You are here: Resources > FIDIS Deliverables > Forensic Implications > D5.3: A Multidisciplinary Article on Identity-related Crime > 
Conclusion: addressing identity-related crime  Title:
REFERENCES
 

 

References

Baecker, D. (1999), Organisation als System, Suhrkamp, Frankfurt am Main.

Cabinet Office, Identity Fraud: a study, July 2002, http://www.identitycards.gov.uk/downloads/id_fraud-report.pdf 

European Commission (2004), A New EU Action Plan 2004-2007 to Prevent Fraud on Non-cash Means of Payment, COM (2004) 679 final, Brussels, 20.10.2004. 

Geradts, Z. & Sommer, P. (eds.) (2006), Forensic Implications of Identity Management Systems, January 2006, FIDIS deliverable D6.1, available via http://www.fidis.net.

Gill, M. et al. (2006), The Fight Against Identity Fraud: A Brief Study of the EU, the UK, France, Germany, and the Netherlands, Perpetuity Research & Consultancy International Ltd.

Grijpink, J.H.A.M. (2006), ‘Identiteitsfraude en overheid’, Justitiële verkenningen, vol. 32, no. 7, pp. 37-57.

Hildebrandt, M. (2007), ‘Profiling and the Identity of the European citizen’, in: M. Hildebrandt & S. Gutwirth (eds.), Profiling the European Citizen. Cross-disciplinary perspectives, Springer 2007, Chapter 15 (to appear).

Koops, B.J. (2005), FIDIS Deliverable D5.1: A survey on legislation on ID theft in the EU and a number of other countries, [online] Available at http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp5-del5.1.law_survey.pdf.

Koops, B.J. & Leenes, R.E. (2006), ‘ID Theft, ID Fraud and/or ID-related Crime. Definitions Matter’, Datenschutz und Datensicherheit, vol. 30, no. 9, pp. 553-556.

Leenes, R. (ed.) (2006), FIDIS Deliverable D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research, [online] Available at http://www.fidis.net/487.0.html.

Levy, E. (2004), Criminals become Tech Savvy, IEEE Security and Privacy, 02(2):65-68.

LSE (2005), The Identity Project: an assessment of the UK Identity Cards Bill and its Implications. Version 1.09, LSE, London, [online] available at http://is2.lse.ac.uk/idcard/identityreport.pdf.

Luhmann, N. (2000), Organisation und Entscheidung, 1st Edition, Westdeutscher Verlag, Opladen/Wiesbaden.

Mitchison, N. et al. (2004), Identity Theft: A Discussion Paper, European Commission Joint Research Center, March 2004, [online] Available at https://www.prime-project.eu/community/furtherreading/studies/IDTheftFIN.pdf.

Privacy Rights Clearinghouse (PRC) (2002), Factsheet 17(g). Criminal Identity Theft (revised May 2002), [online] Available at http://www.privacyrights.org/fs/fs17g-CrimIdTheft.htm.

Schneier, B. (1996), Applied Cryptography, 2nd Edition, John Wiley & Sons, New York.

Schreurs, W, Hildebrandt, M, Gasson, M., Warwick, M. (eds) (2006), Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, FIDIS D7.3.  

Solove, D. J. (2003), Identity Theft, Privacy, and the Architecture of Vulnerability, Hastings Law Journal, Vol. 54, p. 1227-1273.

Sproule, S. & Archer, N. (2006), Defining Identity Theft – A Discussion Paper, 6 April 2006, available via http://www.business.mcmaster.ca/IDTDefinition/lit&links.htm.

Van der Meulen, N. (2006), The Challenge of Countering Identity Theft: Recent Developments in the United States, the United Kingdom, and the European Union, Tilburg, 6 September 2006, [online] Available at http://www.tilburguniversity.nl/intervict/publications/NicolevanderMeulen.pdf.

Van der Putte, T. & Keuning, J. (2000), Biometrical Fingerprint Recognition: Don’t Get Your Fingers Burned, in 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), eds. J. Domingo-Ferrer and D. Chan and A. Watson, Kluwer Academic Publishers, Boston, etc., pp. 289-303.

Appendix. Figure 4 

 

Identity-specific 

Identity-neutral 

Identity-related Crime 

Criminal – general 

Criminal – specific 

Civil 

Administrative 

Adminis­trative  

crime 

 

Figure 4. Legal Categorisation of Identity-related Crime

The grey areas denote activities that are often more related to stage 1: identity establishment; the white areas are often more related to stage 2: unlawful use of identity. 

 

Conclusion: addressing identity-related crime  fidis-wp5-del5.3-identity_related_crime_def_01.sxw  
12 / 12