Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research
Table Of Content
- Executive Summary
- Introduction
- ID-related crime: a preliminary definition
- eCommerce related ID crime: when business opportunities go awry
- Techniques and practices: the tools of the trade
- phishing
- sniffing
- Legal Aspects
- ID fraud from a legal point of view
- Some cases and legal responses
- Conclusion
- Social and Economic Aspects
- Introduction
- Identity Change, Identity Fraud and Identity Theft from a sociological point of view
- Establishing persons as entities in social systems
- General properties with respect to rearrangement of identity linkage
- Towards a typology of rearrangements of identity linkage
- Identity collision – definition and types
- Identity change – definition and types
- Identity deletion
- Identity restoration
- “Identity Fraud”
- “Identity fraud” in social systems
- General theses on the appearance of “identity fraud”
- The transition from identity collision to
- identity fraud
- Incidence of Identity Theft and Identity Fraud in Society
- Corporate Identity Theft and Fraud
- Social and Economic Aspects
- Social Aspects
- Economic Aspects
- Conclusion
- Technical Aspects
- Introduction
- Authentication of a person by an IT system
- Authentication of an IT System by a Person
- Methods to manipulate Authentication Procedures
- Two scenarios for identity fraud with biometrics
- Countermeasures
- Social and technical guidelines on preventing ID-related crimes
- Socio-economic guidelines
- Authentication technologies
- Conclusion
- Conclusions and further work
- References
- Annex