메뉴 건너뛰기




Volumn 33, Issue 4, 2012, Pages 308-323

Examining Risks and Protective Factors of On-Line Identity Theft

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84858179302     PISSN: 01639625     EISSN: 15210456     Source Type: Journal    
DOI: 10.1080/01639625.2011.584050     Document Type: Article
Times cited : (52)

References (51)
  • 1
    • 11344287619 scopus 로고    scopus 로고
    • Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics
    • Allison, Stuart F. H., Amie M. Schuck, and Kim Michelle Lersch. 2005. "Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics." Journal of Criminal Justice 33: 19-29.
    • (2005) Journal of Criminal Justice , vol.33 , pp. 19-29
    • Allison, S.F.H.1    Schuck, A.M.2    Lersch, K.M.3
  • 2
    • 84858251080 scopus 로고    scopus 로고
    • U.S. Department of Justice, Office of Justice Statistics Available at () (accessed April 15, 2007)
    • Baum, Katrina. 2006. First Estimates from the National Crime Victimization Survey: Identity Theft, 2004. Washington, DC: U.S. Department of Justice, Office of Justice Statistics. Available at (http://www.ojp.usdoj.gov/bjs/pub/pdf/it04.pdf) (accessed April 15, 2007).
    • (2006) First Estimates from the National Crime Victimization Survey: Identity Theft, 2004
    • Baum, K.1
  • 3
    • 11344257651 scopus 로고    scopus 로고
    • Training: Identity Theft
    • Bellah, John. 2001. "Training: Identity Theft." Law and Order 49: 222-226.
    • (2001) Law and Order , vol.49 , pp. 222-226
    • Bellah, J.1
  • 4
    • 80052980820 scopus 로고    scopus 로고
    • On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory
    • Bossler, Adam M. and Thomas J. Holt. 2009. "On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory." The International Journal of Cyber Criminology 3: 400-420.
    • (2009) The International Journal of Cyber Criminology , vol.3 , pp. 400-420
    • Bossler, A.M.1    Holt, T.J.2
  • 5
    • 77949584268 scopus 로고    scopus 로고
    • Computer Crime Victimization and Integrated Theory: An Empirical Assessment
    • Choi, Kyung C. 2008. "Computer Crime Victimization and Integrated Theory: An Empirical Assessment." International Journal of Cyber Criminology 2: 308-333.
    • (2008) International Journal of Cyber Criminology , vol.2 , pp. 308-333
    • Choi, K.C.1
  • 7
    • 33748435812 scopus 로고    scopus 로고
    • Computer Security Institute
    • Computer Security Institute. 2009. Computer Crime and Security Survey. Available at (http://www.cybercrime.gov/FBI2008.pdf) (accessed June 5, 2010).
    • (2009) Computer Crime and Security Survey
  • 9
    • 77649139924 scopus 로고    scopus 로고
    • The Risks, Rewards, and Strategies of Stealing Identities
    • Criminal Justice Press
    • Copes, Heith and Lynne Vieraitis. 2008. "The Risks, Rewards, and Strategies of Stealing Identities." Pp. 87-110 in Identity Theft and Opportunity, Crime Prevention Studies, Vol. 23, edited by M. McNally and G. Newman. Monsey, NY: Criminal Justice Press.
    • (2008) Identity Theft and Opportunity, Crime Prevention Studies , vol.23 , pp. 87-110
    • Copes, H.1    Lynne, V.2
  • 10
    • 85044911536 scopus 로고    scopus 로고
    • Bounded Rationality of Identity Thieves: Using Research to Inform Policy
    • Copes, Heith and Lynne Vieraitis. 2009. "Bounded Rationality of Identity Thieves: Using Research to Inform Policy." Criminology and Public Policy 8: 237-262.
    • (2009) Criminology and Public Policy , vol.8 , pp. 237-262
    • Copes, H.1    Lynne, V.2
  • 12
    • 4444355305 scopus 로고    scopus 로고
    • Federal Trade Commission
    • Federal Trade Commission. 2003. Identity Theft Survey Report. Available at (http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/synovate_report.pdf) (accessed March 15, 2005).
    • (2003) Identity Theft Survey Report
  • 13
    • 84858191563 scopus 로고    scopus 로고
    • Federal Trade Commission
    • Federal Trade Commission. 2007. Identity Theft Victim Complaint Data. Available at (http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/clearinghouse_2006.pdf) (accessed May 19, 2008).
    • (2007) Identity Theft Victim Complaint Data
  • 14
    • 1842424381 scopus 로고    scopus 로고
    • A Survey of Online Harassment at a University Campus
    • Finn, Jerry. 2004. "A Survey of Online Harassment at a University Campus." Journal of Interpersonal Violence 19: 468-483.
    • (2004) Journal of Interpersonal Violence , vol.19 , pp. 468-483
    • Finn, J.1
  • 15
    • 85055401848 scopus 로고    scopus 로고
    • Being Pursued: Stalking Victimization in a National Study of College Women
    • Fisher, Bonnie S., Francis T. Cullen, and Michael G. Turner. 2002. "Being Pursued: Stalking Victimization in a National Study of College Women." Criminology and Public Policy 1: 257-308.
    • (2002) Criminology and Public Policy , vol.1 , pp. 257-308
    • Fisher, B.S.1    Cullen, F.T.2    Turner, M.G.3
  • 16
    • 0344513859 scopus 로고    scopus 로고
    • A Tale of Two Ivory Towers: A Comparative Analysis of Victimization Rates and Risks between University Students in the United States and England
