To see the other types of publications on this topic, follow the link: Identity theft.

Journal articles on the topic 'Identity theft'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Identity theft.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Helser, Susan, and Mark I. Hwang. "Identity Theft." International Journal of Cyber Research and Education 3, no. 1 (January 2021): 65–77. http://dx.doi.org/10.4018/ijcre.2021010107.

Full text
Abstract:
Identity theft is a serious crime growing rapidly due to the ever-tighter integration of technology into people's lives. The psychological and financial loss to individual victims is devastating, and its costs to society at large staggering. In order to better understand the problem and to combat the crime more effectively, a comprehensive review of issues related to identity theft is performed in this paper. The human element of the crime is examined, along with the exploits used by perpetrators and countermeasures that have been developed. The findings highlight areas in need of continued research and guidelines that should benefit individuals and organizations in their pursuit of potential solutions.
APA, Harvard, Vancouver, ISO, and other styles
2

Seton, Margaret. "Identity Theft." Annals of Internal Medicine 152, no. 12 (June 15, 2010): 820. http://dx.doi.org/10.7326/0003-4819-152-12-201006150-00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sadiku, Matthew N. O., Mahamadou Tembely, and Sarhan M. Musa. "Identity Theft." International Journal of Engineering Research 6, no. 9 (2017): 422. http://dx.doi.org/10.5958/2319-6890.2017.00052.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bosworth, Martin. "Identity theft." Men in Nursing 2, no. 4 (August 2007): 10–13. http://dx.doi.org/10.1097/01.min.0000284797.69465.88.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vikbladh, O. "Identity theft." Science 352, no. 6281 (March 31, 2016): 46. http://dx.doi.org/10.1126/science.aaf6089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Garber, Marjorie. "Identity theft." International Forum of Psychoanalysis 27, no. 2 (January 30, 2018): 76–81. http://dx.doi.org/10.1080/0803706x.2017.1387283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dwan, Berni. "Identity theft." Computer Fraud & Security 2004, no. 4 (April 2004): 14–17. http://dx.doi.org/10.1016/s1361-3723(04)00055-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anderson, Keith B., Erik Durbin, and Michael A. Salinger. "Identity Theft." Journal of Economic Perspectives 22, no. 2 (March 1, 2008): 171–92. http://dx.doi.org/10.1257/jep.22.2.171.

Full text
Abstract:
Identity theft is made possible by the nature of modern payment systems. In the modern economy, sellers are willing to offer goods and services to strangers in exchange for a promise to pay, provided the promise is backed up by data that link the buyer to a specific account or credit history. Identity theft involves acquiring enough data about another person to counterfeit this link, enabling the thief to acquire goods while attributing the charge to another person's account. In this article, we discuss what is (and is not) known about the prevalence and cost of identity theft, describe the institutional framework in which identity theft takes place, and consider some of the main policy issues associated with the problem.
APA, Harvard, Vancouver, ISO, and other styles
9

Domino Rudolph, Jennifer. "Identity Theft." Aztlán: A Journal of Chicano Studies 34, no. 1 (2009): 65–91. http://dx.doi.org/10.1525/azt.2009.34.1.65.

Full text
Abstract:
Released by Mattel in 2005, American Girl doll Marisol Luna quickly provoked controversy. The doll’s accompanying narrative depicts her Chicago neighborhood of Pilsen as “dangerous” and recounts her family’s move to the suburbs. Pilsen, located just south and west of downtown Chicago, has a long history as a Mexican (im)migrant port of entry. Many Latinos, particularly in Pilsen, perceive the doll and her narrative as a misrepresentation of their community that obscures the economic reality of gentrification and the displacement of poor residents of color. The resulting protest against the doll both exemplifies the contested nature of ownership of space and serves as a lens through which to examine the potential benefits and limitations of latinidad, or unity among Latinos, in Chicago and elsewhere. Marisol Luna functions as a cultural text on which Latinos, as individuals and as a group, can articulate contestatory ethnic identities and negotiate their place and relationship with each other and with the city at large.
APA, Harvard, Vancouver, ISO, and other styles
10

