-
1
-
-
11344287619
-
Exploring the crime of identity theft: prevalence, clearance rates, and victim/offender characteristics
-
Allison S., Schuck A., Lersch K.M. Exploring the crime of identity theft: prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice 2005, 33:19-29.
-
(2005)
Journal of Criminal Justice
, vol.33
, pp. 19-29
-
-
Allison, S.1
Schuck, A.2
Lersch, K.M.3
-
2
-
-
33845275228
-
Who are the victims of identity theft? The effect of demographics
-
Anderson K.B. Who are the victims of identity theft? The effect of demographics. Journal of Public Policy and Marketing 2006, 25:160-171.
-
(2006)
Journal of Public Policy and Marketing
, vol.25
, pp. 160-171
-
-
Anderson, K.B.1
-
4
-
-
77953123853
-
The effect of self-control on victimization in the cyberworld
-
Bossler A.M., Holt T.J. The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice 2010, 38:227-236.
-
(2010)
Journal of Criminal Justice
, vol.38
, pp. 227-236
-
-
Bossler, A.M.1
Holt, T.J.2
-
9
-
-
53549085855
-
Don't be low hanging fruit: identity theft as moral panic
-
Routledge, London, T. Monahan (Ed.)
-
Cole S.A., Pontell H. Don't be low hanging fruit: identity theft as moral panic. Surveillance and security 2006, 125-147. Routledge, London. T. Monahan (Ed.).
-
(2006)
Surveillance and security
, pp. 125-147
-
-
Cole, S.A.1
Pontell, H.2
-
10
-
-
0345772774
-
Reporting behavior of fraud victims and Black's theory of law: An empirical assessment
-
Copes H., Kerley K., Mason K., Van Wyk J. Reporting behavior of fraud victims and Black's theory of law: An empirical assessment. Justice Quarterly 2001, 18:343-363.
-
(2001)
Justice Quarterly
, vol.18
, pp. 343-363
-
-
Copes, H.1
Kerley, K.2
Mason, K.3
Van Wyk, J.4
-
11
-
-
85044911536
-
Bounded rationality of identity thieves: Using offender-based research to inform policy
-
Copes H., Vieraitis L. Bounded rationality of identity thieves: Using offender-based research to inform policy. Criminology and Public Policy 2009, 8:237-262.
-
(2009)
Criminology and Public Policy
, vol.8
, pp. 237-262
-
-
Copes, H.1
Vieraitis, L.2
-
12
-
-
70349275531
-
Understanding identity theft: Offenders' accounts of their lives and crimes
-
Copes H., Vieraitis L. Understanding identity theft: Offenders' accounts of their lives and crimes. Criminal Justice Review 2009, 34:329-349.
-
(2009)
Criminal Justice Review
, vol.34
, pp. 329-349
-
-
Copes, H.1
Vieraitis, L.2
-
13
-
-
36049048916
-
Bridging the gap between research and practice: How neutralization theory can inform Reid Interrogations of identity thieves
-
Copes H., Vieraitis L., Jochum J.M. Bridging the gap between research and practice: How neutralization theory can inform Reid Interrogations of identity thieves. Journal of Criminal Justice Education 2007, 18:444-459.
-
(2007)
Journal of Criminal Justice Education
, vol.18
, pp. 444-459
-
-
Copes, H.1
Vieraitis, L.2
Jochum, J.M.3
-
15
-
-
77957020454
-
-
Federal Trade Commission. (2004). National and state trends in fraud and identity theft: January-December 2003. Retrieved on May 13, 2010, from
-
Federal Trade Commission. (2004). National and state trends in fraud and identity theft: January-December 2003. Retrieved on May 13, 2010, from http://www.ftc.gov/.
-
(2003)
-
-
-
16
-
-
77957019923
-
-
Federal Trade Commission. (2007). National and state trends in fraud and identity theft: January-December 2006. Retrieved on May 13, 2010, from
-
Federal Trade Commission. (2007). National and state trends in fraud and identity theft: January-December 2006. Retrieved on May 13, 2010, from http://www.ftc.gov/.
