Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research
Identity Change, Identity Fraud and Identity Theft from a sociological point of view
The definition of "identity fraud" is often primarily attributed to the existence of damaging motives or actions of an "identity fraudster". The disadvantage of this definition is that, on the basis of the persons’ actions, the motive can be concluded or assumed only indirectly. In this chapter we extend the scope of analysis and introduce a categorisation of types of "identity fraud" on the basis of an operative approach that connects the various types of "identity fraud" with socially observable facts (within processes) of addressability, expectation concepts and authentication procedures. This enables a perspective for
inspecting the types of adequate addressing (e.g. if it is directed personally or by use of the broadcasting method),
understanding the reasonableness of certain expectation concepts for typical, socially different situations with regard to their functionality, scope, and purpose, and
observing and evaluating the different authentication procedures and their risks in different types of social systems.
This approach not only allows us to define the various types of identity fraud, it also enables us to provide a more detailed description of possible counter measures than the approach that relies on people’s motives. The construction of different methods of address creation, creation of expectation, and authentication procedures of the different types of social systems can be used as the starting point for the development of counter measures.
Denis Royer | 16 / 44 |