Sullivan, Clare. "Is identity theft really theft?" International Review of Law, Computers & Technology 23, no. 1-2 (July 2009): 77–87. http://dx.doi.org/10.1080/13600860902742596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hinde, Stephen. "Identity theft: theft, loss and giveaways." Computer Fraud & Security 2005, no. 5 (May 2005): 18–20. http://dx.doi.org/10.1016/s1361-3723(05)70215-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Fromer, Margot J. "Medical Identity Theft." Oncology Times 29, no. 2 (January 2007): 8. http://dx.doi.org/10.1097/01.cot.0000265637.51520.93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Copes, Heith, and Lynne M. Vieraitis. "Understanding Identity Theft." Criminal Justice Review 34, no. 3 (January 26, 2009): 329–49. http://dx.doi.org/10.1177/0734016808330589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

SOVERN, JEFF. "Stopping Identity Theft." Journal of Consumer Affairs 38, no. 2 (December 2004): 233–43. http://dx.doi.org/10.1111/j.1745-6606.2004.tb00866.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sanchez, Cesar. "NLR identity theft." Nature Reviews Microbiology 9, no. 3 (February 16, 2011): 149. http://dx.doi.org/10.1038/nrmicro2530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Monahan, Torin. "Identity theft vulnerability." Theoretical Criminology 13, no. 2 (May 2009): 155–76. http://dx.doi.org/10.1177/1362480609102877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Maitlo, Abdullah, Nisreen Ameen, Hamid Reza Peikari, and Mahmood Shah. "Preventing identity theft." Information Technology & People 32, no. 5 (October 7, 2019): 1184–214. http://dx.doi.org/10.1108/itp-05-2018-0255.

Full text
Abstract:
PurposeKnowledge-sharing (KS) for preventing identity theft has become a major challenge for organisations. The purpose of this paper is to fill a gap in the literature by investigating barriers to effective KS in preventing identity theft in online retail organisations.Design/methodology/approachA framework was proposed based on a reconceptualisation and extension of the KS enablers framework (Chong et al., 2011). A qualitative case study research method was used for the data collection. In total, 34 semi-structured interviews were conducted in three online retail organisations in the UK.FindingsThe findings suggest that the major barriers to effective KS for preventing identify theft in online retail organisations are: lack of leadership support; lack of employee willingness to share knowledge; lack of employee awareness of KS; inadequate learning opportunities; lack of trust in colleagues; insufficient information-sourcing opportunities and information and communications technology infrastructure; a weak KS culture; lack of feedback on performance; and lack of job rotation.Practical implicationsThe research provides solutions for removing existing barriers to KS in preventing identity theft. This is important to reduce the number of cases of identity theft in the UK.Originality/valueThis research extends knowledge of KS in a new context: preventing identity theft in online retail organisations. The proposed framework extends the KS enablers framework by identifying major barriers to KS in the context of preventing identity theft.
APA, Harvard, Vancouver, ISO, and other styles
18

Mercuri, Rebecca T. "Scoping identity theft." Communications of the ACM 49, no. 5 (May 2006): 17–21. http://dx.doi.org/10.1145/1125944.1125961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

American Optometric Association. "Medical identity theft." Optometry - Journal of the American Optometric Association 82, no. 5 (May 2011): 326–28. http://dx.doi.org/10.1016/j.optm.2011.03.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

McCarty, B. "Automated identity theft." IEEE Security & Privacy 1, no. 5 (September 2003): 89–92. http://dx.doi.org/10.1109/msecp.2003.1236244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Kirk, David. "Identifying Identity Theft." Journal of Criminal Law 78, no. 6 (December 2014): 448–50. http://dx.doi.org/10.1177/0022018314557418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Navarro, John C., and George E. Higgins. "Familial Identity Theft." American Journal of Criminal Justice 42, no. 1 (July 22, 2016): 218–30. http://dx.doi.org/10.1007/s12103-016-9357-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sproule, Susan, and Norm Archer. "Measuring identity theft and identity fraud." International Journal of Business Governance and Ethics 5, no. 1/2 (2010): 51. http://dx.doi.org/10.1504/ijbge.2010.029555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Shareef, Mahmud A., and Vinod Kumar. "Prevent/Control Identity Theft." Information Resources Management Journal 25, no. 3 (July 2012): 30–60. http://dx.doi.org/10.4018/irmj.2012070102.

