References
- Brand, S., & Price, R. (2000). The economic and social costs of crime. Home Office.
- Center for Victim Research. (2019). Research brief: Identity theft and fraud. Office of Victim Services, U.S. Department of Justice. https://ncvc.dspacedirect.org/bitstream/item/1228/CVR%20Research%20Syntheses_Identity%20Theft%20and%20Fraud_Brief.pdf
- Chen, H., Beaudoin, C. E., & Hong, T. (2017). Securing online privacy: An empirical test on internet scam victimization, online privacy concerns, and privacy protection behaviors. Computers in Human Behavior, 70, 291–302. https://doi.org/10.1016/j.chb.2017.01.003
- Cohen, M. A. (2005). The costs of crime and justice. Routledge.
- Cohen, M. A. (2016). The costs of white-collar crime. In S. R. Van Slyke, M. L. Benson, & F. T. Cullen (Eds.), The Oxford handbook of white-collar crime (pp. 78–98). Oxford University Press.
- Copes, H., Kerley, K. R., Huff, R., & Kane, J. (2010). Differentiating identity theft: An exploratory study of victims using a national victimization survey. Journal of Criminal Justice, 38(5), 1045–1052. https://doi.org/10.1016/j.jcrimjus.2010.07.007
- Copes, H., & Vieraitis, L. M. (2012). Identity thieves: Motives and methods. Northeastern University Press.
- Creswell, J. W. (2017). Qualitative inquiry and research design: Choosing among five approaches. Sage Publications.
- Gies, S., Healy, E., Green, B., & Bobnis, A. (2020). From villain to victim: The impact of safe harbor laws on minors involved in commercial sexual exploitation. Criminology & Public Policy, 19(2), 73–95. https://doi.org/10.1111/1745-9133.12497
- Gies, S. V., Piquero, N. L., Piquero, A. R., Green, B., & Bobnis, A. (2020). Wild, wild theft: Identity crimes in the digital frontier. Criminal Justice Policy Review, 1–26. https://doi.org/10.1177%2F0887403420949650
- Gilbert, J., & Archer, N. (2012). Consumer identity theft prevention and identity fraud detection behaviors. Journal of Financial Crime, 19(1), 20–36. https://doi.org/10.1111/j.1745-6606.2009.01148.x
- Golladay, K., & Holtfreter, K. (2017). The consequences of identity theft victimization: An examination of emotional and physical health outcomes. Victims & Offenders, 12(5), 741–760. https://doi.org/10.1080/15564886.2016.1177766
- Green, B., Gies, S., Bobnis, A., Piquero, N., Piquero, A., Velasquez, E. (2020). Exploring identity-based crime victimizations: Assessing threats and victim services among a sample of professionals. Deviant Behavior, 1–20. https://doi.org/10.1080/01639625.2020.1720938
- Harrell, E. (2019). Victims of identity theft, 2016, Bulletin. United States Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. https://www.bjs.gov/content/pub/pdf/vit16.pdf
- Harrell, E., & Langton, L. (2013). Victims of identity theft, 2012, bulletin. United States Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. https://www.bjs.gov/content/pub/pdf/vit12.pd
- Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40. https://doi.org/10.1080/01639625.2013.822209
- Holtfreter, K., Van Slyke, S., & Bloomberg, T. G. (2005). Sociolegal changes in consumer fraud: From victim-offender interactions to global networks. Crime, Law, and Social Change, 44(3), 251–275. https://doi.org/10.1007/s10611-006-9006-8
- Identity Theft Resource Center. (2020). 2019 end-of-year data breach report. https://www.idtheftcenter.org/2019-databreaches/?utm_source=pressrelease&utm_medium=web&utm_campaign=Jan20_2019DataBreachReport
- Lai, F., Li, D., & Hsieh, C. T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52(2), 353–363. https://doi.org/10.1016/j.dss.2011.09.002