-
(2007)
-
-
-
17
-
-
77957019952
-
-
Identity fraud trends and patterns: Building a data-based foundation for proactive enforcement. Center for Identity Management and Information Protection. Retrieved on May 13, 2010, from
-
Gordon, G. R., Rebovich, D., Choo, K., & Gordon, J. B. (2007). Identity fraud trends and patterns: Building a data-based foundation for proactive enforcement. Center for Identity Management and Information Protection. Retrieved on May 13, 2010, from http://www.utica.edu/academic/institutes/cimip/publications/index.cfm.
-
(2007)
-
-
Gordon, G.R.1
Rebovich, D.2
Choo, K.3
Gordon, J.B.4
-
18
-
-
0009358972
-
A consideration of telescoping and memory decay biases in victimization surveys
-
Gottfredson M.R., Hirschi T. A consideration of telescoping and memory decay biases in victimization surveys. Journal of Criminal Justice 1977, 5:205-216.
-
(1977)
Journal of Criminal Justice
, vol.5
, pp. 205-216
-
-
Gottfredson, M.R.1
Hirschi, T.2
-
19
-
-
84929226574
-
Theories and methods of telephone surveys
-
Groves R.M. Theories and methods of telephone surveys. Annual Review of Sociology 1990, 16:221-240.
-
(1990)
Annual Review of Sociology
, vol.16
, pp. 221-240
-
-
Groves, R.M.1
-
20
-
-
77957021039
-
Self-protective identity theft behaviors of college students: An exploration using the Rasch person-item map
-
Higgins G., Hughes T., Ricketts M.L., Fell B.D. Self-protective identity theft behaviors of college students: An exploration using the Rasch person-item map. Southwest Journal of Criminal Justice 2010, 7:24-46.
-
(2010)
Southwest Journal of Criminal Justice
, vol.7
, pp. 24-46
-
-
Higgins, G.1
Hughes, T.2
Ricketts, M.L.3
Fell, B.D.4
-
21
-
-
34548684649
-
Identity theft: The crime of the new millennium
-
Hoar S. Identity theft: The crime of the new millennium. Oregon Law Review 2001, 80:1423-1442.
-
(2001)
Oregon Law Review
, vol.80
, pp. 1423-1442
-
-
Hoar, S.1
-
22
-
-
57649120953
-
Examining the applicability of lifestyle-routine activities theory for cybercrime victimization
-
Holt T.J., Bossler A.M. Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior 2009, 30:1-25.
-
(2009)
Deviant Behavior
, vol.30
, pp. 1-25
-
-
Holt, T.J.1
Bossler, A.M.2
-
23
-
-
77949555353
-
Exploring stolen data markets online: Products and market forces
-
Holt T.J., Lampke E. Exploring stolen data markets online: Products and market forces. Criminal Justice Studies 2010, 23:33-50.
-
(2010)
Criminal Justice Studies
, vol.23
, pp. 33-50
-
-
Holt, T.J.1
Lampke, E.2
-
24
-
-
41649096818
-
Low self-control, routine activities, and fraud victimization
-
Holtfreter K., Reisig M., Pratt T. Low self-control, routine activities, and fraud victimization. Criminology 2008, 46:189-220.
-
(2008)
Criminology
, vol.46
, pp. 189-220
-
-
Holtfreter, K.1
Reisig, M.2
Pratt, T.3
-
25
-
-
39549087433
-
Public perceptions of white-collar crime and punishment
-
Holtfreter K., Van Slyke S., Bratton J., Gertz M. Public perceptions of white-collar crime and punishment. Journal of Criminal Justice 2008, 36:50-60.
-
(2008)
Journal of Criminal Justice
, vol.36
, pp. 50-60
-
-
Holtfreter, K.1
Van Slyke, S.2
Bratton, J.3
Gertz, M.4
-
26
-
-
77957017896
-
-
Identity Theft Resource Center. (2009). Identity theft: The aftermath 2008. Retrieved from
-
Identity Theft Resource Center. (2009). Identity theft: The aftermath 2008. Retrieved from http://www.idtheftcenter.org/artman2/uploads/1/Aftermath_2008_20090520.pdf.
