ID Theft , ID Fraud and / or ID - related Crime . Definitions matter

نویسنده

  • Ronald Leenes
چکیده

Identity theft is often perceived as one of the major upcoming threats in crime. However, there is no commonly accepted definition of ‘identity theft’ or ‘identity fraud’, and it is impossible to study the real threat of this phenomenon without conceptual clarity. In this article, we attempt to provide a starting point for policy and research by proposing some definitions. We indicate that what is usually called ‘identity theft’ (defined as fraud or another unlawful activity where the identity of an existing person is used as a target or principal tool without that person’s consent) is part of the larger issue of ‘identity fraud’. This, in turn, is a subset of the umbrella term ‘identity-related crime’, which we define as all punishable activities that have identity as a target or a principal tool. We argue that it is relevant to look at this broader picture, since not only identity ‘theft’, but also consensual yet unlawful identity changes as well as unlawful identity deletion should receive the attention of policy-makers and legislatures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity Theft

On February 7, 2005, the Federal Trade Commission reported that at least 10 million Americans are affected by identity (ID) theft each year[7]. The US Department of Justice defines identity theft as ”all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain[17].” ID thieves target any ...

متن کامل

New Form of Identity (ID) Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers

Using sophisticated means, Identity (ID) Thieves can acquire victims’ personal information for their own deeds from online news providers. This paper discusses how ID Thieves may compile their stock of trade from Directory Harvest Attacks (DHAs) and launch the attacks against online news providers with two possible attack methodologies. This follows by an evaluation of the inadequacy of the cur...

متن کامل

Heart Biometrics: Theory, Methods and Applications

Automatic and accurate identity validation is becoming increasingly critical in several aspects of our every day lives such as in financial transactions, access control, traveling, healthcare and other. Traditional strategies to automatic identity recognition include items such as PIN numbers, tokens, passwords and ID cards. Despite the wide deployment of such tactics, the authenticating means ...

متن کامل

Location-based security for ID document and ID card enrollment stations

Much of today’s security for financial assets, services, facilities, personal information, immigration, employment and travel is provided in the form of a variety of ID instruments such as passports, credit cards, ID badges, access cards, and other similar forms of identification. Staggering costs associated with rampant identity theft are driving ongoing efforts to produce stronger, positive-I...

متن کامل

A New Dynamic ID-based User Authentication Scheme to Resist Smart-Card-Theft Attack

Password-based remote authentication schemes provide users with convenient and secure mechanisms to access resources through networks. Such schemes can be further divided into static ID and dynamic ID schemes. The main drawback of the static ID scheme is that an adversary can intercept the fixed login ID and masquerade as a legal user to log into the system. On the other hand, dynamic ID scheme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007