Skip to main content

The Others

  • Chapter
  • First Online:
  • 841 Accesses

Part of the book series: Information Technology and Law Series ((ITLS,volume 21))

Abstract

The result of nearly any categorization is a category that groups the leftovers together and calls them ‘others.’ This is a familiar concept for survey research, where questionnaires inquire about the participants’ age, ethnicity, income, etc. and generally provide a category labelled ‘others.’ The group of ‘others’ often consists of misfits who fail to claim membership of another category. The appealing aspect of the ‘others’ is the gathering of diverse actors. This, however, complicates the establishment of overarching conclusions about this category. Certain actors included in this chapter demonstrate considerable overlap with other actors covered in previous chapters, whereas other actors included demonstrate a unique position and original means of facilitation with respect to financial identity theft. This chapter is not comprehensive for all of the possible members of the ‘others’ category. Instead it aims to capture the most significant and influential others in relation to the facilitation of financial identity theft. Elucidating the facilitation of the ‘others’ besides the main actors of the previous chapters is essential to complete the picture of the opportunity structure of financial identity theft.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Brooks (2005).

  2. 2.

    Seltzer (1999): 8.

  3. 3.

    Somogy (2006): 904.

  4. 4.

    Brooks (2005).

  5. 5.

    Ibid: 2.

  6. 6.

    Electronic Privacy Information Center (EPIC) (n.d.). ChoicePoint. Available at: http://www.epic.org/privacy/choicepoint/ (last accessed July 13, 2010).

  7. 7.

    O’Harrow (2005).

  8. 8.

    Sullivan (2005).

  9. 9.

    O’Harrow (2005): E01

  10. 10.

    Sullivan (2005).

  11. 11.

    United States of America v. ChoicePoint (2006). Supplemental stipulated judgment and order for permanent injunction and monetary relief: 4.

  12. 12.

    Ibid.

  13. 13.

    Ibid: 6.

  14. 14.

    Ibid.

  15. 15.

    Ibid.

  16. 16.

    See Solove & Hoofnagle (2006).

  17. 17.

    The Electronic Privacy Information Center (EPIC) acknowledged the problems associated with the information brokerage industry, especially ChoicePoint many years prior to the actual breach.

  18. 18.

    Privacy Rights Clearinghouse (2010).

  19. 19.

    LexisNexis (2005).

  20. 20.

    Krebs (2005).

  21. 21.

    Identity Theft Task Force (2007).

  22. 22.

    Schermer & Wagemans (2009).

  23. 23.

    Ibid.

  24. 24.

    Handelsinformatiebureau X.

  25. 25.

    Goderie van Groen.

  26. 26.

    Registratiekamer (2001).

  27. 27.

    Ibid.

  28. 28.

    Ibid.

  29. 29.

    College Bescherming Persoonsgegevens (CBP) (2003).

  30. 30.

    Ibid.

  31. 31.

    Ibid.

  32. 32.

    Ibid.

  33. 33.

    Le Comte (2009).

  34. 34.

    Ibid.

  35. 35.

    Krebs (2009).

  36. 36.

    Ibid.

  37. 37.

    Ibid.

  38. 38.

    Cheney (2010).

  39. 39.

    Perry (2005): 4–5.

  40. 40.

    De Vrede (2010).

  41. 41.

    Ibid.

  42. 42.

    Ibid.

  43. 43.

    Strader & Shaw (1997).

  44. 44.

    Heng (2004).

  45. 45.

    Furletti (2004).

  46. 46.

    Sienkiewicz & Bochicchio (2002).

  47. 47.

    VISA (n.d.). Verified by Visa: Merchant fact sheet. Available at: http://www2.visaeurope.com/documents/vbv/verifiedbyvisa_merchantfactsheet.pdf (last accessed July 14, 2010).

  48. 48.

    Wales (2003).

  49. 49.

    VISA (n.d.). 3-Digit Security Code. Available at: http://usa.visa.com/personal/security/visa_security_program/3_digit_security_code.html (last accessed July 14, 2010).

  50. 50.

    Thuiswinkel.org is the representative organization for e-retailers in the Netherlands.

  51. 51.

    Reijerman (2010).

  52. 52.

    Werkgroep Betalingsverkeer Nederlandse Thuiswinkel Organisatie (2010).

  53. 53.

    Reijerman (2010).

  54. 54.

    Ibid.

  55. 55.

    Werkgroep Betalingsverkeer Nederlandse Thuiswinkel Organisatie (2010).

  56. 56.

    Ibid.

  57. 57.

    Ibid.

  58. 58.

    Weissink (2010).

  59. 59.

    Moore & Clayton (2008): 1.

  60. 60.

    Ibid.

  61. 61.

    Lichtman & Posner (2004): 2.

  62. 62.

    Directive 2000/31/EC.

  63. 63.

    House of Lords: Science and Technology Committee (2007): 30.

  64. 64.

    Ibid.

  65. 65.

    Chandler (2006): 21.

  66. 66.

    Huang et al. (2007): 1–19.

  67. 67.

    Van Eeten & Bauer (2008): 26.

  68. 68.

    Ibid: 27.

  69. 69.

    Ibid: 30.

  70. 70.

    McPherson (2010): 18.

  71. 71.

    Qtd. in Ibid.

  72. 72.

    Moore et al. (2009): 9–10.

  73. 73.

    McPherson (2010).

  74. 74.

    Moore et al. (2009): 9.

  75. 75.

    Krebs (2008).

  76. 76.

    Durham (2006).

  77. 77.

    Krebs (2010).

  78. 78.

    Ibid.

  79. 79.

    Krebs (2008).

  80. 80.

    Australian Institute of Criminology (2007).

  81. 81.

    Dinjens (2010).

  82. 82.

    Higgins (2008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicole S. van der Meulen .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 T.M.C.ASSER PRESS, The Hague, The Netherlands, and the authors/editors

About this chapter

Cite this chapter

van der Meulen, N.S. (2011). The Others. In: Financial Identity Theft. Information Technology and Law Series, vol 21. T.M.C. Asser Press. https://doi.org/10.1007/978-90-6704-814-9_7

Download citation

Publish with us

Policies and ethics

Societies and partnerships