1,795
Views
38
CrossRef citations to date
0
Altmetric
Original Articles

Risky remote purchasing and identity theft victimization among older Internet users

, , &
Pages 681-698 | Received 16 May 2014, Accepted 23 Jan 2015, Published online: 08 Apr 2015

References

  • Allison, S. F. H., Schuck, A. M., & Lersch, K. M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, 33(1), 19–29. doi:10.1016/j.jcrimjus.2004.10.007
  • Anderson, J. C. (2013, April 14). Identity theft growing, costly to victims. The Arizona Republic, p. A1.
  • Anderson, K. B. (2013). Consumer fraud in the United States, 2011: The third FTC survey. Washington, DC: Federal Trade Commission.
  • Andridge, R. R., & Little, R. (2010). A review of hot deck imputation for survey non-response. International Statistical Review, 78(1), 40–64. doi:10.1111/j.1751-5823.2010.00103.x
  • Baron, S. W., Forde, D. R., & Kay, F. M. (2007). Self-control, risky lifestyles, and situation: The role of opportunity and context in the general theory. Journal of Criminal Justice, 35(2), 119–136. doi:10.1016/j.jcrimjus.2007.01.001
  • Berk, R. A. (1983). An introduction to sample selection bias in sociological data. American Sociological Review, 48, 386–397. doi:10.2307/2095230
  • Blumberg, S. J., & Luke, J. V. (2011). Wireless substitution: Early release of estimates from the National Health Interview Survey, JanuaryJune 2011. Atlanta, GA: National Center for Health Statistics.
  • Bushway, S., Johnson, B. D., & Slocum, L. A. (2007). Is the magic still there? The use of the Heckman two-step correction for selection bias in criminology. Journal of Quantitative Criminology, 23, 151–178. doi:10.1007/s10940-007-9024-4
  • Button, M., Nicholls, C., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47, 391–408. doi:10.1177/0004865814521224
  • Caffrey, C., Sengupta, M., Park-Lee, E., Moss, A., Rosenoff, E., & Harris-Kojetin, L. (2012). Residents living in residential care facilities: United States, 2010. NCHS Data Brief No. 91. Hyattsville, MD: National Center for Health Statistics.
  • Callahan, C. M., Unverzagt, F. W., Hui, S. I., Perkins, A. J., & Hendrie, H. C. (2002). Six-item screener to identify cognitive impairment among potential subjects for clinical research. Medical Care, 40, 771–781. doi:10.1097/00005650-200209000-00007
  • Canadian Department of Justice. (2010). Bill S-4: An act to amend the criminal code (identity theft and related misconduct). [ Press release]. Retrieved from www.justice.gc.ca/eng/news-nouv/nr-cp/2010/doc_32471.html
  • Chang, J. J., Chen, J. J., & Brownson, R. (2003). The role of repeat victimization in adolescent delinquent behaviors and recidivism. Journal of Adolescent Health, 32, 272–280. doi:10.1016/S1054-139X(02)00564-5
  • Copes, H., & Vieraitis, L. M. (2009). Identity theft. In M. Tonry (Ed.), Oxford handbook of crime and public policy (pp. 247–272). Oxford: Oxford University Press.
  • Dadisho, E. (2005). Identity theft and the police response: The problem. The Police Chief, 72, 25–29.
  • de Ridder, D., Lensvelt-Mulders, G., Finkenauer, C., Stok, F., & Baumeister, R. F. (2012). Taking stock of self-control: A meta-analysis of how trait self-control relates to a wide range of behaviors. Personality and Social Psychology Review, 16, 76–99. doi:10.1177/1088868311418749
  • European Commission Directorate General for Home Affairs. (2012). Study for an impact assessment on a proposal for a new legal framework on identity theft: Final report. Kent: Centre for Strategy and Evaluation Services.
  • Federal Bureau of Investigation. (2013). Fraud target: Senior citizens. Retrieved December 31, 2013, from www.fbi.gov/scams-safety/fraud/seniors
  • Federal Trade Commission. (2012). How to keep your personal information secure. Retrieved December 27, 2013, from www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure#offline
  • Forde, D. R., & Kennedy, L. W. (1997). Risky lifestyles, routine activities, and the general theory of crime. Justice Quarterly, 14, 265–294. doi:10.1080/07418829700093331
  • Franklin, C. A. (2011). An investigation of the relationship between self-control and alcohol-induced sexual assault victimization. Criminal Justice and Behavior, 38, 263–285. doi:10.1177/0093854810394800
  • Gehrke-White, D. (2012, May 7). ID stolen? No excuse, IRS says agency freezes refunds, but demands victims pay. South Florida Sun Sentinel, p. A1.
  • Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Palo Alto, CA: Stanford University Press.
  • Gover, A. R., Park, M., Tomsich, E. A., & Jennings, W. G. (2011). Dating violence perpetration and victimization among South Korean college students: A focus on gender and child maltreatment. Journal of Interpersonal Violence, 26, 1232–1263. doi:10.1177/0886260510368161
  • Grasmick, H. G., Tittle, C. R., Bursik, R. J., & Arneklev, B. J. (1993). Testing the core empirical implications of Gottfredson and Hirschi's general theory of crime. Journal of Research in Crime and Delinquency, 30(1), 5–29. doi:10.1177/0022427893030001002
  • Harrell, E., & Langton, L. (2013). Victims of identity theft, 2012. Washington, DC: U.S. Government Printing Office.
  • Hindelang, M., Gottfredson, M. R., & Garofalo, J. (1978). Victims of personal crime. Cambridge, MA: Ballinger.
  • Holm, E. (2012). Responding to identity crime on the Internet. International Journal of Cyber-Security and Digital Forensics, 1, 67–74.
  • Holtfreter, K., Reisig, M. D., & Blomberg, T. G. (2006). Consumer fraud victimization in Florida: An empirical study. St. Thomas Law Review, 18, 761–789.
  • Holtfreter, K., Reisig, M. D., Mears, D. P., & Wolfe, S. E. (2014). Financial exploitation of the elderly in a consumer context. Final report. Washington, DC: National Institute of Justice.
  • Holtfreter, K., Reisig, M. D., Piquero, N. L., & Piquero, A. R. (2010). Low self-control and fraud: Offending, victimization, and their overlap. Criminal Justice and Behavior, 37, 188–203. doi:10.1177/0093854809354977
  • Holtfreter, K., Reisig, M. D., & Pratt, T. C. (2008). Low self-control, routine activities, and fraud victimization. Criminology, 46, 189–220. doi:10.1111/j.1745-9125.2008.00101.x
  • Holtfreter, R. E. (2006, July/August). Security breaches allow data theft: Latest debit card fraud schemes. Fraud Magazine, pp. 33–53.
  • Horrigan, J. B. (2008). Online shopping. Washington, DC: Pew Internet and American Life Project.
  • Internal Revenue Service. (2008). Beware of phishing schemes. Washington, DC: Author.
  • Javelin Strategy Research Associates. (2013). 2013 Identity fraud report. Pleasanton, CA: Author.
  • Jennings, W. G., Park, M., Tomsich, E. A., Gover, A. R., & Akers, R. L. (2011). Assessing the overlap in dating violence perpetrations and victimization among South Korean college students: The influence of social learning and self-control. American Journal of Criminal Justice, 36, 188–206. doi:10.1007/s12103-011-9110-x
  • Jennings, W. G., Piquero, A. R., & Reingle, J. M. (2012). On the overlap between victimization and offending: A review of the literature. Aggression and Violent Behavior, 17(1), 16–26. doi:10.1016/j.avb.2011.09.003
  • Kim, D., & Kim, J. H. (2013). Understanding persuasive elements in phishing emails: A categorical content and semantic network analysis. Online Information Review, 37, 835–850. doi:10.1108/OIR-03-2012-0037
  • Kochhar, M. (2013). What 5 experts say about the future of e-commerce. Retrieved from http://smallbusiness.yahoo.com/advisor/5-experts-future-e-commerce-155024006.html
  • Langton, L. (2011). Identity theft reported by households, 20052010. Washington, DC: U.S. Government Printing Office.
  • Langton, L., & Planty, M. (2010). National crime victimization survey supplement: Victims of identity theft, 2008. Washington, DC: U.S. Government Printing Office.
  • Laub, J., & Sampson, R. (2003). Shared beginnings, divergent lives: Delinquent boys to age 70. Cambridge, MA: Harvard University Press.
