COLLABORATIVE POLICING AGAINST ONLINE IDENTITY THEFT : A STRATEGIC PROPOSAL OF THAILAND FOR LAW ENFORCEMENT
Main Article Content
Abstract
Referring to the resolution to the problem of cybercrime adopted at the 29 ASEANAPOL Conference in 2009, this article aims to present the approach of collaborative policing against online identity theft gained from the stakeholders analysis. The article is divided into five parts beginning with the characteristics of
online identity theft and the situation in Thailand. The second part provides the concept of partnerships applied to prevent crime. The third part places an emphasis on partnerships in online policing against identity crime. The fourth part evaluates the actions of Thailand against online identity crime. In the final part, possible
recommendations are proposed to protect personal information in cyberspace from identity fraudsters. Since the roles of law enforcement agencies in ASEAN countries are not sufficient to fight online identity theft due to the difference of each state’s
law and policy and abundant networks of online society all over the world, The ASEAN states should implement a concept of strategic partnership by seeking more collaboration and cooperation with concerned private and public partners.
Article Details
References
Gerard, G. J., Hillison, W., & Pacini, C. (2004). Identity theft : The US legal environmentand organisations related responsibilities. Journal of Financial Crime, (12), 33-43.
Jewkes, Y. (2010). Public policing and internet crime. In Jewkes, Yvonne & Yar, Majid (Eds),Handbook of internet crime. Devon: Willan Publishing.
Lessig, L. (1999). Code and other law of cyberspace. New York: Basic Books.
Rosenbaum, D. (2002). Evaluating multi-agency anti-crime partnerships: Theory,design, and measurement issues. Crime Prevention Studies, (14), 171-225.
Solove, Daniel J. (2003). Identity theft, privacy, and the architecture of vulnerability.Hastings Law Journal, (54), 1227-1235.
Steinert, Heinz. (1978). On the function of criminal law. Contemporaries Crises,(2), 167-193. Retrieved September 29, 2013, from
http://www.springerlink.com/content/u8221758u26x200g/
Udo, G. J. (2001). Privacy and security concerns as a major barriers for e-commerce:A survey study. Information Management and Computer Security, 9(4),Retrieved October 1, 2013, from http://www.emerald-library.com/ft
Wall, D. (2002). Insecurity and the policing of cyberspace. New York:Routledge.
Wall, D. (2007). Cybercrime: The transformation of crime in the Information age.Cambridge: Polity Press.
Wall, D. (2009-2010). Policing online behavior: How is cyberspace policed and by whom?, Cybercrime: Computer and crime in the information age.
Retrieved September 26, 2013, from http://webprod3.leeds.ac.uk/banner/dynmodules.asp?Y=201314&M=LAW-
5336M
Warden, F. V. (1992). Dimensions and types of policy networks. European Journal of Political Research, (21), 29-52.
Wright, R. (2002). Technology, and its effects on criminal responsibility, security and criminal justice, International society for the reform of criminal law, 16th international conference. Retrieved October 5, 2013, from www.isrol,org/Papers/Wrihgt.pdfs.