References
- Bowker , G. C. and Star , S. L. 2000 . Sorting Things Out , London : The MIT Press .
- Cabinet Office . Identity Fraud: A Study , July 2002. [Online] Available at: http://www.identitycards.gov.uk/downloads/id_fraud-report.pdf
- Consumer Union . 2007 . Notification of security breach state laws .
- European Commission . 2004 . A New EU Action Plan 2004–2007 to Prevent Fraud on Non-cash Means of Payment . COM (2004) 679 final, Brussels, 20 October 2004
- Geradts , Z. and Sommer , P. 2006 . “ ‘Forensic implications of identity management systems’ ” . Edited by: Geradts , Z. and Sommer , P. January 2006, FIDIS deliverable D6.1. [Online] Available at: http://www.fidis.net
- Gill , M. 2006 . The fight against identity fraud: a brief study of the EU, the UK, France, Germany, and the Netherlands . Perpetuity Research & Consultancy International Ltd
- Grijpink , J. H. A. M. 2006 . Identiteitsfraude en overheid . Justitiële verkenningen , 32 ( 7 ) : 37 – 57 .
- Hildebrandt , M. 2008 . “ Profiling and the identity of the European citizen ” . In Profiling the European Citizen. Cross-disciplinary Perspectives , Edited by: Hildebrandt , M. and Gutwirth , S. Springer Verlag . (Chapter 15) 2008 (to appear)
- Johnson , L. D. 2004 . Statement of Larry D. Johnson, Special Agent in charge criminal investigative division United States Secret Service . Hearing on Identity Theft: The Causes, Costs, Consequences and Potential Solutions, Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform
- Koops , B. J. 2005 . FIDIS Deliverable D5.1: A survey on legislation on ID theft in the EU and a number of other countries . [Online] Available at: http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp5-del5.1.law_survey.pdf
- Koops , B. J. and Leenes , R. E. 2006 . ID theft, ID fraud and/or ID-related crime. Definitions matter . Datenschutz und Datensicherheit , 30 ( 9 ) : 553 – 556 .
- Leenes , R. 2006 . “ ‘FIDIS Deliverable D5.2b: ID-related crime: towards a common ground for interdisciplinary research’ ” . Edited by: Leenes , R. [Online] Available at: http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp5-del5.2b.ID-related_crime.pdf
- Lenard , T. M. and Rubin , P. H. 2006 . Much ado about notification . Regulation , 29 ( 1 ) : 44 – 50 .
- Levy , E. 2004 . Criminals become tech savvy . IEEE Security and Privacy , 2 ( 2 ) : 65 – 68 .
- LoPucki , L. M. 2001 . Human identification theory and the identity theft problem . Texas Law Review , 80 : 89 – 134 .
- LSE . 2005 . “ The Identity Project: an assessment of the UK Identity Cards Bill and its Implications ” . In Version 1.09 , London : LSE . [Online] Available at: http://is2.lse.ac.uk/idcard/identityreport.pdf
- Luhmann , N. 2000 . Organisation und Entscheidung , 1 , Opladen/Wiesbaden : Westdeutscher Verlag .
- Mitchison , N. 2004 . Identity theft: a discussion paper . European Commission Joint Research Center, March 2004. [Online] Available at: https://www.prime-project.eu/community/furtherreading/studies/IDTheftFIN.pdf
- Pontell , H. “Pleased to meet you…won't you guess my name?” Reducing identity fraud in the Australian tax system . paper presented at the Centre for Tax Integrity, the Australian National University on 29 October 2002 . [Online] Available at: http://ctsi.anu.edu.au/publications/taxpres/Pontell.pdf
- Privacy Rights Clearinghouse (PRC) . 2002 . Factsheet 17(g). Criminal identity theft . (revised May 2002) [Online] Available at: http://www.privacyrights.org/fs/fs17g-CrimIdTheft.htm
- Rost , M. , Meints , M. and Hansen , M. 2006 . “ Towards a typology of rearrangement of identity linkage ” . In FIDIS Deliverable D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research Edited by: Leenes , R. 43 – 60 . [Online] Available at: http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp5-del5.2b.ID-related_crime.pdf
- Schneier , B. 2004 . Secrets and Lies: Digital Security in a Networked World , 1 , New York : John Wiley & Sons .
- Solove , D. J. The legal construction of identity theft . Presented at the Symposium: Digital Cops in a Virtual Environment Yale Law School . March 26–28 2004 . pp. 1 – 7 . [Online] Available at: http://isp.law.yale.edu/static/pastevents/digitalcops/papers/solove_newcrimes.pdf
- Sproule , S. and Archer , N. 2006 . Defining identity theft – a discussion paper . 6 April 2006. [Online] Available at: http://www.business.mcmaster.ca/IDTDefinition/lit&links.htm
- Van der Meulen , N. 2006 . The challenge of countering identity theft: recent developments in the United States, the United Kingdom, and the European Union . Tilburg, 6 September 2006. [Online] Available at: http://www.tilburguniversity.nl/intervict/publications/NicolevanderMeulen.pdf
- Wright , B. 2004 . Internet break-ins: new legal liability . Computer Law & Security Report , 20 ( 3 ) : 171 – 174 .