- Milne, G. R. (2003). How well do consumers protect themselves from identity theft? Journal of Consumer Affairs, 37(2), 388–402. https://doi.org/10.1111/j.1745-6606.2003.tb00459.x
- Milne, G. R., Labrecque, L. I., & Cromer, C. (2009). Toward and understanding of the online consumer’s risky behavior and protection practices. Journal of Consumer Affairs, 43(2), 449–473. https://doi.org/10.1111/j.1745-6606.2009.01148.x
- Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217–232. https://doi.org/10.1111/j.1745-6606.2004.tb00865
- Nagin, D. S. (2013). Deterrence in the twenty-first century. Crime and Justice, 42(1), 199–263. https://doi.org/10.1086/670398
- Payne, D., & Kennett-Hensel, P. A. (2017). Combatting identity theft: A proposed ethical policy statement and best practices. Business and Society Review, 122(3), 393–420. https://doi.org/10.1111/basr.2017.122.issue-3
- Piquero, A. R., Paternoster, R., Pogarsky, G., & Loughran, T. (2011). Elaborating the individual difference component in deterrence theory. Annual Review of Law and Social Science, 7(1), 335–360. https://doi.org/10.1146/annurev-lawsocsci-102510-105404
- Piquero, N. L. (2018). White-collar crime is crime: Victims hurt just the same. Criminology & Public Policy, 17(3), 595–600. https://doi.org/10.1111/capp.2018.17.issue-3
- Rebovich, D. (2009). Examining identity theft: Empirical explorations of the offense and the offender. Victims & Offenders, 4(4), 357–364. https://doi.org/10.1080/15564880903260603
- Reyns, B. W., Fisher, B. S., Bossler, A. M., & Holt, T. J. (2019). Opportunity and self-control: Do they predict multiple forms of online victimization? American Journal of Criminal Justice, 44(1), 63–82. https://doi.org/10.1007/s12103-018-9447-5
- Reyns, B. W., & Randa, R. (2017). Victim reporting behaviors following identity theft victimization: Results from the national crime victimization survey. Crime & Delinquency, 63(7), 814–838. https://doi.org/10.1177/0011128715620428
- Ricci, J., Breitinger, F., & Baggili, I. (2019). Survey results on adults and cybersecurity education. Education and Information Technologies, 24(1), 231–249. https://doi.org/10.1007/s10639-018-9765-8
- Solove, D. J., & Citron, D. K. (2018). Risk and anxiety: A theory of data-breach harms. Texas Law Review, 96(4), 737–786. https://texaslawreview.org/wp-content/uploads/2018/03/Solove.pdf
- Sullivan, C. L. (2009). Is identity theft really theft? International Review of Law, Computers & Technology, 23(1–2), 77–87. https://doi.org/10.1080/13600860902742596
- Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890–911. https://doi.org/10.1080/07418825.2014.994658
- Tedder, K., & Buzzard, J. (2020). Javelin 2020 identity fraud study: Genesis of the identity fraud crisis. Javelin, Inc. https://www.javelinstrategy.com/coverage-area/2020-identity-fraud-study-genesis-identity-fraud-crisis
- Vieraitis, L. M., Copes, H., Powell, Z. A., & Pike, A. (2015). A little information goes a long way: Expertise and identity theft. Aggression and Violent Behavior, 20, 10–18. https://doi.org/10.1016/j.avb.2014.12.008
- Wyre, M., Lacey, D., & Allan, K. (2020). The identity theft response system. Trends and Issues in Crime and Criminal Justice, 592, 1–18. https://www.aic.gov.au/sites/default/files/2020-05/ti592_the_identity_theft_response_system.pdf
- Zou, Y., Roundy, K., Tamersoy, A., Shintre, S., Roturier, J., & Schaub, F. (2020). Examining the adoption and abandonment of security, privacy, and identity theft protection practices. CHI, Honolulu. https://yixinzou.github.io/publications/chi2020-zou.pdf