F. Belanger and L. Carter, Trust and risk in e-government adoption, The Journal of Strategic Information Systems, vol.17, issue.2, pp.165-176, 2008.
DOI : 10.1016/j.jsis.2007.12.002

G. Borges, Rechtsfragen der Haftung im Zusammenhang mit dem elektronischen Identitätsnachweis -Ein Gutachten für das Bundesministerium des Innern, 2010.

E. Demby, Identity Theft Insurance -Is it worthwile? Collections&Credit Risk, pp.10-11, 2005.

G. Dimitrov, Liability of Certification Service Providers, PhD, 2007.

E. Commission, A New EU Action Plan 2004-2007 to Prevent Fraud on Non-cash Means of, Payment. COM, vol.679, issue.2010, 2004.

E. Commission, Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network and information security across the Union, * COM, pp.48-20130027, 2013.

X. S. Huysmans, P. Hubner, A. Duquenoy, &. L. Zuccato, and . Martucci, Privacy-friendly Identity Management in eGovernment The Future of Identity in the Information Society, Proceedings of the Third IFIP WP9.2, 9.6/11.6, 11.7 FIDIS Summer School on the Future of Identity in the Information Society, 2008.

B. Koops and R. Leenes, Identity theft, identity fraud and/or identity-related crime, Datenschutz und Datensicherheit, pp.553-556, 2006.
DOI : 10.1007/s11623-006-0141-2

D. Korff, EC Study on Implementation of Data Protection Directive -comparative summary of national laws, 2002.

U. Magnus, Unification of Tort Law: Damages. Kluwer, 2001.

T. Mckee and L. Mckee, Helping Taxpayers Who Are Victims of Identity Theft, CPA Journal, vol.81, issue.7, p.46, 2011.

N. V. Meulen, The Challenge of Countering Identity Theft: Recent Developments in the United States, the United Kingdom, and the European UnionReport Commissioned by the National Infrastructure Cyber Crime program (NICC) . NICC, 2006.

K. Schedler and L. Summermatter, E-Government, Journal of Political Marketing, vol.8, issue.3-4, 2003.
DOI : 10.1300/J199v02n03_14

T. Smedinghoff, Solving the legal challenges of trustworthy online identity, Computer Law & Security Review, vol.28, issue.5, pp.532-541, 2012.
DOI : 10.1016/j.clsr.2012.07.001

D. Solove, Identity Theft, Privacy, and the Architecture of Vulnerability, SSRN Electronic Journal, pp.1228-1277, 2003.
DOI : 10.2139/ssrn.416740

J. Spier and O. Haazen, Comparative Conclusions on Causation, 2000.

C. Van-dam, European Tort Law, 2013.

P. Widmer, Unification of Tort Law: Fault. The Hague: Kluwer, 2005.