Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Selected Bibliography
Anderson, K. B. (2005), ‘Identity Theft: Does the Risk Vary With Demographics?’, Federal Trade Commission, Bureau of Economics Working Paper No. 279, available at http://www.ftc.gov/be/workpapers/wp279.pdf.
Anderson, Ross, Rainer Böhme, Richard Clayton & Tyler Moore (2008), Security Economics and the Internal Market, report for ENISA, January 2008, available at http://www.enisa.europa.eu/doc/pdf/report_sec_econ_&_int_mark_20080131.pdf.
Buitelaar, Hans (ed.) (2007), D13.3: Study on ID Number Policies, FIDIS deliverable, available at http://www.fidis.net.
De Bot, D. (2005), Privacybescherming bij e-government in België, Vanden Broele, Brugge, n°249.
De Cock, D. Ch. Wolf & B. Preneel, The Belgian Electronic Identity Card, (Overview), available at http://www.cosic.esat.kuleuven.be/publications/article-769.pdf.
Denolf, J. (ed.), Identiteitsfraude. Misdrijf van de toekomst? Fraude d’identité. Le crime du future? Politeia, Brussels, 2005.
Draps, K. (2007). Identiteitsfraude. Een routineactiviteitenbenadering, Leuvense Universiteitsbibliotheek, Leuven.
Government Accountability Office (2002), “Identity Theft: Prevalence and Cost appear to be growing”, Report to the Congressional Requesters.
Home Office Statistical Bulletin (2007), ‘Mobile phone theft, plastic card and identity fraud: Findings from the 2005/06 British Crime Survey’, available at http://www.homeoffice.gov.uk/rds/pdfs07/hosb1007.pdf.
Hoofnagle, C.J. (2007), “Identity Theft: Making the Known Unknowns Known”, 21 Harvard Journal of Law & Technology (1).
Koops, Bert-Jaap & Ronald Leenes (2006), ‘ID Theft, ID Fraud and/or ID-related Crime. Definitions matter’, Datenschutz und Datensicherheit 2006 (9), p. 553-556.
Koops, Bert-Jaap, Ronald Leenes, Martin Meints, Nicole van der Meulen & David-Olivier Jacquet-Chiffelle (2008), ‘A Typology of Identity-related Crime: Conceptual, Technical, and Legal Issues’, Information, Communication & Society (forthcoming).
Leenes, R. (ed.) (2006), D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research, FIDIS deliverable, available at /.
Moore, T. and Clayton, R. ‘An Empirical Analysis of the Current State of Phishing Attack and Defense’. Available at http://www.cl.cam.ac.uk/~rnc1/weis07-phishing.pdf.
Pintér, Róbert (ed.) (2007), D5.2c: Identity related crime in the world of films, FIDIS deliverable, available at /.
Savirimuthu, A. & Joseph Savirimuthu (2007), ‘Identity Theft and Systems Theory: The Fraud Act 2006 in Perspective’, 4 Script-ed (4).
United Kingdom Cabinet Office (2002), Identity Fraud: A Study, United Kingdom: Cabinet Office Publications.
De Vries, U.R.M.Th., H. Tigchelaar, M. van der Linden & A.M. Hol (2007), Identiteitsfraude: een afbakening. Een internationale begripsvergelijking en analyse van nationale strafbepalingen, Utrecht: WODC, http://www.wodc.nl/images/1496_%20volledige_tekst_tcm44-86343.pdf http://www.wodc.nl/images/1496_summary_tcm44-86342.pdf).
| 34 / 34 |