Full text
Abstract:
This study provides an application framework toward measures to prevent/control identity theft in conjunction with sources. It also identifies the impact of overall protection of identity theft on consumer trust, the cost of products/services, and operational performance, all of which in turn contribute to a purchase intention using E-commerce (EC). For the first objective, this study proposes a matrix of sources and measures to prevent and control identity theft. From this matrix, using knowledge from a literature review and judgment based on plausibility, the authors identify global laws, controls placed on organizations, publications to develop awareness, technical management, managerial policy, risk management tools, data management, and control over employees are the potential measuring items to prevent identity theft related to EC. A case study in banking sector through a qualitative approach was conducted to verify the proposed relations, constructs, and measuring items. For the second objective, this research paper conceptualizes a model based on literature review and validates that based on the case study in the financial sector. The model reflects the effects of preventing and controlling identity theft on the costs of products/services, operational performance, and customers’ perception of trust, which would lead to purchase intention in EC.
APA, Harvard, Vancouver, ISO, and other styles
25

Choo, Kyung-Seok. "Book Review: Identity Theft." Criminal Justice Review 31, no. 4 (December 2006): 376–79. http://dx.doi.org/10.1177/0734016806295601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Jougleux, Philippe. "Identity theft and internet." International Journal of Liability and Scientific Enquiry 5, no. 1 (2012): 37. http://dx.doi.org/10.1504/ijlse.2012.045529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hauhart, Robert C. "Perspectives on Identity Theft." Contemporary Sociology: A Journal of Reviews 38, no. 3 (May 2009): 235–36. http://dx.doi.org/10.1177/009430610903800313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kuzmin, Yury A. "IDENTITY THEFT (CRIMINOLOGICAL ASPECT)." Oeconomia et Jus, no. 3 (September 28, 2020): 48–57. http://dx.doi.org/10.47026/2499-9636-2020-3-48-57.

Full text
Abstract:
The problem of illegal unlawful personal data obtaining is updated. The offence involves the “appropriation of identity” of another individual most commonly for the purpose of personal gain. Personal data that the perpetrator encroaches on may represent various kinds of information. The relevance of issues related to committing the most common methods of identity theft is substantiated. The urgency of the research is caused by the fact that identity theft is becoming an increasing problem around the world; criminals are in-venting more and more ways to obtain the information needed to steal personal data that they use for the purpose of committing different crimes. As a result of the perpetrators' use of personal data, the consequences for the victim can be very serious. The victim's stolen identity creates anonymity for criminals and terrorists and poses a threat to both the national security and for private individuals. The problem of preventing identity theft is to minimize the possibility of personal data stealing by lawbreakers, to prevent their illegal seizure. Here, it is important to remember elementary security and safety considerations. Various ways of preventing illegal unlawful seizure of personal data are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
29

Rouse, Anne, and David Watson. "Cyberfraud and identity theft." Monash Business Review 1, no. 2 (December 2005): 30–33. http://dx.doi.org/10.2104/mbr05018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Copes, Heith, Lynne M. Vieraitis, Stephanie M. Cardwell, and Arthur Vasquez. "Accounting for Identity Theft." Journal of Contemporary Criminal Justice 29, no. 3 (July 23, 2013): 351–68. http://dx.doi.org/10.1177/1043986213496174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kahn, Charles M., and William Roberds. "Credit and identity theft." Journal of Monetary Economics 55, no. 2 (March 2008): 251–64. http://dx.doi.org/10.1016/j.jmoneco.2007.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hinde, Stephen. "Identity theft: the fight." Computer Fraud & Security 2004, no. 9 (September 2004): 6–7. http://dx.doi.org/10.1016/s1361-3723(04)00110-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hinde, Steven. "Identity theft & fraud." Computer Fraud & Security 2005, no. 6 (June 2005): 18–20. http://dx.doi.org/10.1016/s1361-3723(05)70223-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ciechanowicz, Chez. "Identity Theft and Reconstruction." Information Security Technical Report 15, no. 2 (May 2010): 41. http://dx.doi.org/10.1016/j.istr.2010.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Merrell, Ronald C., and Charles R. Doarn. "Identity Theft, a Reprise." Telemedicine and e-Health 23, no. 8 (August 2017): 619–20. http://dx.doi.org/10.1089/tmj.2017.29010.crd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

