TY - BOOK
T1 - Chapter 19: Addressing identity crime in crime management information systems: Definitions, classification, and empirics, pp. 399-413.
T2 - Transnational Financial Crime
AU - Winchester, Donald
AU - Jamiesona, Rodger
AU - Pek, Lesley
AU - Landa, Wee
AU - Stephensa, Greg
AU - Maurushatb, Alana
AU - Sarrec, Rick
A2 - Passas, Nikos
PY - 2013
Y1 - 2013
N2 - Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and vice versa. This chapter discusses the methodology of identity crime and identifies the various definitions of identity crime. It also discusses the contributions, implications, limitations, conclusion and future research in this area. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems (IS). The main purpose of crime metrics in management IS gathered by national statistics collecting bodies or at the law enforcement case level is to have a history of relationships that could help authorities to understand and develop countermeasures for crimes. With fictitious identity, perpetrators may eventually exist within organizational knowledge management systems.
AB - Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and vice versa. This chapter discusses the methodology of identity crime and identifies the various definitions of identity crime. It also discusses the contributions, implications, limitations, conclusion and future research in this area. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems (IS). The main purpose of crime metrics in management IS gathered by national statistics collecting bodies or at the law enforcement case level is to have a history of relationships that could help authorities to understand and develop countermeasures for crimes. With fictitious identity, perpetrators may eventually exist within organizational knowledge management systems.
U2 - 10.4324/9781315084572
DO - 10.4324/9781315084572
M3 - Book
T3 - Transnational Financial Crime
BT - Chapter 19: Addressing identity crime in crime management information systems: Definitions, classification, and empirics, pp. 399-413.
PB - Routledge
ER -