Identity crime : The challenges in the regulation of identity crime
- Authors: Holm, Eric
- Date: 2012
- Type: Text , Conference proceedings
- Full Text:
- Description: This paper discusses the unique challenges of regulating identity crime. Identity crime involves the use of personal identification information to perpetrate crimes of fraud. As such, the identity crime involves using personal and private information to perpetrate crime. This article considers the two significant issues that obstruct responses to this crime; firstly, the reporting of crime. Secondly the paper considers the issue of jurisdiction. Finally, the paper explores some responses to this crime. The paper then explores some of the current responses to identity crime. © 2012 IEEE.
Responding to identity crime on the internet
- Authors: Holm, Eric
- Date: 2012
- Type: Text , Journal article
- Relation: International Journal of Cyber-Security and Digital Forensics Vol. 1, no. 2 (2012), p. 67-74
- Full Text: false
- Reviewed:
- Description: This paper discusses the unique challenges of responding to identity crime. Identity crime involves the use of personal identification information to perpetrate crimes. As such, identity crime involves using personal and private information to for illegal purposes. In this article, the two significant issues that obstruct responses to this crime are considered. These are first, the reporting of crime, and second the issue of jurisdiction. The paper also presents an exploration of some responses to identity crime.
- Description: C1
The role of the refrigerator in identity crime?
- Authors: Holm, Eric
- Date: 2016
- Type: Text , Journal article
- Relation: International journal of cyber-security and digital forensics Vol. 5, no. 1 (2016), p. 1-9
- Full Text: false
- Reviewed:
- Description: This paper explores how botnets in smart devices are exacerbating identity crime. This paper places the refrigerator at the heart of this discussion of the Internet of things that has become connected through the Internet and thereby susceptible to botnets and the collection of personal identification information as an enabler for identity crime. The paper highlights the fallibility of these devices and provides some mechanism to deal with these new risks and presents discussion on the need to for this relationship to be further explored.