  • Maimon, D., & Browning, C. R. (2012). Adolescents’ violent victimization in the neighborhood. British Journal of Criminology, 52, 808–833. doi:10.1093/bjc/azs013
  • Marcus, B. (2003). An empirical examination of the construct validity of two alternative self-control measures. Educational and Psychological Measurement, 63, 674–706. doi:10.1177/0013164403251329
  • Matei, S. (2003). The Internet as magnifying glass: Marital status and on-line social ties. The Public, 10, 101–112.
  • McNally, M. M., & Newman, G. R. (Eds). (2008). Perspectives on identity theft. Crime prevention studies (Vol. 23). Monsey, NY: Criminal Justice Press.
  • Mears, D., Reisig, M. D., Scaggs, S., & Holtfreter, K. (2014). Efforts to reduce consumer fraud victimization among the elderly: The effect of information access on program awareness and contact. Crime and Delinquency. Advance online publication. doi:10.1177/0011128714555759
  • Miceli, D., & Kim, R. (2010). 2010 Identity fraud survey report: Consumer version. Pleasanton, CA: Javelin Strategy and Research.
  • Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38, 217–232. doi:10.1111/j.1745-6606.2004.tb00865.x
  • Miranda, A., & Rabe-Hesketh, S. (2006). Maximum likelihood of endogenous switching and sample selection models for binary, ordinal, and count variables. The Stata Journal, 6, 285–308.
  • Morton, H. (2013). Identity theft legislation, 2013. Denver, CO: National Conference of State Legislatures.
  • National Fraud Authority. (2013). Annual fraud indicator. London: Author.
  • Ousey, G. C., Wilcox, P., & Fisher, B. S. (2011). Something old, something new: Revisiting competing hypotheses of the victimization-offending relationship among adolescents. Journal of Quantitative Criminology, 27, 53–84. doi:10.1007/s10940-010-9099-1
  • Pew Research Center. (2012). Assessing the representativeness of public opinion surveys. Washington, DC: Author.
  • Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis. Criminology, 38, 931–964. doi:10.1111/j.1745-9125.2000.tb00911.x
  • Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and Internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47, 267–296. doi:10.1177/0022427810365903
  • Pratt, T. C., & Turanovic, J. J. (2012). Going back to the beginning: Crime as a process. In J. McGloin & L. Kennedy (Eds.), When crime appears: The role of emergence (pp. 39–52). New York, NY: Routledge.
  • Pratt, T. C., Turanovic, J. J., Fox, K. A., & Wright, K. A. (2014). Self-control and victimization: A meta-analysis. Criminology, 52, 87–116. doi:10.1111/1745-9125.12030
  • Privacy Rights Clearinghouse. (2013). Coping with identity theft: Reducing the risk of fraud. San Diego, CA: Author.
  • Reisig, M. D., & Holtfreter, K. (2013). Shopping fraud victimization among the elderly. Journal of Financial Crime, 20, 324–337. doi:10.1108/JFC-03-2013-0014
  • Reisig, M. D., & Pratt, T. C. (2011). Low self-control and imprudent behavior revisited. Deviant Behavior, 32, 589–625. doi:10.1080/01639621003800505
  • Reisig, M. D., Pratt, T. C., & Holtfreter, K. (2009). Perceived risk of internet theft victimization: Examining the effects of social vulnerability and impulsivity. Criminal Justice and Behavior, 36, 369–384. doi:10.1177/0093854808329405
  • Reyns, B. W. (2013). Online routines and identity theft victimizations: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50, 216–238. doi:10.1177/0022427811425539
  • Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2013). The unintended consequences of digital technology: Exploring the relationship between sexting and cybervictimization. Journal of Crime and Justice, 36, 1–17. doi:10.1080/0735648X.2011.641816
  • Ross, M., Grossmann, I., & Schryer, E. (2014). Contrary to psychological and popular opinion, there is no compelling evidence that older adults are disproportionately victimized by consumer fraud. Perspectives on Psychological Science, 9, 427–442. doi:10.1177/1745691614535935
  • Salthouse, T. A. (2013). Within-cohort age-related differences in cognitive functioning. Psychological Science, 24, 123–130. doi:10.1177/0956797612450893
  • Sampson, R. J. (2012). Great American city: Chicago and the enduring neighborhood effect. Chicago: University of Chicago Press.