McKee, G. "Biometric identity theft [Letters]." Computer 33, no. 5 (May 2000): 5–10. http://dx.doi.org/10.1109/mc.2000.841773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Agrawal, Shantanu, and Peter Budetti. "Physician Medical Identity Theft." JAMA 307, no. 5 (February 1, 2012): 459. http://dx.doi.org/10.1001/jama.2012.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Gupta, Chander Mohan, and Devesh Kumar. "Identity theft: a small step towards big financial crimes." Journal of Financial Crime 27, no. 3 (May 1, 2020): 897–910. http://dx.doi.org/10.1108/jfc-01-2020-0014.

Full text
Abstract:
Purpose This paper aims to study the concept of identity fraud and how these identity thefts can actually lead to financial crime. These crimes which usually were done in the traditional way now have taken leaps with the increase in the use of cyber world. Design/methodology/approach Several research papers, articles and newsfeeds were referred to study the concept, growth, scope, effect and impact of identity theft. It was also found that identity theft is the most common type of cybercrimes. Findings Identity theft though a simple crime but if not taken care of can lead to multiple crimes which can affect not only individuals but also companies. And when these crimes impact companies, they can actually hamper the economy as a whole. Practical implications Information for the same is not available very easily, so the study is solely based on secondary data. Social implications Identity theft effects an individual not only financially but also mentally and socially; thus, these effect each and every one in the said economy. Originality/value This paper is an original work of the authors, and it is for the use of students, educators and academicians.
APA, Harvard, Vancouver, ISO, and other styles
39

Koops, Bert-Jaap, and Ronald Leenes. "Identity theft, identity fraud and/or identity-related crime." Datenschutz und Datensicherheit - DuD 30, no. 9 (September 2006): 553–56. http://dx.doi.org/10.1007/s11623-006-0141-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ylang, Norah. "Capable guardianship against identity theft." Journal of Financial Crime 27, no. 1 (January 2, 2020): 130–42. http://dx.doi.org/10.1108/jfc-12-2018-0140.

Full text
Abstract:
Purpose This paper aims to examine demographic differences between individuals who do not take measures to protect themselves from identity theft victimization and those who do. A majority of the research on identity theft has focused on predictors of victimization, reporting behaviors of the victims and their health and mental outcomes. However, little remains known about the individuals who choose to take any identity-theft measures despite concerns over this fast-growing breed of crime. Design/methodology/approach Guided by Felson and Cohen’s routine activities theoretical framework (1979), this study uses the 2014 Identity Theft Supplement of the National Crime Victimization Survey to identify the demographic characteristics that influence the use of self-protection measures among individuals in the general population. Findings This study finds that these individuals are much more likely to be white, older, female and highly educated. The decision to undertake protection against identity theft is also influenced by the following factors: prior experience of misuse, possession of a bank account in the prior 12 months, current possession of at least one credit card and awareness that one is entitled to a free copy of one’s credit report. Originality/value This study addresses the gap in scholarship on identity theft prevention by applying the concept of guardianship in Cohen and Felson’s routine activity theory (1979) to the usage of self-protection measures in a general population. Future findings will identify the areas which agencies and researchers can focus on to inform policies that foster individuals’ own initiatives to take self-protection measures against potential identity theft.
APA, Harvard, Vancouver, ISO, and other styles
41

