Identity crime: The challenges in the regulation of identity crime

This paper discusses the unique challenges of regulating identity crime. Identity crime involves the use of personal identification information to perpetrate crimes of fraud. As such, the identity crime involves using personal and private information to perpetrate crime. This article considers the two significant issues that obstruct responses to this crime; firstly, the reporting of crime. Secondly the paper considers the issue of jurisdiction. Finally, the paper explores some responses to this crime. The paper then explores some of the current responses to identity crime.

[1]  Elizabeth Towell,et al.  Investigating the future of Internet regulation , 1998, Internet Res..

[2]  Computer-related Crime in Asia: Emergent Issues , 2005 .

[3]  John Kane,et al.  Differentiating identity theft: An exploratory study of victims using a national victimization survey☆ , 2010 .

[4]  Jay Forder,et al.  Electronic Commerce and the Law , 2003 .

[5]  Steven J. Schwartz Wearables in 2048 , 2001, CACM.

[6]  Keith Jackson,et al.  Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .

[7]  Rodger Morrison Commentary: Multi-Factor Identification and Authentication , 2007, Inf. Syst. Manag..

[8]  K. Anderson Who are the Victims of Identity Theft? The Effect of Demographics , 2006 .

[9]  Jennifer Lynch Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing Attacks , 2005 .

[10]  Wim Vandenberghe,et al.  Electronic Theft: Unlawful Acquisition In Cyberspace , 2004, Int. J. Law Inf. Technol..

[11]  Jason Coppel A Hard Look at the Effects Doctrine of Jurisdiction in Public International Law , 1993, Leiden Journal of International Law.

[12]  Thomas M. Regan,et al.  IDENTITY FRAUD: PROVIDING A SOLUTION , 2002 .

[13]  Frank Stajano,et al.  Understanding scam victims , 2011, Commun. ACM.

[14]  K. M. Saunders,et al.  Counteracting Identity Fraud in the Information Age: The Identitiy Theft and Assumption Deterrence Act , 1999 .

[15]  T. Holt,et al.  The Effect of Self-Control on Victimization in the Cyberworld , 2010 .

[16]  Katherine J. Barker,et al.  Credit card fraud: awareness and prevention , 2008 .