2011
DOI: 10.1108/13590791111173722
|View full text |Cite
|
Sign up to set email alerts
|

How to protect and minimize consumer risk to identity theft

Abstract: PurposeThe purpose of this paper is to present and explain the identity theft cycle. The identity theft cycle explains how a perpetrator goes through various stages of confidence and experimentation when stealing an individual's identity.Design/methodology/approachThe paper takes a conceptual approach by first describing identity theft in detail and then discussing the seriousness of identity theft for consumers today. The paper then presents and explains the identity theft cycle in greater detail including th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…A sound prevention system is an effective anti-fraud action (Prabowo, 2011). For preventing the identity theft various studies have been carried out (Albrecht et al, 2011;Alrashed, 2016;Baz et al, 2017;Copes et al, 2010;Devos and Pipan, 2009;Holt and Turner, 2012;Meinert, 2016;Prosch, 2009;Seda, 2014;Usman and Shah, 2013;Geeta, 2011), but no significant research has been found to suggest a set of comprehensive practices in identity theft prevention. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 4...…”
Section: Identity Fraud Management: An Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…A sound prevention system is an effective anti-fraud action (Prabowo, 2011). For preventing the identity theft various studies have been carried out (Albrecht et al, 2011;Alrashed, 2016;Baz et al, 2017;Copes et al, 2010;Devos and Pipan, 2009;Holt and Turner, 2012;Meinert, 2016;Prosch, 2009;Seda, 2014;Usman and Shah, 2013;Geeta, 2011), but no significant research has been found to suggest a set of comprehensive practices in identity theft prevention. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 4...…”
Section: Identity Fraud Management: An Overviewmentioning
confidence: 99%
“…(Holt and Turner, 2012;Arachchilage and Love, 2013) Customers' knowledge and awareness of identity frauds have a significant impact on the fraud deterrence. (Albrecht et al, 2011;Brody et al, 2007;Copes et al, 2010) Impact of fraud deterrence can be increased by creating the fear of being caught and punished. Similarly, the certainty of punishment on frauds has a significant impact on deterrence.…”
Section: Findings Referencesmentioning
confidence: 99%
“…In this connection, a person's reasonable expectations as to privacy may be a significant, though not necessarily conclusive, factor". 38 While the protection of secrecy of private life echoes "the right to be let alone" as advocated by Warren and Brandeis at the end of the nineteenth century 39 paving the way to the tort of intrusion upon seclusion and public disclosure of private facts, the protection of liberty of private life clearly goes further. The protection of prisoners' correspondence exemplifies it.…”
Section: Secrecy and Liberty Of Private Lifementioning
confidence: 99%
“…See [61]. 39 Warren and Brandeis. 40 case) were not able to exercise their right to the secrecy of their correspondence they still could assert and exercise the right to the liberty of their correspondence.…”
Section: Secrecy and Liberty Of Private Lifementioning
confidence: 99%
See 1 more Smart Citation