Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
References
Baecker, D. (1999), Organisation als System, Suhrkamp, Frankfurt am Main.
Cabinet Office, Identity Fraud: a study, July 2002, http://www.identitycards.gov.uk/downloads/id_fraud-report.pdf
European Commission (2004), A New EU Action Plan 2004-2007 to Prevent Fraud on Non-cash Means of Payment, COM (2004) 679 final, Brussels, 20.10.2004.
Geradts, Z. & Sommer, P. (eds.) (2006), Forensic Implications of Identity Management Systems, January 2006, FIDIS deliverable D6.1, available via http://www.fidis.net.
Gill, M. et al. (2006), The Fight Against Identity Fraud: A Brief Study of the EU, the UK, France, Germany, and the Netherlands, Perpetuity Research & Consultancy International Ltd.
Grijpink, J.H.A.M. (2006), ‘Identiteitsfraude en overheid’, Justitiële verkenningen, vol. 32, no. 7, pp. 37-57.
Hildebrandt, M. (2007), ‘Profiling and the Identity of the European citizen’, in: M. Hildebrandt & S. Gutwirth (eds.), Profiling the European Citizen. Cross-disciplinary perspectives, Springer 2007, Chapter 15 (to appear).
Koops, B.J. (2005), FIDIS Deliverable D5.1: A survey on legislation on ID theft in the EU and a number of other countries, [online] Available at http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp5-del5.1.law_survey.pdf.
Koops, B.J. & Leenes, R.E. (2006), ‘ID Theft, ID Fraud and/or ID-related Crime. Definitions Matter’, Datenschutz und Datensicherheit, vol. 30, no. 9, pp. 553-556.
Leenes, R. (ed.) (2006), FIDIS Deliverable D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research, [online] Available at http://www.fidis.net/487.0.html.
Levy, E. (2004), Criminals become Tech Savvy, IEEE Security and Privacy, 02(2):65-68.
LSE (2005), The Identity Project: an assessment of the UK Identity Cards Bill and its Implications. Version 1.09, LSE, London, [online] available at http://is2.lse.ac.uk/idcard/identityreport.pdf.
Luhmann, N. (2000), Organisation und Entscheidung, 1st Edition, Westdeutscher Verlag, Opladen/Wiesbaden.
Mitchison, N. et al. (2004), Identity Theft: A Discussion Paper, European Commission Joint Research Center, March 2004, [online] Available at https://www.prime-project.eu/community/furtherreading/studies/IDTheftFIN.pdf.
Privacy Rights Clearinghouse (PRC) (2002), Factsheet 17(g). Criminal Identity Theft (revised May 2002), [online] Available at http://www.privacyrights.org/fs/fs17g-CrimIdTheft.htm.
Schneier, B. (1996), Applied Cryptography, 2nd Edition, John Wiley & Sons, New York.
Schreurs, W, Hildebrandt, M, Gasson, M., Warwick, M. (eds) (2006), Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, FIDIS D7.3.
Solove, D. J. (2003), Identity Theft, Privacy, and the Architecture of Vulnerability, Hastings Law Journal, Vol. 54, p. 1227-1273.
Sproule, S. & Archer, N. (2006), Defining Identity Theft – A Discussion Paper, 6 April 2006, available via http://www.business.mcmaster.ca/IDTDefinition/lit&links.htm.
Van der Meulen, N. (2006), The Challenge of Countering Identity Theft: Recent Developments in the United States, the United Kingdom, and the European Union, Tilburg, 6 September 2006, [online] Available at http://www.tilburguniversity.nl/intervict/publications/NicolevanderMeulen.pdf.
Van der Putte, T. & Keuning, J. (2000), Biometrical Fingerprint Recognition: Don’t Get Your Fingers Burned, in 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), eds. J. Domingo-Ferrer and D. Chan and A. Watson, Kluwer Academic Publishers, Boston, etc., pp. 289-303.
Appendix. Figure 4
Identity-specific | Identity-neutral | ||||
Identity-related Crime | Criminal – general | Criminal – specific | Civil | Administrative | |
Administrative | crime |
Figure 4. Legal Categorisation of Identity-related Crime
The grey areas denote activities that are often more related to stage 1: identity establishment; the white areas are often more related to stage 2: unlawful use of identity.
12 / 12 |