  • Schiller, J. S., Lucas, J. W., Ward, B. W., & Peregoy, J. A. (2012). Summary health statistics for U.S. adults: National Health Interview Survey, 2010. Washington, DC: National Center for Health Statistics.
  • Schreck, C. H., Stewart, E. A., & Fisher, B. S. (2006). Self-control, victimization, and the influence on risky lifestyles: A longitudinal analysis using panel data. Journal of Quantitative Criminology, 22, 319–340. doi:10.1007/s10940-006-9014-y
  • Schreck, C. H., Wright, R. A., & Miller, J. M. (2002). A study of individual and situational antecedents of violent victimization. Justice Quarterly, 19, 159–180. doi:10.1080/07418820200095201
  • Schreck, C. J. (1999). Criminal victimization and low self-control: An extension and test of a general theory of crime. Justice Quarterly, 16, 633–654. doi:10.1080/07418829900094291
  • Stewart, E. A., Elifson, K. W., & Sterk, C. E. (2004). Integrating the general theory of crime into an explanation of violent victimization among female offenders. Justice Quarterly, 21, 159–181. doi:10.1080/07418820400095771
  • Tangney, J. P., Baumeister, R. F., & Boone, A. L. (2004). High self-control predicts good adjustment, less pathology, better grades, and interpersonal success. Journal of Personality, 72, 271–324. doi:10.1111/j.0022-3506.2004.00263.x
  • Turanovic, J. J., & Pratt, T. C. (2013). The consequences of maladaptive coping: Integrating general strain and self-control theories to specify a causal pathway between victimization and offending. Journal of Quantitative Criminology, 29, 321–345. doi:10.1007/s10940-012-9180-z
  • Turanovic, J. J., & Pratt, T. C. (2014). “Can’t stop, won’t stop”: Self-control, risky lifestyles, and repeat victimization. Journal of Quantitative Criminology, 30(1), 29–56. doi:10.1007/s10940-012-9188-4
  • United States Department of Justice. (2010). Identity related crime: A threat assessment. A report to the Attorney General of the United States and the minister of public safety of Canada. Washington, DC: Author.
  • van Wilsem, J. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8, 115–127. doi:10.1177/1477370810393156
  • van Wilsem, J. (2013). “Bought it, but never got it”: Assessing risk factors for online consumer fraud victimization. European Sociological Review, 29, 168–178. doi:10.1093/esr/jcr053
  • Van Wyk, J., & Benson, M. (1997). Fraud victimization: Risky business or just bad luck? American Journal of Criminal Justice, 21, 163–179. doi:10.1007/BF02887448
  • Vaszonyi, A. T., Machackova, H., Sevcikova, A., Smahel, D., & Cerna, A. (2012). Cyberbullying in context: Direct and indirect effects by low self-control across 25 European countries. European Journal of Developmental Psychology, 9, 210–227. doi:10.1080/17405629.2011.644919
  • Wall, D. S. (2005). The internet as a conduit for criminals. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 77–98). Thousand Oaks, CA: SAGE.
  • Ware, J. E., & Gandek, B. (1998). Overview of the SF-36 Health Survey and the International Quality of Life Assessment (IQOLA) project. Journal of Clinical Epidemiology, 51, 903–912. doi:10.1016/S0895-4356(98)00081-X
  • Washington State Office of the Attorney General. (2008). Warning signs of fraud. Olympia, WA: Author.
  • Wattanaporn, K. (2014). The effects of low self-control, unstructured socializing, and risky behavior on victimization ( Unpublished master's thesis). Arizona State University, Phoenix, AZ.
  • Wolfe, S. E. (2012). Crime in late life ( Unpublished doctoral dissertation). Arizona State University, Phoenix, AZ.
  • Wolfe, S. E. (2014). Low self-control, gender, race, and offending in late life. Psychology, Crime, & Law. Advance online publication. doi:10.1080/1068316X.2014.989169
  • Woodford, H. J., & George, J. (2007). Cognitive assessment in the elderly: A review of clinical methods. Quarterly Journal of Medicine, 100, 469–484. doi:10.1093/qjmed/hcm051
  • Zickuhr, K., & Madden, M. (2012). Older adults and Internet use. Washington, DC: Pew Internet and American Life Project.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.