Eastern Edition), April 26, p. R8.

二级参考文献20

  • 1[1]ACPR.Standardization of Definitions of Identity Crime TermsDiscussion Paper[R/OL].[2005-10-12].http://www.acpr.gov.au/pdf/Standdefinit.pdf.
  • 2[2]SPROULE S,ARCHER N.Defining Identity Theft-A Discussion Paper[R].[s.l.]:[s.n.],2006.
  • 3[3]GERARD G J,HILLISON W,PACINI C.Identity Theft:The US Legal Environment and Organizations' Related Responsibil ities[J].Journal of Finance Crime,2004,12(1):33-43.
  • 4[4]MERCURI R T.Scoping Identity Theft[J].Communications of the ACM,2006,49(5):17-21.
  • 5[5]HAN R.Identity Theft Management:An Integrated Perspective[D].Carleton:Carleton University,2005.
  • 6[6]CLARKE R.Human Identification in Information Systems:Management Challenges and Public Policy Issues[J].Information Technology & People,1994,7(4):6-37.
  • 7[7]LOPUCKI L M.Human Identification Theory and Identity Theft Problem[J].Texas Law Review,2001,80(1):89-136.
  • 8[8]WILLOX N A,REGAN T.Identity Fraud:Providing a Solution[J].Journal of Economic Crime Management,2002,1(1):2-17.
  • 9[9]U.S.Government.Committee on WaysandMeans:Identity Theft Facts and Figures[R/OL].[2004-12-18].http://waysandmeans.house.gov/media/pdf/ss/factsfigures.pdf.
  • 10[10]LAWSON P,LAWFORD J.Identity Theft:The Need for Consumer Protection[R].Ottawa,Canada:The Public Interest Advocacy Center Working Paper,2003.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部