COLLABORATIVE POLICING AGAINST ONLINE IDENTITY THEFT : A STRATEGIC PROPOSAL OF THAILAND FOR LAW ENFORCEMENT

Main Article Content

Chitphol Ph.D. Kanchanakit

Abstract

Referring to the resolution to the problem of cybercrime adopted at the 29 ASEANAPOL Conference in 2009, this article aims to present the approach of collaborative policing against online identity theft gained from the stakeholders analysis. The article is divided into five parts beginning with the characteristics of
online identity theft and the situation in Thailand. The second part provides the concept of partnerships applied to prevent crime. The third part places an emphasis on partnerships in online policing against identity crime. The fourth part evaluates the actions of Thailand against online identity crime. In the final part, possible
recommendations are proposed to protect personal information in cyberspace from identity fraudsters. Since the roles of law enforcement agencies in ASEAN countries are not sufficient to fight online identity theft due to the difference of each state’s
law and policy and abundant networks of online society all over the world, The ASEAN states should implement a concept of strategic partnership by seeking more collaboration and cooperation with concerned private and public partners.

Article Details

How to Cite
Kanchanakit, C. P. (2019). COLLABORATIVE POLICING AGAINST ONLINE IDENTITY THEFT : A STRATEGIC PROPOSAL OF THAILAND FOR LAW ENFORCEMENT. Southeast Bangkok Journal (Humanities and Social Sciences), 2(2), 95–107. retrieved from https://so05.tci-thaijo.org/index.php/SB_Journal/article/view/192959
Section
Academic Articles

References

Canadian Internet Policy and Public Interest Clinic (CIPPIC). (2007). Australian, French and United Kingdom legislation relevant to identity theft : An annotated review. CIPPIC working paper, March(3C), 1-49.

Gerard, G. J., Hillison, W., & Pacini, C. (2004). Identity theft : The US legal environmentand organisations related responsibilities. Journal of Financial Crime, (12), 33-43.

Jewkes, Y. (2010). Public policing and internet crime. In Jewkes, Yvonne & Yar, Majid (Eds),Handbook of internet crime. Devon: Willan Publishing.

Lessig, L. (1999). Code and other law of cyberspace. New York: Basic Books.

Rosenbaum, D. (2002). Evaluating multi-agency anti-crime partnerships: Theory,design, and measurement issues. Crime Prevention Studies, (14), 171-225.

Solove, Daniel J. (2003). Identity theft, privacy, and the architecture of vulnerability.Hastings Law Journal, (54), 1227-1235.

Steinert, Heinz. (1978). On the function of criminal law. Contemporaries Crises,(2), 167-193. Retrieved September 29, 2013, from
http://www.springerlink.com/content/u8221758u26x200g/

Udo, G. J. (2001). Privacy and security concerns as a major barriers for e-commerce:A survey study. Information Management and Computer Security, 9(4),Retrieved October 1, 2013, from http://www.emerald-library.com/ft

Wall, D. (2002). Insecurity and the policing of cyberspace. New York:Routledge.

Wall, D. (2007). Cybercrime: The transformation of crime in the Information age.Cambridge: Polity Press.

Wall, D. (2009-2010). Policing online behavior: How is cyberspace policed and by whom?, Cybercrime: Computer and crime in the information age.
Retrieved September 26, 2013, from http://webprod3.leeds.ac.uk/banner/dynmodules.asp?Y=201314&M=LAW-
5336M

Warden, F. V. (1992). Dimensions and types of policy networks. European Journal of Political Research, (21), 29-52.

Wright, R. (2002). Technology, and its effects on criminal responsibility, security and criminal justice, International society for the reform of criminal law, 16th international conference. Retrieved October 5, 2013, from www.isrol,org/Papers/Wrihgt.pdfs.