Clarke, Tim. "A Civil War Identity Theft?" Military Medicine 181, no. 9 (September 2016): 1161–62. http://dx.doi.org/10.7205/milmed-d-16-00206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Moir, Iain, and George R. S. Weir. "Contact centres and identity theft." International Journal of Electronic Security and Digital Forensics 2, no. 1 (2009): 92. http://dx.doi.org/10.1504/ijesdf.2009.023879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Romanow, Kate. "Private Practice and Identity Theft." ASHA Leader 14, no. 9 (July 2009): 3. http://dx.doi.org/10.1044/leader.ipp.14092009.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Roberds, William, and Stacey L. Schreft. "Data breaches and identity theft." Journal of Monetary Economics 56, no. 7 (October 2009): 918–29. http://dx.doi.org/10.1016/j.jmoneco.2009.09.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Marcum, Catherine D., George E. Higgins, and Alexandria Mackinnon. "Identity theft reports of adolescents." Journal of Financial Crime 23, no. 4 (October 3, 2016): 965–73. http://dx.doi.org/10.1108/jfc-07-2015-0038.

Full text
Abstract:
Purpose The purpose of this paper was to explore the identity theft victimization experiences of high school students, as well as the predictors of it being reported to school counselors. Design/methodology/approach In July and August 2014, an online survey was sent to every registered member of the American School Counselor’s Association (ASCA). School counselors were questioned about their experiences in regarding online victimization of their students. Findings Results of this analysis revealed extremely interesting predictors of school counselor demographics related to the number of reports filed by students. Research limitations/implications There was a small response rate because the survey was sent to all registered members of the ASCA, instead of a specific targeted group (which would have been more appropriate). Practical implications The results indicate a need for further resources and training dedicated to school counselors to manage identity theft victimization of students. Originality/value As far as the authors are aware, no other study of this kind has previously been performed. In addition, there is little known about identity theft victimization of adolescents.
APA, Harvard, Vancouver, ISO, and other styles
46

Mahmud, Rifqi. "PENCURIAN IDENTITAS KATEGORI & KASUS." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 38–42. http://dx.doi.org/10.14421/csecurity.2019.2.1.1421.

Full text
Abstract:
Identity is a characteristic or sign that is unique and inherent in an individual and has its own valuable value in the form of information contained in it. The importance of the information contained in one's identity makes identity theft something to be wary of where losses can be in the form of finance, property, reputation and even emotional loss can also be caused by theft of identity theft. Some categories of identity theft that often occur are criminal identity theft, theft identity, identity cloning, medical identity theft, child identity theft.
APA, Harvard, Vancouver, ISO, and other styles
47

Bhardwaj, Axat. "Blockchain based Digital Storage System." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 20, 2021): 1893–95. http://dx.doi.org/10.22214/ijraset.2021.36781.

Full text
Abstract:
The ideа is tо соnstruсt а рlаtfоrm whiсh аllоw the рeорle tо stоre their legаl identifiсаtiоns withоut the feаr оf identifiсаtiоn theft. The рeорle using this рlаtfоrm will hаve соmрlete соntrоl оn the infоrmаtiоn they wаnt tо shаre оr nоt. Identity theft is the deliberаte use оf sоmeоne else's identity, usuаlly аs а methоd tо gаin а finаnсiаl аdvаntаge оr оbtаin сredit аnd оther benefits in the оther рersоn's nаme, аnd рerhарs tо the оther рersоn's disаdvаntаge оr lоss. The рersоn whоse identity hаs been аssumed mаy suffer аdverse соnsequenсes, esрeсiаlly if they аre held resроnsible fоr the рerрetrаtоr's асtiоns. Identity theft оссurs when sоmeоne uses аnоther's рersоnаlly identifying infоrmаtiоn, like their nаme, identifying number, оr сredit саrd number, withоut their рermissiоn, tо соmmit frаud оr оther сrimes. Identity thefts hаve inсreаsed exроnentiаlly in this erа оf digitаlizаtiоn. Using this рlаtfоrm, nоt оnly the рeорle will hаve best in сlаss рrоteсtiоn but аlsо full аuthоrity оn whаt infоrmаtiоn shоuld be shаred аnd оn whiсh рlаtfоrm.
APA, Harvard, Vancouver, ISO, and other styles
48

Bisogni, Fabio, and Hadi Asghari. "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws." Journal of Information Policy 10, no. 1 (May 1, 2020): 45–82. http://dx.doi.org/10.5325/jinfopoli.10.1.0045.

