Addressing Identity Crime in Crime Management Information Systems: Definitions, Classification and Empirics

Computer Law and Security Review 28 381-395, 2012

15 Pages Posted: 29 Jun 2014

See all articles by Rodger Jamieson

Rodger Jamieson

UNSW Australia Business School, School of Information Systems, Technology & Management

Lesley Pek Wee Land

UNSW Australia Business School, School of Information Systems, Technology & Management

Donald W. Winchester

University of New South Wales, School of Banking and Finance

Gregory Stephens

UNSW Australia Business School, School of Information Systems, Technology & Management

Alex Steel

University of New South Wales (UNSW) - UNSW Law & Justice

Alana Maurushat

University of New South Wales (UNSW) - UNSW Law & Justice

Rick T Sarre

University of South Australia - School of Law

Date Written: 2012

Abstract

Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions:should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.

Keywords: Identity crime, identity fraud, identity theft, identity deception, computer crime, internet, taxonomy, crime management information systems

Suggested Citation

Jamieson, Rodger and Land, Lesley Pek Wee and Winchester, Donald W. and Stephens, Gregory and Steel, Alex and Maurushat, Alana and Sarre, Rick T, Addressing Identity Crime in Crime Management Information Systems: Definitions, Classification and Empirics (2012). Computer Law and Security Review 28 381-395, 2012, Available at SSRN: https://ssrn.com/abstract=2362688

Rodger Jamieson

UNSW Australia Business School, School of Information Systems, Technology & Management ( email )

Sydney, NSW 2052
Australia

Lesley Pek Wee Land

UNSW Australia Business School, School of Information Systems, Technology & Management ( email )

Sydney, NSW 2052
Australia

Donald W. Winchester

University of New South Wales, School of Banking and Finance ( email )

Sydney, NSW 2052
Australia

Gregory Stephens

UNSW Australia Business School, School of Information Systems, Technology & Management ( email )

Sydney, NSW 2052
Australia

Alex Steel

University of New South Wales (UNSW) - UNSW Law & Justice ( email )

Kensington, New South Wales 2052
Australia

Alana Maurushat

University of New South Wales (UNSW) - UNSW Law & Justice ( email )

Kensington, New South Wales 2052
Australia

Rick T Sarre (Contact Author)

University of South Australia - School of Law ( email )

GPO Box 2471
Adelaide SA 5001
Australia
83020889 (Phone)
83027128 (Fax)

HOME PAGE: http://www.unisanet.unisa.edu.au/staff/Homepage.asp?Name=Rick.Sarre

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
82
Abstract Views
1,043
Rank
547,488
PlumX Metrics