-
(2009)
-
-
-
27
-
-
84993923281
-
Why do victims fail to report? The psychology of victimization
-
Kidd R.F., Chayet E.F. Why do victims fail to report? The psychology of victimization. Journal of Social Issues 1984, 40:39-50.
-
(1984)
Journal of Social Issues
, vol.40
, pp. 39-50
-
-
Kidd, R.F.1
Chayet, E.F.2
-
28
-
-
77957018477
-
-
Identity theft: Findings and public policy recommendations. Final report to the Institute for Fraud Prevention. Retrieved on May 13, 2010, from
-
Kresse, W., Watland, K. & Lucki, J. (2007). Identity theft: Findings and public policy recommendations. Final report to the Institute for Fraud Prevention. Retrieved on May 13, 2010, from http://info.ethicspoint.com/files/web_seminars/2008/Red_Flag/Identity_Theft_Xavier_Study.pdf.
-
(2007)
-
-
Kresse, W.1
Watland, K.2
Lucki, J.3
-
29
-
-
84983548008
-
The effect of social support on fraud victims' reporting behavior
-
Mason K., Benson M. The effect of social support on fraud victims' reporting behavior. Justice Quarterly 1996, 13:511-524.
-
(1996)
Justice Quarterly
, vol.13
, pp. 511-524
-
-
Mason, K.1
Benson, M.2
-
31
-
-
77649164501
-
Identity thieves and sophistication levels: Findings from a national probability sample of American newspaper articles 1995-2005
-
Morris R.G. Identity thieves and sophistication levels: Findings from a national probability sample of American newspaper articles 1995-2005. Deviant Behavior 2010, 31:184-207.
-
(2010)
Deviant Behavior
, vol.31
, pp. 184-207
-
-
Morris, R.G.1
-
33
-
-
38049065451
-
-
U.S. Department of Justice, National Institute of Justice, Washington DC
-
Newman G.R., McNally M. Identity theft literature review 2005, U.S. Department of Justice, National Institute of Justice, Washington DC.
-
(2005)
Identity theft literature review
-
-
Newman, G.R.1
McNally, M.2
-
34
-
-
40849131213
-
Research note: Assessing the perceived seriousness of white-collar and street crimes
-
Piquero N., Carmichael S., Piquero A. Research note: Assessing the perceived seriousness of white-collar and street crimes. Crime and Delinquency 2008, 54:291-312.
-
(2008)
Crime and Delinquency
, vol.54
, pp. 291-312
-
-
Piquero, N.1
Carmichael, S.2
Piquero, A.3
-
35
-
-
77957019073
-
-
How much Is the public willing to pay to be protected from identity theft? Justice Quarterly., (in press).
-
Piquero, N., Cohen, M., & Piquero, A. (in press). How much Is the public willing to pay to be protected from identity theft? Justice Quarterly.
-
-
-
Piquero, N.1
Cohen, M.2
Piquero, A.3
-
36
-
-
70349291633
-
Stolen identities: A victim survey
-
Criminal Justice Press, New York, G. Newman, M. McNally (Eds.)
-
Pontell H.N., Brown G.C., Tosouni A. Stolen identities: A victim survey. Crime Prevention Studies: Identity Theft and Opportunity 2008, 57-86. Criminal Justice Press, New York. G. Newman, M. McNally (Eds.).
-
(2008)
Crime Prevention Studies: Identity Theft and Opportunity
, pp. 57-86
-
-
Pontell, H.N.1
Brown, G.C.2
Tosouni, A.3
-
37
-
-
77954936505
-
Routine online activity and internet fraud targeting: Extending the generality of routine activity theory
-
Pratt T.C., Holtfreter K., Reisig M.D. Routine online activity and internet fraud targeting: Extending the generality of routine activity theory. Journal of Research in Crime and Delinquency 2010, 1431:267-296.
-
(2010)
Journal of Research in Crime and Delinquency
, vol.1431
, pp. 267-296
-
-
Pratt, T.C.1
Holtfreter, K.2
Reisig, M.D.3
-
38
-
-
77957021199
-
-
President's Identity Theft Task Force. (2007). Combating identity theft: A strategic plan. Retrieved on May 13, 2010, from
-
President's Identity Theft Task Force. (2007). Combating identity theft: A strategic plan. Retrieved on May 13, 2010, from http://www.idtheft.gov/reports/StrategicPlan.pdf.
