References
- Allison, S. F., Schuck, A. M., & Lersch, K. M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, 33(1), 19–29. https://doi.org/10.1016/j.jcrimjus.2004.10.007
- Anderson, K. B., Durbin, E., & Salinger, M. A. (2008). Identity theft. Journal of Economic Perspectives, 22(2), 171–192. https://doi.org/10.1257/jep.22.2.171
- Bose, I., & Leung, A. C. (2019). Adoption of identity theft countermeasures and its short- and long-term impact on firm value. MIS Quarterly, 43(1), 313–327. https://doi.org/10.25300/MISQ
- Breitinger, F., Ricci, J., & Baggili, I. (2019). Survey results on adults and cybersecurity education. Education and Information Technologies,24, 231–249. https://doi.org/10.1007/s10639-018-9765-8
- Button, M., Tapley, J., & Lewis, C. (2012). The ‘fraud justice network’ and the infrastructure of support for individual fraud victims in England and Wales. Australian and New Zealand Journal of Criminology, 47(3), 391–408. https://doi.org/10.1177/0004865814521224
- Center for Victim Research (CVR). (2019). Research brief: Identity theft and fraud. Office of Justice Programs. https://ncvc.dspacedirect.org/bitstream/item/1228/CVR%20Research%20Syntheses_Identity%20Theft%20and%20Fraud_Brief.pdf
- Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291–302. https://doi.org/10.1016/j.chb.2017.01.003
- Copes, H., Kerley, K. R., Huff, R., & Kane, J. (2010). Differentiating identity theft: An exploratory study of victims using a national victimization survey. Journal of Criminal Justice, 38(5), 1045–1052. https://doi.org/10.1016/j.jcrimjus.2010.07.007
- Creswell, J. W. (2013). Qualitative inquiry and research design. SAGE Publications, Inc.
- Cross, C., Richards, K., & Smith, R. G. (2016). The reporting experiences and support needs of victims of online fraud. Trends & Issues in Crime and Criminal Justice, 518, 1–14. https://eprints.qut.edu.au/98343/
- Experian. (2019). Power opportunities: Experian annual report.
- Federal Trade Commission. (2019). Consumer sentinel network: Data book 2018. https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-2018/consumer_sentinel_network_data_book_2018_0.pdf
- Golladay, K., & Holtfreter, K. (2017). The consequences of identity theft victimization: An examination of emotional and physical health outcomes. Victims & Offenders, 12(5), 741–760. https://doi.org/10.1080/15564886.2016.1177766
- Harrell, E. (2019). Victims of identity theft, 2016, Bulletin. United States Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. https://www.bjs.gov/content/pub/pdf/vit16.pdf
- Harrell, E., & Langton, L. (2013). Victims of Identity Theft, 2012, Bulletin. United States Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. https://www.bjs.gov/content/pub/pdf/vit12.pdf
- Harrell, E., & Langton, L. (2019). Victims of Identity Theft, 2016, Bulletin. United States Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. https://www.bjs.gov/content/pub/pdf/vit16.pdf
- Healthcare Information and Management System Society. (2012). Creating a trusted environment: Reducing the threat of medical identity theft. HIMSS Privacy & Security Task Force.
- Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40. https://doi.org/10.1080/01639625.2013.822209
- Holtfreter, K., Van Slyke, S., & Bloomberg, T. G. (2005). Sociolegal change in consumer fraud: From victim-offender interactions to global networks. Crime, Law and Social Change, 44(3), 251–275. https://doi.org/10.1007/s10611-006-9006-8
- Identity Theft Resource Center. (2018). 2017 Annual data breach year-end review.