Full text
Abstract:
Abstract This article investigates the relationship between data breaches and identity theft, including the impact of Data Breach Notification Laws (DBNL) on these incidents (using empirical data and Bayesian modeling). We collected incident data on breaches and identity thefts over a 13-year timespan (2005–2017) in the United States. Our analysis shows that the correlation is driven by the size of a state. Enacting a DBNL still slightly reduces rates of identity theft; while publishing breaches notifications by Attorney Generals helps the broader security community learning about them. We conclude with an in-depth discussion on what the European Union can learn from the US experience.
APA, Harvard, Vancouver, ISO, and other styles
49

Rahman, Kazi Rubaiyat Shahriar, Omar Faruq, Md Toufiqur Rahman, Md Rafiujjaman Sumon, Md Atikur Rahman, Abu Sazzad Mohammad Parvez, Narayan Chandra Nath, and Tareq Ahmed Sohel. "Adoption of identity theft protection services in social media: A PMT investigation." Sustainable Engineering and Innovation 6, no. 1 (May 15, 2024): 87–102. http://dx.doi.org/10.37868/sei.v6i1.id248.

Full text
Abstract:
In the last few years, social media has become a part of our lives. It is not a website anymore. It offers us blogging, watching videos, and connecting with more people. In our social media profiles, we create our virtual identity. We share every piece of information connected to our lives. Social media has become a very important part of our lives. Social media changes itself tremendously; it also makes it possible for criminals to take their work to another level. Many crimes happen on social media. One of them is identity theft. As we create our own identities on social media. There is a high risk of identity theft. For this reason, many identity theft protection services have been created. With identity theft protection, we are able to protect our identities on social media. Those identity theft production services are my best product because they help us identify identity threats and get rid of them. They give us protection from identity theft in exchange for some monthly fees. But those services are not common in our nation. We don't know if those services will work in our country or not. With this thesis, we will be able to find out the adoption intention of social media identity theft protection services in our country through PMT investigations.
APA, Harvard, Vancouver, ISO, and other styles
50

DeLiema, Marguerite, Lynn Langton, and David Burnes. "Identity Theft Among Older Adults: Risk and Protective Factors." Innovation in Aging 4, Supplement_1 (December 1, 2020): 31. http://dx.doi.org/10.1093/geroni/igaa057.100.

Full text
Abstract:
Abstract Although financial exploitation and fraud targeting older adults have been the focus of increasing academic attention, research on identity theft among older adults is virtually nonexistent. Identity theft refers to an intentional, unauthorized transfer or use of a person’s identifying information for unlawful purposes (Federal Trade Commission 1998). Society’s growing reliance on technology to transfer and store private information has created increased opportunities for financial predators to access and misuse personal data. Results from the most recent Bureau of Justice Statistics’ Identity Theft Supplement show that nearly 1 in 10 adults aged 65 or older experienced identity theft in the past year, with financial losses totaling $2.5 billion. Given the high frequency and cost of identity theft among older Americans, more research is needed to guide prevention efforts and interventions that support recovery. This paper examines the risk factors, protective factors, costs, and consequences of identity theft victimization among older adults, focusing on differences between those aged 65-74 and those 75 or older. Findings suggest that the prevalence of identity theft is lower among those 75 or older (6.6% versus 10.3%), but those 75 or older experienced higher average losses per identity theft incident ($155 vs $96). Compared to those aged 65-74, a lower percentage of adults aged 75 or older engaged in online shopping, thereby reducing their risk of identity exposure (48% versus 24%). However, they were also less likely to engage in protective behaviors such as checking credit reports, changing passwords, checking account statements, and using security software.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography