3,348
Views
17
CrossRef citations to date
0
Altmetric
ARTICLES

A TYPOLOGY OF IDENTITY-RELATED CRIME

Conceptual, technical, and legal issues

, , , &
Pages 1-24 | Published online: 19 Feb 2009

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

Clay Posey, Uzma Raja, Robert E. Crossler & A. J. Burns. (2017) Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA. European Journal of Information Systems 26:6, pages 585-604.
Read now
Edgar A. Whitley, Uri Gal & Annemette Kjaergaard. (2014) Who do you think you are? A review of the complex interplay between information systems, identification and identity. European Journal of Information Systems 23:1, pages 17-35.
Read now

Articles from other publishers (14)

William Moyahabo Rakololo & Witness Maluleke. (2022) An Exploratory Study on Causes of Identity Document Theft in South Africa. International Journal of Criminology and Sociology 9, pages 670-685.
Crossref
Simon Baechler. (2020) Document Fraud: Will Your Identity Be Secure in the Twenty-first Century?. European Journal on Criminal Policy and Research 26:3, pages 379-398.
Crossref
Bradford W. Reyns & Ryan Randa. (2019) No honor among thieves: personal and peer deviance as explanations of online identity fraud victimization. Security Journal 33:2, pages 228-243.
Crossref
Eoghan Casey & David-Olivier Jaquet-Chiffelle. (2019) Do Identities Matter?. Policing: A Journal of Policy and Practice 13:1, pages 21-34.
Crossref
Michele J. Fleming. 2018. Encyclopedia of Adolescence. Encyclopedia of Adolescence 843 852 .
Ruochen Liao, Shenaz Balasinorwala & H. Raghav Rao. (2017) Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests. Information Systems Frontiers 19:3, pages 443-455.
Crossref
Cassandra Cross. (2017) ‘But I’ve never sent them any personal details apart from my driver’s licence number …’: Exploring seniors’ attitudes towards identity crime. Security Journal 30:1, pages 74-88.
Crossref
Jonathan Clough. (2015) Towards a common identity? The harmonisation of identity theft laws. Journal of Financial Crime 22:4, pages 492-512.
Crossref
Ardion Beldad, Menno de Jong & Michaël Steehouder. (2011) I trust not therefore it must be risky: Determinants of the perceived risks of disclosing personal data for e-government transactions. Computers in Human Behavior 27:6, pages 2233-2242.
Crossref
Gerald C. Kane, Kathy Stewart Schwaig & Veda C. Storey. 2011. Theoretical and Practical Advances in Information Systems Development. Theoretical and Practical Advances in Information Systems Development 81 100 .
Nicole van der Meulen & Bert-Jaap Koops. 2011. The New Faces of Victimhood. The New Faces of Victimhood 159 190 .
Benoit Dupont. (2011) La coévolution du « vol d’identité » et des systèmes de paiement. Criminologie 43:2, pages 247-268.
Crossref
Bert-Jaap Koops & Zeno Geradts. 2009. The Future of Identity in the Information Society. The Future of Identity in the Information Society 315 347 .
Ruth Halperin & James Backhouse. (2008) A roadmap for research on identity in the information society. Identity in the Information Society 1:1, pages 71-87.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.