2013
DOI: 10.1016/j.dss.2013.03.001
|View full text |Cite
|
Sign up to set email alerts
|

The impact of adoption of identity theft countermeasures on firm value

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(16 citation statements)
references
References 55 publications
0
16
0
Order By: Relevance
“…Wang et al (2006) have given a framework for preventing identity theft and suggest the role of stakeholders in identity theft prevention, which is only a part of prevention stage. The studies by Boyer (2007) and Bose and Leung (2013) suggest the practice of sufficient investments for a better outcome of preventive technologies but are limited to the financial aspect of a single Any action or process intended to identify and locate the suspicious or fraudulent activity before, during or after completion of any fraudulent activity is referred as detection (Wilhelm, 2004). Detection works when prevention system fails to stop any suspicious attempt.…”
Section: Insert Table IV Herementioning
confidence: 99%
See 1 more Smart Citation
“…Wang et al (2006) have given a framework for preventing identity theft and suggest the role of stakeholders in identity theft prevention, which is only a part of prevention stage. The studies by Boyer (2007) and Bose and Leung (2013) suggest the practice of sufficient investments for a better outcome of preventive technologies but are limited to the financial aspect of a single Any action or process intended to identify and locate the suspicious or fraudulent activity before, during or after completion of any fraudulent activity is referred as detection (Wilhelm, 2004). Detection works when prevention system fails to stop any suspicious attempt.…”
Section: Insert Table IV Herementioning
confidence: 99%
“…(Wang et al, 2006) Efficient prevention technologies yield more incentives for investments. (Boyer, 2007;Bose and Leung, 2013). Training is a significant practice to improve the employee performance in fraud prevention.…”
Section: Findings Referencesmentioning
confidence: 99%
“…Other research on identity management has focused on the factors influencing the adoption of identity protection practices by consumers (Lai, Li, & Hsieh, ). Prior research has also explored the impact of the adoption of identity theft measures on a firm's market value (Bose & Leung, ). A few design artifacts have also been proposed to protect online identities.…”
Section: Background Literaturementioning
confidence: 99%
“…Two of these developed models which provided little insight into SME-specific issues (Chen andWu 2013, Kauffman andMohtadi 2004). Six included only one hypothesis (Ada et al 2012, Bose and Leung 2013, Bose and Pal 2012, Kuk 2004 or research question (Zhu et al 2003) relating to company size, or controlled for firm size (Baird et al 2012), but again provided almost no SME-related insights nor examined SME-specific issues. However, we included studies which compared SMEs and large firms (e.g.…”
Section: Criteria Employed In Article Selectionmentioning
confidence: 99%