2012
DOI: 10.1080/01639625.2011.584050
|View full text |Cite
|
Sign up to set email alerts
|

Examining Risks and Protective Factors of On-Line Identity Theft

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

4
40
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(50 citation statements)
references
References 22 publications
4
40
1
Order By: Relevance
“…The opposite scenario is also possible, because PIUs may report victimization incidents when something unrelated to crime such as software bugs or the unintentional deletion of important files occurs. To overcome this issue, we assessed perceived cybervictimization events rather than objective accounts of the concept, a strategy with antecedents in the cyber-victimization literature (Holt & Turner, 2012). This approach has the additional advantage of fitting better with the HBM construct in that perceived incidents of victimization, as opposed to those that actually happened or went by unnoticed, are the cognitive or subjective factor that theoretically could prompt PIUs to adopt preventive behaviors.…”
Section: Previous Malware Cyber-victimization Experiencementioning
confidence: 99%
See 1 more Smart Citation
“…The opposite scenario is also possible, because PIUs may report victimization incidents when something unrelated to crime such as software bugs or the unintentional deletion of important files occurs. To overcome this issue, we assessed perceived cybervictimization events rather than objective accounts of the concept, a strategy with antecedents in the cyber-victimization literature (Holt & Turner, 2012). This approach has the additional advantage of fitting better with the HBM construct in that perceived incidents of victimization, as opposed to those that actually happened or went by unnoticed, are the cognitive or subjective factor that theoretically could prompt PIUs to adopt preventive behaviors.…”
Section: Previous Malware Cyber-victimization Experiencementioning
confidence: 99%
“…We measured credit card incidents (if they had ever had someone use their credit card or personal information without their consent), use of a personal account to send a message to an acquaintance without consent, creation of a false public account in the user's name, and the slowdown of one's devices or information lost due to a computer virus (see Holt & Turner, 2012 for a similar approach with questions related to malware infections). The response categories were trichotomic ("yes in the last year," "yes but not in the last year," and "no"), but due to the low prevalence of perceived incidents, the answers were first dichotomized, then added in a simple summation index, and finally converted again into a dichotomic variable that has a value of 1 if ever victimized or 0 if never.…”
Section: Previous Malware Cyber-victimization Experiencementioning
confidence: 99%
“…Application of RAT to explain victimization in cyberspace has been the most commonly taken approach (see Bossler and Holt, 2009;Choi, 2008;Holt and Bossler, 2013;Holt and Turner, 2012;Ngo and Paternoster, 2011;Pratt et al, 2010;Reyns, 2013), although some researchers disagree with respect to the use of this theoretical approach in researching cybercrime. Reyns (2013) has used a subsample of 5985 respondents from the 2008 to 2009 British Crime Survey (BCS) and analyzed online routines and identity theft victimization.…”
Section: Routine Online Activitiesmentioning
confidence: 98%
“…Identity theft is an example and it has been one of the most significant and fastest growing problems of the last twenty years (Holt and Turner, 2012;Biegelman, 2009). The Federal Trade Commission (FTC) of the United States indicated that 290,056 cases of identity theft complaints were received in 2.…”
Section: Introductionmentioning
confidence: 99%
“…Internet communication plays a great role in bringing individuals, communities and organizations closer together through information sharing. However there is also an increasing risk of information theft and piracy [1,2] . The transmission of secret information can be achieved through two technics: Cryptography and Steganography [3].…”
Section: Introductionmentioning
confidence: 99%