Identification in electronic networks: characteristics of e-identifiers

  • Authors:
  • Kayvan M. Lavassani;Bahar Movahedi;Vinod Kumar

  • Affiliations:
  • Carleton University, Ottawa, Ontario, Canada;Carleton University, Ottawa, Ontario, Canada;Carleton University, Ottawa, Ontario, Canada

  • Venue:
  • ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Identification in electronic networks (e-Identification) has been a source of new risks in e-commerce and e-government [3, 22]. Identity theft is the fastest growing white-collar crime in many countries, specifically in developed countries. The identity theft (IDT) report presented by Competition Bureau Canada indicates that the cost of IDT to the economy of Canada has increased by 83% in the period of 2002-2003. Also, the average loss of victims has increased from 1439Cnd$ in 2002, to 1614Cnd$ in 2003. This increase can also be observed in other developed countries at the same level. This rapid increase of identity theft indicates that the development of optimal identification systems in organizations is far behind the development of electronic networks. One of the central issues in IDT is the identification process. Understanding the identification processes in electronic systems, its concepts, and tools are the fundamentals of designing, implementing and operating an efficient and effective identification system. However, there have been very few studies in this area, and there is a gap in literature specifically on identification tools, their characteristics, their efficiency and their effectiveness, and their usability. This paper presents a comprehensive model representing virtually all of the commonly used identifiers in electronic networks and their characteristics, and also presents measures of efficiency and effectiveness of identification tools in electronic networks.1