Abstract
The result of nearly any categorization is a category that groups the leftovers together and calls them ‘others.’ This is a familiar concept for survey research, where questionnaires inquire about the participants’ age, ethnicity, income, etc. and generally provide a category labelled ‘others.’ The group of ‘others’ often consists of misfits who fail to claim membership of another category. The appealing aspect of the ‘others’ is the gathering of diverse actors. This, however, complicates the establishment of overarching conclusions about this category. Certain actors included in this chapter demonstrate considerable overlap with other actors covered in previous chapters, whereas other actors included demonstrate a unique position and original means of facilitation with respect to financial identity theft. This chapter is not comprehensive for all of the possible members of the ‘others’ category. Instead it aims to capture the most significant and influential others in relation to the facilitation of financial identity theft. Elucidating the facilitation of the ‘others’ besides the main actors of the previous chapters is essential to complete the picture of the opportunity structure of financial identity theft.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Brooks (2005).
- 2.
Seltzer (1999): 8.
- 3.
Somogy (2006): 904.
- 4.
Brooks (2005).
- 5.
Ibid: 2.
- 6.
Electronic Privacy Information Center (EPIC) (n.d.). ChoicePoint. Available at: http://www.epic.org/privacy/choicepoint/ (last accessed July 13, 2010).
- 7.
O’Harrow (2005).
- 8.
Sullivan (2005).
- 9.
O’Harrow (2005): E01
- 10.
Sullivan (2005).
- 11.
United States of America v. ChoicePoint (2006). Supplemental stipulated judgment and order for permanent injunction and monetary relief: 4.
- 12.
Ibid.
- 13.
Ibid: 6.
- 14.
Ibid.
- 15.
Ibid.
- 16.
See Solove & Hoofnagle (2006).
- 17.
The Electronic Privacy Information Center (EPIC) acknowledged the problems associated with the information brokerage industry, especially ChoicePoint many years prior to the actual breach.
- 18.
Privacy Rights Clearinghouse (2010).
- 19.
LexisNexis (2005).
- 20.
Krebs (2005).
- 21.
Identity Theft Task Force (2007).
- 22.
Schermer & Wagemans (2009).
- 23.
Ibid.
- 24.
Handelsinformatiebureau X.
- 25.
Goderie van Groen.
- 26.
Registratiekamer (2001).
- 27.
Ibid.
- 28.
Ibid.
- 29.
College Bescherming Persoonsgegevens (CBP) (2003).
- 30.
Ibid.
- 31.
Ibid.
- 32.
Ibid.
- 33.
Le Comte (2009).
- 34.
Ibid.
- 35.
Krebs (2009).
- 36.
Ibid.
- 37.
Ibid.
- 38.
Cheney (2010).
- 39.
Perry (2005): 4–5.
- 40.
De Vrede (2010).
- 41.
Ibid.
- 42.
Ibid.
- 43.
Strader & Shaw (1997).
- 44.
Heng (2004).
- 45.
Furletti (2004).
- 46.
Sienkiewicz & Bochicchio (2002).
- 47.
VISA (n.d.). Verified by Visa: Merchant fact sheet. Available at: http://www2.visaeurope.com/documents/vbv/verifiedbyvisa_merchantfactsheet.pdf (last accessed July 14, 2010).
- 48.
Wales (2003).
- 49.
VISA (n.d.). 3-Digit Security Code. Available at: http://usa.visa.com/personal/security/visa_security_program/3_digit_security_code.html (last accessed July 14, 2010).
- 50.
Thuiswinkel.org is the representative organization for e-retailers in the Netherlands.
- 51.
Reijerman (2010).
- 52.
Werkgroep Betalingsverkeer Nederlandse Thuiswinkel Organisatie (2010).
- 53.
Reijerman (2010).
- 54.
Ibid.
- 55.
Werkgroep Betalingsverkeer Nederlandse Thuiswinkel Organisatie (2010).
- 56.
Ibid.
- 57.
Ibid.
- 58.
Weissink (2010).
- 59.
Moore & Clayton (2008): 1.
- 60.
Ibid.
- 61.
Lichtman & Posner (2004): 2.
- 62.
Directive 2000/31/EC.
- 63.
House of Lords: Science and Technology Committee (2007): 30.
- 64.
Ibid.
- 65.
Chandler (2006): 21.
- 66.
Huang et al. (2007): 1–19.
- 67.
Van Eeten & Bauer (2008): 26.
- 68.
Ibid: 27.
- 69.
Ibid: 30.
- 70.
McPherson (2010): 18.
- 71.
Qtd. in Ibid.
- 72.
Moore et al. (2009): 9–10.
- 73.
McPherson (2010).
- 74.
Moore et al. (2009): 9.
- 75.
Krebs (2008).
- 76.
Durham (2006).
- 77.
Krebs (2010).
- 78.
Ibid.
- 79.
Krebs (2008).
- 80.
Australian Institute of Criminology (2007).
- 81.
Dinjens (2010).
- 82.
Higgins (2008).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 T.M.C.ASSER PRESS, The Hague, The Netherlands, and the authors/editors
About this chapter
Cite this chapter
van der Meulen, N.S. (2011). The Others. In: Financial Identity Theft. Information Technology and Law Series, vol 21. T.M.C. Asser Press. https://doi.org/10.1007/978-90-6704-814-9_7
Download citation
DOI: https://doi.org/10.1007/978-90-6704-814-9_7
Published:
Publisher Name: T.M.C. Asser Press
Print ISBN: 978-90-6704-813-2
Online ISBN: 978-90-6704-814-9
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)