References
- Allison, S. F. H., Schuck, A. M., & Lersch, K. M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, 33(1), 19–29. https://doi.org/10.1016/J.JCRIMJUS.2004.10.007
- Anderson, M., Perrin, A., Jiang., J., & Kumar, M. (2019). 10% of Americans don’t use the internet. Who are they? Pew Research Center. Retrieved December 1, 2020, from https://www.pewresearch.org/fact-tank/2019/04/22/some-americans-dont-use-the-internet-who-are-they/
- Bossler, A. M., & Holt, T. J. (2013). Assessing officer perceptions and support for online community policing. Security Journal, 26(4), 349–366. https://doi.org/10.1057/sj.2013.23
- Broadhurst, R. (2006). Developments in the global law enforcement of cyber‐crime. Policing: An International Journal of Police Strategies & Management, 29(3), 408–433. https://doi.org/10.1108/13639510610684674
- Camille, R. (2017). Computer and internet use in the United States: 2016. American Community Survey Reports, ACS-39, U.S. Census Bureau.
- Choi, H., Park, J., & Jung, Y. (2018). The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, 81, 42–51. https://doi.org/10.1016/j.chb.2017.12.001
- Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589
- Cram, P., Fendrick, A. M., Inadomi, J., Cowen, M. E., Carpenter, D., & Vijan, S. (2003). The impact of a celebrity promotional campaign on the use of colon cancer screening: The katie couric effect. Archives of Internal Medicine, 163(13), 1601–1605. https://doi.org/10.1001/archinte.163.13.1601
- Dadkhah, M., Lagzian, M., & Borchardt, G. (2018). Identity theft in the academic world leads to junk science. Science and Engineering Ethics, 24(1), 287–290. https://doi.org/10.1007/s11948-016-9867-x
- Federal Trade Commission. (2020). Equifax data breach settlement. United States Government. Retrieved December 1, 2020, from https://www.ftc.gov/enforcement/cases-proceedings/refunds/equifax-data-breach-settlement
- Gainer, R. (1996). Allocating the risk of loss for bank card fraud on the Internet. The John Marshall Journal of Information Technology and Privacy Law, 15(1), 39–49. Retrieved October 7, 2019, from https://heinonline.org/HOL/LandingPage?handle=hein.journals/jmjcila15&div=7&id=&page=
- Golladay, K., & Holtfreter, K. (2017). The consequences of identity theft victimization: An examination of emotional and physical health outcomes. Victims & Offenders, 12(5), 741–760. https://doi.org/10.1080/15564886.2016.1177766
- Grabosky, P. (2016). The evolution of cybercrime, 2006–2016. In T. J. Holt, (Ed.), Cybercrime through an interdisciplinary lens (pp. 15–37). Routledge. https://doi.org/10.4324/9781315618456-9
- Harrell, E. (2019). Victims of identity theft, 2016. Bureau of Justice Statistics. Retrieved August 27, 2020, from https://www.bjs.gov/content/pub/pdf/vit16.pdf
- Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125. https://doi.org/10.1057/ejis.2009.6
- Hille, P., Walsh, G., & Cleveland, M. (2015). Consumer fear of online identity theft: Scale development and validation. Journal of Interactive Marketing, 30(May), 1–19. https://doi.org/10.1016/j.intmar.2014.10.001
- Holt, T. J., & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25. https://doi.org/10.1080/01639620701876577
- Holtfreter, K., Reisig, M. D., Pratt, T. C., & Holtfreter, R. E. (2015). Risky remote purchasing and identity theft victimization among older Internet users. Psychology, Crime and Law, 21(7), 681–698. https://doi.org/10.1080/1068316X.2015.1028545
- Identity Theft Resource Center. (2019). Data breaches. Retrieved October 7, 2019, from https://www.idtheftcenter.org/data-breaches/
- Kim, A. Y., & Kim, T. S. (2016). Factors influencing the intention to adopt identity theft protection services: Severity vs vulnerability. Pacific Asia Conference on information systems, PACIS 2016 - Proceedings, Chiayi, Taiwan. Retrieved October 9, 2019, from https://aisel.aisnet.org/pacis2016/68/
- Klein, C. T. F., & Helweg-Larsen, M. (2002). Perceived control and the optimistic bias: A meta-analytic review. Psychology & Health, 17(4), 437–446. https://doi.org/10.1080/0887044022000004920
- Leukfeldt, E. R. (2014). Phishing for suitable targets in the netherlands: Routine activity theory and phishing victimization. Cyberpsychology, Behavior and Social Networking, 17(8), 551–555. https://doi.org/10.1089/cyber.2014.0008
