69
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Customer Information: Protecting the Organization’s Most Critical Asset from Misappropriation and Identity Theft

&
Pages 3-15 | Published online: 10 Sep 2014

References

  • Angwin, J. & Bank, D. (2005, May 3), Time Warner Alerts Staff to Lost Data, The Wall Street Journal - Eastern Edition, pp. A3, 8.
  • Bank, D. (2005, April 15), Retailers Rush to Secure Data against Theft, The Wall Street Journal - Eastern Edition, pp. B1, 3.
  • Bank, D. & Conkey, C. (2005, March 24), New Safeguards for Your Privacy, The Wall Street Journal - Eastern Edition, pp. D1, 2.
  • Conkey, C. (2005, March 16), Congress Mulls Remedies for Identity Theft, The Wall Street Journal - Eastern Edition, p. A4.
  • Costello, J. (1991), Security on Computer Networks, Proceedings of the 19th ACM SIGUCCS Conference on user services, Seattle, WA.
  • Chu, K. (2005, March 24), Banks and Online Retailers Lose Customers To The Fear Of ID Theft, The Wall Street Journal - Eastern Edition, p. D2.
  • Dash, E. (2006, January 24). Ameriprise says stolen laptop had data on 230,000 people, The New York Times, p C5.
  • Delaney, K. (2005, March 29), Identity Theft Made Easier, The Wall Street Journal - Eastern Edition, pp. B1, 4.
  • El-Rashidi, Y. (2005, March 10), LexisNexis Owner Reports Breach of Customer Data, The Wall Street Journal - Eastern Edition, pp. A3, 12.
  • Ferris, J.M. (1994), Using Standards as a Security Policy Tool, StandardView, 2 (2), pp. 72–77.
  • Foust, D. (2005, March 28), Keeping a Grip on Identity, Business Week (3826), pp. 34–35
  • Hall, J. & Singleton, M. (2005), Information Technology Auditing and Assurance (2nd Edition). (Ohio: Thomson Southwestern)
  • Jajodia, S. (1996), Database Security and Privacy, ACM computing surveys, 28 (1), pp. 129–131.
  • Lim, P. (2005), Gimme Your Name and SSN, US News and World Report, 138 (8), pp. 46–47.
  • Maremont, M. (2005, March 23), New Privacy Leak: Some Mutual Funds Reveal Clients’ Data, The Wall Street Journal - Eastern Edition, pp. A1, 6.
  • Marbaix, J. (2004), Lessons in Privacy, US News and World Report, 137 (7), pp. 74–75.
  • Mollenkamp, C., Bryan-Law, C. & Sidel, R. (2005, April 20), How European Banks Keep a Tighter Lid on Online Data, The Wall Street Journal - Eastern Edition, pp. B1–2
  • Nemati, H.R. & Barka, C.D. (2001), Issues in Organizational Data Mining: A Survey of Current Practices, Journal of data warehousing, 6 (1), pp. 25–26.
  • Pacelle, M. (2005, June 7), UPS Loses Citigroup Customer Data, The Wall Street Journal - Eastern Edition, pp. A3, 1.
  • Pringle, D. & Zimmerman, R (2005, April 13), Lexis/Nexis Reveals Further Breaches of Personal Data, The Wall Street Journal - Eastern Edition, pp. A3, 15.
  • Rivlin, G. (2005, March 17), Purloined Lives: Identity Theft is Increasing Bringing a Lifetime of Worry for Many, The New York Times, pp. C1, 8.
  • Saporito, B., Fulton, G. & Thompson, M. (2005, March 7), Are your secrets safe? Time 165 (10), 46–47.
  • Sears, S. (1999, If You Build It, They May Use It Appropriately: Protecting Private Data in a Warehouse Environment, Journal of data warehousing, 4 (1), pp. 19–26.
  • Sidel, R. & Conkey, C. (2005, April 14), Security Breach Hits Credit Cards, The Wall Street Journal - Eastern Edition, pp. D1–2.
  • Solove, D. (2004), Information-Age Privacy Concerns Are More Kafkaesque Than Orwellian, The Chronicle of Higher Education, 51 (16), pp. B6–B8.
  • Tinseth, A. & Richlin, D. (2005), SB 1386: One Year Later, Information Systems Security, 13 (6), pp. 43–50
  • Yuan, L. (2005, June 1), Companies Face Data Breaches from the Inside, Too, The Wall Street Journal - Eastern Edition, pp. B1, 4.
  • Zeller Jr., T. (2005a, March 3), Another Data Broker Reports a Breach, The New York Times, pp. C1–C2
  • Zeller Jr., T. (2005b, April 4), Some Colleges Falling Short in Data Security, The New York Times, pp. C1, 4

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.