-
(2007)
-
-
-
39
-
-
77957019279
-
-
Privacy and American Business. (2003). Identity theft: New survey and trend report. Retrieved December 29, 2007, from
-
Privacy and American Business. (2003). Identity theft: New survey and trend report. Retrieved December 29, 2007, from http://www.bbbonline.org/idtheft/IDTheftSrvyAug03.pdf.
-
(2003)
-
-
-
40
-
-
70449428729
-
Examining identity theft: Empirical explorations of the offense and the offender
-
Rebovich D. Examining identity theft: Empirical explorations of the offense and the offender. Victims and Offenders 2009, 4:357-364.
-
(2009)
Victims and Offenders
, vol.4
, pp. 357-364
-
-
Rebovich, D.1
-
41
-
-
33745744272
-
An eye for an eye in the electronic age: Gauging public attitudes toward white-collar crime and punishment
-
Rebovich D., Kane J.L. An eye for an eye in the electronic age: Gauging public attitudes toward white-collar crime and punishment. Journal of Economic Crime Management 2002, 1:1-19.
-
(2002)
Journal of Economic Crime Management
, vol.1
, pp. 1-19
-
-
Rebovich, D.1
Kane, J.L.2
-
43
-
-
70350399256
-
The seriousness of crimes: Normative structure and individual differences
-
Rossi P., Waite E., Bose C., Berk R. The seriousness of crimes: Normative structure and individual differences. American Sociological Review 1974, 39:224-237.
-
(1974)
American Sociological Review
, vol.39
, pp. 224-237
-
-
Rossi, P.1
Waite, E.2
Bose, C.3
Berk, R.4
-
44
-
-
62549153184
-
Studying the correlates of fraud victimization and reporting
-
Schoepfer A., Piquero N.L. Studying the correlates of fraud victimization and reporting. Journal of Criminal Justice 2009, 37:209-215.
-
(2009)
Journal of Criminal Justice
, vol.37
, pp. 209-215
-
-
Schoepfer, A.1
Piquero, N.L.2
-
45
-
-
47949111213
-
Studying and teaching white-collar crime: Populist and patrician perspectives
-
Shover N., Cullen F.T. Studying and teaching white-collar crime: Populist and patrician perspectives. Journal of Criminal Justice Education 2008, 19:155-174.
-
(2008)
Journal of Criminal Justice Education
, vol.19
, pp. 155-174
-
-
Shover, N.1
Cullen, F.T.2
-
46
-
-
33646810860
-
Race, economic inequality, and violent crime
-
Stolzenberg L., Eitle D., D'Alessio S.J. Race, economic inequality, and violent crime. Journal of Criminal Justice 2006, 34:303-316.
-
(2006)
Journal of Criminal Justice
, vol.34
, pp. 303-316
-
-
Stolzenberg, L.1
Eitle, D.2
D'Alessio, S.J.3
-
47
-
-
77957018596
-
-
Synovate. (2003). Federal trade commission-Identity theft survey report. Retrieved on May 13, 2010, from
-
Synovate. (2003). Federal trade commission-Identity theft survey report. Retrieved on May 13, 2010, from http://www.ftc.gov/os/2003/09/synovatereport.pdf.
-
(2003)
-
-
-
48
-
-
77957021575
-
-
Synovate. (2007). Federal trade commission-2006 identity theft survey report. Retrieved on May 13, 2010, from
-
Synovate. (2007). Federal trade commission-2006 identity theft survey report. Retrieved on May 13, 2010, from http://www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf.
-
(2003)
-
-
-
49
-
-
77957018203
-
-
U.S. General Accounting Office. (2002). Identity theft: Prevalence and cost appear to be growing. Report to Congressional Requesters GAO-02-363. Retrieved on May 13, 2010, from
-
U.S. General Accounting Office. (2002). Identity theft: Prevalence and cost appear to be growing. Report to Congressional Requesters GAO-02-363. Retrieved on May 13, 2010, from http://www.gao.gov/new.items/d02363.pdf.
-
(2010)
-
-
|