You are here: Resources > FIDIS Deliverables > Forensic Implications > D5.3: A Multidisciplinary Article on Identity-related Crime > 
Conclusion: addressing identity-related crime  Title:



Baecker, D. (1999), Organisation als System, Suhrkamp, Frankfurt am Main.

Cabinet Office, Identity Fraud: a study, July 2002, 

European Commission (2004), A New EU Action Plan 2004-2007 to Prevent Fraud on Non-cash Means of Payment, COM (2004) 679 final, Brussels, 20.10.2004. 

Geradts, Z. & Sommer, P. (eds.) (2006), Forensic Implications of Identity Management Systems, January 2006, FIDIS deliverable D6.1, available via

Gill, M. et al. (2006), The Fight Against Identity Fraud: A Brief Study of the EU, the UK, France, Germany, and the Netherlands, Perpetuity Research & Consultancy International Ltd.

Grijpink, J.H.A.M. (2006), ‘Identiteitsfraude en overheid’, Justitiële verkenningen, vol. 32, no. 7, pp. 37-57.

Hildebrandt, M. (2007), ‘Profiling and the Identity of the European citizen’, in: M. Hildebrandt & S. Gutwirth (eds.), Profiling the European Citizen. Cross-disciplinary perspectives, Springer 2007, Chapter 15 (to appear).

Koops, B.J. (2005), FIDIS Deliverable D5.1: A survey on legislation on ID theft in the EU and a number of other countries, [online] Available at

Koops, B.J. & Leenes, R.E. (2006), ‘ID Theft, ID Fraud and/or ID-related Crime. Definitions Matter’, Datenschutz und Datensicherheit, vol. 30, no. 9, pp. 553-556.

Leenes, R. (ed.) (2006), FIDIS Deliverable D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research, [online] Available at

Levy, E. (2004), Criminals become Tech Savvy, IEEE Security and Privacy, 02(2):65-68.

LSE (2005), The Identity Project: an assessment of the UK Identity Cards Bill and its Implications. Version 1.09, LSE, London, [online] available at

Luhmann, N. (2000), Organisation und Entscheidung, 1st Edition, Westdeutscher Verlag, Opladen/Wiesbaden.

Mitchison, N. et al. (2004), Identity Theft: A Discussion Paper, European Commission Joint Research Center, March 2004, [online] Available at

Privacy Rights Clearinghouse (PRC) (2002), Factsheet 17(g). Criminal Identity Theft (revised May 2002), [online] Available at

Schneier, B. (1996), Applied Cryptography, 2nd Edition, John Wiley & Sons, New York.

Schreurs, W, Hildebrandt, M, Gasson, M., Warwick, M. (eds) (2006), Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, FIDIS D7.3.  

Solove, D. J. (2003), Identity Theft, Privacy, and the Architecture of Vulnerability, Hastings Law Journal, Vol. 54, p. 1227-1273.

Sproule, S. & Archer, N. (2006), Defining Identity Theft – A Discussion Paper, 6 April 2006, available via

Van der Meulen, N. (2006), The Challenge of Countering Identity Theft: Recent Developments in the United States, the United Kingdom, and the European Union, Tilburg, 6 September 2006, [online] Available at

Van der Putte, T. & Keuning, J. (2000), Biometrical Fingerprint Recognition: Don’t Get Your Fingers Burned, in 4th Int. IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), eds. J. Domingo-Ferrer and D. Chan and A. Watson, Kluwer Academic Publishers, Boston, etc., pp. 289-303.

Appendix. Figure 4 




Identity-related Crime 

Criminal – general 

Criminal – specific 






Figure 4. Legal Categorisation of Identity-related Crime

The grey areas denote activities that are often more related to stage 1: identity establishment; the white areas are often more related to stage 2: unlawful use of identity. 


Conclusion: addressing identity-related crime  fidis-wp5-del5.3-identity_related_crime_def_01.sxw  
12 / 12