Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research
Introduction
This document presents the results of a WP5/WP8 workshop on ID theft and ID fraud held on 18 May 2005 in Tilburg, the Netherlands. For this workshop three papers were written from different perspectives on ID theft and ID fraud: socio-economic, legal, and technical. The present document provides an integration and consolidation of these three papers. The workshop and this document show that our understanding of ID theft and ID fraud in the ‘online world’ is still limited. For instance, while common parlance denotes the topic of this work to be ID theft, this term is imprecise from a legal perspective as the ID is not stolen – like one can steal a car – but copied. The original identity bearer does not lose her identity by the act of ‘ID theft’. This suggests that we need to refine our concepts and define a proper ontology of the relevant phenomena. This document is more limited in scope, though. It aims to offer a first analysis of the components, from a legal, social and technical perspective, that together comprise ‘ID-related crimes’ as we will denote the range of misuses of ID numbers and other data. The next chapters will provide classifications of phenomena and methods based on applying the different perspectives.
The authors are aware that further development and integration should take place in order to advance our understanding of this relatively new, and rapidly growing, set of phenomena associated with the rise of the information society.
The present chapter provides a first sketch of ID-related crimes and provides some examples of ID crimes and the legal responses to these crimes. It also discusses the two common forms of these crimes from a more technical point of view: phishing and sniffing.
Denis Royer | 3 / 44 |