Advertisement

Public Information Infrastructures and Identity Fraud

  • Jan GrijpinkEmail author
Chapter
Part of the Information Technology and Law Series book series (ITLS, volume 20)

Abstract

During the past 4 years, more than twenty Dutch large-scale chain cooperation cases have been studied in the chain research program at the Institute of Information and Computer Sciences of Utrecht University, using the guidelines and the chain analysis tools provided by the doctrine of chain-computerization. This chain research program has led to some valuable insights and breaking views with regard to both public information-infrastructures and identity fraud. The chain perspective focuses on the interplay of forces that determine the effectiveness of large-scale information exchange; the perspective of identity fraud focuses on the fact that the misuse of somebody else’s identity leaves behind many traces that, however, point towards the victim instead of towards the culprit.

Keywords

Criminal Record Criminal Procedure Chain Level Chain Concept Chain Perspective 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Cohen MD, March JG, Olsen JP (1972) A garbage can model of organizational choice. Adm Sci Quart 17(1):1–25CrossRefGoogle Scholar
  2. Grijpink JHAM (2004a) Identity fraud as a challenge to the constitutional state. Computer Law and Security Report 20(1):29–36. Elsevier Science Ltd, OxfordGoogle Scholar
  3. Grijpink JHAM (2004b) Two barriers to realizing the benefits of biometrics: A chain vision on biometrics, and identity fraud as biometrics’ real challenge. In: Renesse RL van (ed) Optical Security and Counterfeit Deterrence Techniques V. Proceedings of SPIE-IS and T Electronic Imaging, SPIE 5310:90–102Google Scholar
  4. Grijpink JHAM (2005a) Our emerging information society, the challenge of large-scale information exchange in the constitutional state, inaugural address. Utrecht University, Jan 2005, www.cs.uu.nl/people/grijpink/publications
  5. Grijpink JHAM (2005b) Our emerging information society, the challenge of large-scale information exchange in the constitutional state. Computer Law and Security Report 21 (4):328–337. Elsevier Science Ltd, OxfordGoogle Scholar
  6. Grijpink JHAM (2006) Criminal Records in the European Union, the challenge of large-scale information exchange. European Journal of Crime, Criminal Law and Criminal Justice 14 (1):1–19, Brill Academic Publishers, Leiden. Later also published in: Proceedings of the First International Conference on Legal, Security and Privacy Issues in IT Law (LSPI), part I, Complex nr. 3/2006. Institutt for rettsinformatikk, Oslo, pp 283–303Google Scholar
  7. March JG, Olsen JP et al (1976) Ambiguity and choice in organizations. Bergen, NorwayGoogle Scholar
  8. Miller SJ, Hickson DJ, Wilson DC (1996) Decision-making in organizations. In: Clegg SR, Hardy C, Nord WR (eds) Handbook of Organization Studies. London, SageGoogle Scholar

Copyright information

© T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011 2011

Authors and Affiliations

  1. 1.Utrecht UniversityUtrechtThe Netherlands
  2. 2.The HagueThe Netherlands

Personalised recommendations