Skip to main content

Public Information Infrastructures and Identity Fraud

  • Chapter
  • First Online:
Innovating Government

Part of the book series: Information Technology and Law Series ((ITLS,volume 20))

  • 1066 Accesses

Abstract

During the past 4 years, more than twenty Dutch large-scale chain cooperation cases have been studied in the chain research program at the Institute of Information and Computer Sciences of Utrecht University, using the guidelines and the chain analysis tools provided by the doctrine of chain-computerization. This chain research program has led to some valuable insights and breaking views with regard to both public information-infrastructures and identity fraud. The chain perspective focuses on the interplay of forces that determine the effectiveness of large-scale information exchange; the perspective of identity fraud focuses on the fact that the misuse of somebody else’s identity leaves behind many traces that, however, point towards the victim instead of towards the culprit.

Contribution received in 2010.

A brief introduction was published in two articles in Information Infrastructures and Policy 6 (1997–1999), IOS Press, Amsterdam, March 2000: (1) Chain computerization for inter-organizational policy implementation and: (2) Chain computerization for better privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See also: Grijpink 2004b.

  2. 2.

    In October 2010, the law has been changed on this point; biometrical ID checking, done before checking any administrative detail, is now for serious crimes.

References

  • Cohen MD, March JG, Olsen JP (1972) A garbage can model of organizational choice. Adm Sci Quart 17(1):1–25

    Article  Google Scholar 

  • Grijpink JHAM (2004a) Identity fraud as a challenge to the constitutional state. Computer Law and Security Report 20(1):29–36. Elsevier Science Ltd, Oxford

    Google Scholar 

  • Grijpink JHAM (2004b) Two barriers to realizing the benefits of biometrics: A chain vision on biometrics, and identity fraud as biometrics’ real challenge. In: Renesse RL van (ed) Optical Security and Counterfeit Deterrence Techniques V. Proceedings of SPIE-IS and T Electronic Imaging, SPIE 5310:90–102

    Google Scholar 

  • Grijpink JHAM (2005a) Our emerging information society, the challenge of large-scale information exchange in the constitutional state, inaugural address. Utrecht University, Jan 2005, www.cs.uu.nl/people/grijpink/publications

  • Grijpink JHAM (2005b) Our emerging information society, the challenge of large-scale information exchange in the constitutional state. Computer Law and Security Report 21 (4):328–337. Elsevier Science Ltd, Oxford

    Google Scholar 

  • Grijpink JHAM (2006) Criminal Records in the European Union, the challenge of large-scale information exchange. European Journal of Crime, Criminal Law and Criminal Justice 14 (1):1–19, Brill Academic Publishers, Leiden. Later also published in: Proceedings of the First International Conference on Legal, Security and Privacy Issues in IT Law (LSPI), part I, Complex nr. 3/2006. Institutt for rettsinformatikk, Oslo, pp 283–303

    Google Scholar 

  • March JG, Olsen JP et al (1976) Ambiguity and choice in organizations. Bergen, Norway

    Google Scholar 

  • Miller SJ, Hickson DJ, Wilson DC (1996) Decision-making in organizations. In: Clegg SR, Hardy C, Nord WR (eds) Handbook of Organization Studies. London, Sage

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan Grijpink .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011

About this chapter

Cite this chapter

Grijpink, J. (2011). Public Information Infrastructures and Identity Fraud. In: van der Hof, S., Groothuis, M. (eds) Innovating Government. Information Technology and Law Series, vol 20. T.M.C. Asser Press. https://doi.org/10.1007/978-90-6704-731-9_20

Download citation

Publish with us

Policies and ethics

Societies and partnerships