- Identity Theft Resource Center (ITRC). (2018). Identity theft: The Aftermath 2018. ITRC. https://www.idtheftcenter.org/wp-content/uploads/2018/09/ITRC_Aftermath-2018_Web_FINAL.pdf
- Lai, F., Li, D., & Hsieh, C. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52(2), 353–363. https://doi.org/10.1016/j.dss.2011.09.002
- Li, Y., Yazdanmehr, A., Wang, J., & Rao, H. R. (2019). Responding to identity theft: A victimization perspective. Decision Support Systems, 121, 13–24. https://doi.org/10.1016/j.dss.2019.04.002
- Martin, N., Rice, J., & Martin, R. (2016). Expectations of privacy and trust: Examining the views of IT professionals. Behavior & Information Technology, 35(6), 500–510. https://doi.org/10.1080/0144929X.2015.1066444
- McCart, M. R., Smith, D. N., & Sawyer, G. K. (2010). Help seeking among victims of crime: A review of the empirical literature. Journal of Traumatic Stress, 23(2), 198–206. https://doi.org/10.1002/jts.20509
- Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217–232. https://doi.org/10.1111/j.1745-6606.2004.tb00865.x
- National Academies of Sciences, Engineering, and Medicine. (2016). Modernizing crime statistics—Report I: Defining and classifying crime. The National Academies Press.
- Office of Community Oriented Policing Services. (2006). A national strategy to combat identity theft. U.S. Department of Justice.
- Payne, D., & Kennett-Hensel, P. A. (2017). Combatting identity theft: A proposed ethical policy statement and best practices. Business and Society Review, 122(3), 393–420. https://doi.org/10.1111/basr.2017.122.issue-3
- Piquero, N. L. (2018). White-collar crime is crime: Victims hurt just the same. Criminology & Public Policy, 17(3), 595–600. https://doi.org/10.1111/capp.2018.17.issue-3
- Pratt, T. C., Holtfreter, & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296. https://doi.org/10.1177/0022427810365903
- Rebovich, D. J. (2009). Examining identity theft: Empirical explorations of the offense and the offender. Victims & Offenders, 4(4), 357–364. https://doi.org/10.1080/15564880903260603
- Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238. https://doi.org/10.1177/0022427811425539
- Reyns, B. W., Fisher, B. S., Bossler, A. M., & Holt, T. J. (2019). Opportunity and self-control: Do they predict multiple forms of online victimization? American Journal of Criminal Justice, 44(1), 63–82. https://doi.org/10.1007/s12103-018-9447-5
- Reyns, B. W., & Randa, R. (2017). Victim reporting behaviors following identity theft victimization: Results from the national crime victimization survey. Crime & Delinquency, 63(7), 814–838. https://doi.org/10.1177/0011128715620428
- Richards, K. M., & Cross, C. A. (2018). Online fraud victims’ experience of participating on qualitative interviews. Criminal Justice Studies, 31(1), 95–111. https://doi.org/10.1080/1478601X.2017.1396217
- Schoepfer, A., & Piquero, N. L. (2009). Studying the correlates of fraud victimization and reporting. Journal of Criminal Justice, 37(2), 209–215. https://doi.org/10.1016/j.jcrimjus.2009.02.003
- Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences, 49(1), 131–6. https://www.ncbi.nlm.nih.gov/pubmed/14979359
- Smith, R. G. (2010). Identity theft and fraud. In (Y. Jewkes & M. Yar, Eds.), Handbook of Internet Crime (pp. 273-301). Willan Publishing: Devon, UK.
- Solove, D. J., & Citron, D. K. (2018). Risk and anxiety: A theory of data-breach harms. Texas Law Review, 96, 737–786. https://texaslawreview.org/wp-content/uploads/2018/03/Solove.pdf
- Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890–911. https://doi.org/10.1080/07418825.2014.994658
- Victims initiative for counselling, advocacy, and restoration (VICARS) of the southwest. (2007). Action plan for victims of identity theft. Texas Legal Services Center.
- Walsh, M. E., & Schram, D. D. 1980. Victim of white-collar crime: Accuser or accused? Research Report. Sage Publications, Inc.
- Xie, M., & Baumer, E. P. (2019). Crime victims’ decisions to call the police: Past research and new directions. Annual Review of Criminology, 2(1), 217–240. https://doi.org/10.1146/annurev-criminol-011518-024748