- Leukfeldt, E. R. (2015). Comparing victims of phishing and malware attacks unraveling risk factors and possibilities for situational crime prevention. In International conference on cyber security (pp. 1–7). Redlands, CA. http://arxiv.org/abs/1506.00769 Retrieved 2 December 2019
- Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263–280. https://doi.org/10.1080/01639625.2015.1012409
- Li, Y., Yazdanmehr, A., Wang, J., & Rao, H. R. (2019). Responding to identity theft: A victimization perspective. Decision Support Systems, 121(March), 13–24. https://doi.org/10.1016/j.dss.2019.04.002
- Lowry, P. B., Posey, C., Bennett, R. J., & Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust. Information Systems Journal, 25(3), 193–273. https://doi.org/10.1111/isj.12063
- Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52(1), 33–59. https://doi.org/10.1111/1745-9125.12028
- Mercuri, R. T. (2006). Scoping identity theft. Communications of the ACM, 49(5), 17–21. https://doi.org/10.1145/1125944.1125961
- Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217–232. https://doi.org/10.1111/j.1745-6606.2003.tb00459.x
- Ngo, F., & Jaishankar, K. (2017). Commemorating a decade in existence of the international journal of cyber criminology: A research agenda to advance the scholarship on cyber crime. International Journal of Cyber Criminology, 11(1), 1–9. https://doi.org/10.5281/zenodo.495762
- Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47(3), 267–296. https://doi.org/10.1177/0022427810365903
- Reisig, M. D., Pratt, T. C., & Holtfreter, K. (2009). Perceived risk of internet theft victimization: Examining the effects of social vulnerability and financial impulsivity. Criminal Justice and Behavior, 36(4), 369–384. https://doi.org/10.1177/0093854808329405
- Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238. https://doi.org/10.1177/0022427811425539
- Reyns, B. W., Fisher, B. S., Bossler, A. M., & Holt, T. J. (2019). Opportunity and self-control: Do they predict multiple forms of online victimization? American Journal of Criminal Justice, 44(1), 63–82. https://doi.org/10.1007/s12103-018-9447-5
- Reyns, B. W., & Henson, B. (2016). The thief with a thousand faces and the victim with none. International Journal of Offender Therapy and Comparative Criminology, 60(10), 1119–1139. https://doi.org/10.1177/0306624X15572861
- Roberts, L. D., Indermaur, D., & Spiranovic, C. (2013). Fear of cyber-identity theft and related fraudulent activity. Psychiatry, Psychology and Law, 20(3), 315–328. https://doi.org/10.1080/13218719.2012.672275
- Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2003). Exploring the psychological and somatic impact of identity theft. Journal of Forensic Science, 49(1), 1–6. https://doi.org/10.1520/jfs2003178
- Siponen, M., & Willison, R. (2009). Information security management standards: Problems and solutions. Information and Management, 46(5), 267–270. https://doi.org/10.1016/j.im.2008.12.007
- Spano, R., & Freilich, J. D. (2009). An assessment of the empirical validity and conceptualization of individual level multivariate studies of lifestyle/routine activities theory published from 1995 to 2005. Journal of Criminal Justice, 37(3), 305–314. https://doi.org/10.1016/j.jcrimjus.2009.04.011
- United States Government Bureau of Justice Statistics. (2019). National crime victimization survey: Identity theft supplement, 2016. https://doi.org/10.3886/ICPSR36829.v1
- Wall, D. S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183–205. https://doi.org/10.1080/15614260701377729
- Wall, D. S. (2008). Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime1. International Review of Law, Computers & Technology, 22(1–2), 45–63. https://doi.org/10.1080/13600860801924907
- Wang, W., Yuan, Y., & Archer, N. (2006). A contextual framework for combating identity theft. IEEE Security & Privacy, 4(2), 30–38. https://doi.org/10.1109/MSP.2006.31
- Whitty, M. T. (2019). Predicting susceptibility to cyber-fraud victimhood. Journal of Financial Crime, 26(1), 277–292. https://doi.org/10.1108/jfc-10-2017-0095
- Willox Jr, N. A., Gordon, G. R., Regan, T. M., Rebovich, D. J., & Gordon, J. B. (2004). Identity fraud: A critical national and global threat. Journal of Economic Crime Management, 2(1), 3–48.
- Ylang, N. (2020). Capable guardianship against identity theft: Demographic insights based on a national sample of US adults. Journal of Financial Crime, 27(1), 130–142. https://doi.org/10.1108/JFC-12-2018-0140