Skip to main content
Article
Addressing identity crime in crime management information systems: Definitions, classification, and empirics
Computer Law and Security Review (2011)
  • Alex Steel, University of New South Wales
  • Rodger Jamieson, University of New South Wales
  • Lesley Land, University of New South Wales
  • Donald Winchester, University of New South Wales
  • Greg Stephens, University of New South Wales
  • Alana Maurushat, University of New South Wales
  • Rick Sarre, University of South Australia
Abstract
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are nowbetter defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS.We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.
Keywords
  • Identity crime,
  • Identity fraud,
  • Identity theft,
  • Identity deception,
  • Computer crime,
  • Internet,
  • Information systems security,
  • (ISS) Taxonomy,
  • Personnel identifying information (PII),
  • Crime management information systems
Publication Date
2011
Citation Information
Alex Steel, Rodger Jamieson, Lesley Land, Donald Winchester, et al.. "Addressing identity crime in crime management information systems: Definitions, classification, and empirics" Computer Law and Security Review Vol. 28 (2011)
Available at: http://works.bepress.com/alex_steel/24/