Abstract
During the past 4 years, more than twenty Dutch large-scale chain cooperation cases have been studied in the chain research program at the Institute of Information and Computer Sciences of Utrecht University, using the guidelines and the chain analysis tools provided by the doctrine of chain-computerization. This chain research program has led to some valuable insights and breaking views with regard to both public information-infrastructures and identity fraud. The chain perspective focuses on the interplay of forces that determine the effectiveness of large-scale information exchange; the perspective of identity fraud focuses on the fact that the misuse of somebody else’s identity leaves behind many traces that, however, point towards the victim instead of towards the culprit.
Contribution received in 2010.
A brief introduction was published in two articles in Information Infrastructures and Policy 6 (1997–1999), IOS Press, Amsterdam, March 2000: (1) Chain computerization for inter-organizational policy implementation and: (2) Chain computerization for better privacy protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See also: Grijpink 2004b.
- 2.
In October 2010, the law has been changed on this point; biometrical ID checking, done before checking any administrative detail, is now for serious crimes.
References
Cohen MD, March JG, Olsen JP (1972) A garbage can model of organizational choice. Adm Sci Quart 17(1):1–25
Grijpink JHAM (2004a) Identity fraud as a challenge to the constitutional state. Computer Law and Security Report 20(1):29–36. Elsevier Science Ltd, Oxford
Grijpink JHAM (2004b) Two barriers to realizing the benefits of biometrics: A chain vision on biometrics, and identity fraud as biometrics’ real challenge. In: Renesse RL van (ed) Optical Security and Counterfeit Deterrence Techniques V. Proceedings of SPIE-IS and T Electronic Imaging, SPIE 5310:90–102
Grijpink JHAM (2005a) Our emerging information society, the challenge of large-scale information exchange in the constitutional state, inaugural address. Utrecht University, Jan 2005, www.cs.uu.nl/people/grijpink/publications
Grijpink JHAM (2005b) Our emerging information society, the challenge of large-scale information exchange in the constitutional state. Computer Law and Security Report 21 (4):328–337. Elsevier Science Ltd, Oxford
Grijpink JHAM (2006) Criminal Records in the European Union, the challenge of large-scale information exchange. European Journal of Crime, Criminal Law and Criminal Justice 14 (1):1–19, Brill Academic Publishers, Leiden. Later also published in: Proceedings of the First International Conference on Legal, Security and Privacy Issues in IT Law (LSPI), part I, Complex nr. 3/2006. Institutt for rettsinformatikk, Oslo, pp 283–303
March JG, Olsen JP et al (1976) Ambiguity and choice in organizations. Bergen, Norway
Miller SJ, Hickson DJ, Wilson DC (1996) Decision-making in organizations. In: Clegg SR, Hardy C, Nord WR (eds) Handbook of Organization Studies. London, Sage
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011
About this chapter
Cite this chapter
Grijpink, J. (2011). Public Information Infrastructures and Identity Fraud. In: van der Hof, S., Groothuis, M. (eds) Innovating Government. Information Technology and Law Series, vol 20. T.M.C. Asser Press. https://doi.org/10.1007/978-90-6704-731-9_20
Download citation
DOI: https://doi.org/10.1007/978-90-6704-731-9_20
Published:
Publisher Name: T.M.C. Asser Press
Print ISBN: 978-90-6704-730-2
Online ISBN: 978-90-6704-731-9
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)