    • Fisher, Bonnie S. and Andrew R. P. Wilkes. 2003. "A Tale of Two Ivory Towers: A Comparative Analysis of Victimization Rates and Risks between University Students in the United States and England."British Journal of Criminology43:526-545.
    • (2003) British Journal of Criminology , vol.43 , pp. 526-545
    • Fisher, B.S.1    Wilkes, A.R.P.2
  • 18
    • 0000931753 scopus 로고
    • Stress-Resistant Children: The Search of Protective Factors
    • In: Stevenson J. E., editors Pergamon Press
    • Garmezy, N. 1985. "Stress-Resistant Children: The Search of Protective Factors." Pp. 213-233 in Recent Research in Developmental Psychopathology, edited by J. E. Stevenson. New York: Pergamon Press.
    • (1985) Recent Research in Developmental Psychopathology , pp. 213-233
    • Garmezy, N.1
  • 19
    • 0021379982 scopus 로고
    • The Study of Stress and Competence in Children: A Building Block of Developmental Psychopathology
    • Garmezy, Norman, Ann S. Masten, and Auke Tellegen. 1984. "The Study of Stress and Competence in Children: A Building Block of Developmental Psychopathology." Child Development 55: 97-111.
    • (1984) Child Development , vol.55 , pp. 97-111
    • Garmezy, N.1    Masten, A.S.2    Tellegen, A.3
  • 20
    • 77949545382 scopus 로고    scopus 로고
    • TJX Breach was Twice as Big as Admitted, Banks Say
    • Available at(accessed October 23, 2008)
    • Goodin, Dan. 2007. "TJX Breach was Twice as Big as Admitted, Banks Say." The Register. Available at (http://www.theregister.co.uk/2007/10/24/tjx_breach_estimate_grows/) (accessed October 23, 2008).
    • (2007) The Register
    • Goodin, D.1
  • 22
    • 85140541591 scopus 로고    scopus 로고
    • Telecommunication Fraud in the Digital Age: The Convergence of Technologies
    • In: Wall D., editors Routledge
    • Grabosky, P. N. and R. Smith. 2001. "Telecommunication Fraud in the Digital Age: The Convergence of Technologies." Pp. 29-43 in Crime and the Internet, edited by D. Wall. New York: Routledge.
    • (2001) Crime and the Internet , pp. 29-43
    • Grabosky, P.N.1    Smith, R.2
  • 25
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural Evolution? Examining the Influence of On-and Off-Line Experiences on Deviant Subcultures
    • Holt, Thomas J. 2007. "Subcultural Evolution? Examining the Influence of On-and Off-Line Experiences on Deviant Subcultures." Deviant Behavior 28: 171-198.
    • (2007) Deviant Behavior , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 26
    • 57649120953 scopus 로고    scopus 로고
    • Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization
    • Holt, Thomas J. and Adam M. Bossler. 2009. "Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization." Deviant Behavior 30: 1-25.
    • (2009) Deviant Behavior , vol.30 , pp. 1-25
    • Holt, T.J.1    Bossler, A.M.2
  • 28
    • 77949555353 scopus 로고    scopus 로고
    • Exploring Stolen Data Markets On-Line: Products and Market Forces
    • Holt, Thomas J. and Eric Lampke. 2010. "Exploring Stolen Data Markets On-Line: Products and Market Forces." Criminal Justice Studies 23: 33-50.
    • (2010) Criminal Justice Studies , vol.23 , pp. 33-50
    • Holt, T.J.1    Lampke, E.2
  • 29
    • 41649096818 scopus 로고    scopus 로고
    • Low Self-Control, Routine Activities, and Fraud Victimization
    • Holtfreter, Kristy, Michael D. Reisig, and Travis C. Pratt. 2008. "Low Self-Control, Routine Activities, and Fraud Victimization." Criminology 46: 189-220.
    • (2008) Criminology , vol.46 , pp. 189-220
    • Holtfreter, K.1    Reisig, M.D.2    Pratt, T.C.3
  • 30
    • 84858174630 scopus 로고    scopus 로고
    • Internet Crime Complaint Center
    • Internet Crime Complaint Center. 2010. Internet Crime Report. Available at (http://www.ic3.gov/media/annualreport/2009_IC3Report.pdf (accessed April 20, 2010).
    • (2010) Internet Crime Report
  • 31
    • 0026440771 scopus 로고
    • Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents
    • Lauritsen, Janet L., John H. Laub, and Robert J. Sampson. 1992. "Conventional and Delinquent Activities: Implications for the Prevention of Violent Victimization among Adolescents." Violence and Victims 7: 91-108.
    • (1992) Violence and Victims , vol.7 , pp. 91-108
    • Lauritsen, J.L.1    Laub, J.H.2    Sampson, R.J.3
  • 34
    • 77649164501 scopus 로고    scopus 로고
    • Identity Thieves and Levels of Sophistication: Findings from a National Probability Sample of American Newspaper Articles 1995-2005
    • Morris, Robert G. 2010. "Identity Thieves and Levels of Sophistication: Findings from a National Probability Sample of American Newspaper Articles 1995-2005." Deviant Behavior 31: 184-207.
    • (2010) Deviant Behavior , vol.31 , pp. 184-207
    • Morris, R.G.1
  • 37
    • 68149146473 scopus 로고    scopus 로고
    • PandaLabs
    • PandaLabs. 2007. Malware Infections in Protected Systems. Available at (http://research.pandasecurity.com/blogs/images/wp_pb_malware_infections_in_protected_systems.pdf) (accessed May 20, 2010).
    • (2007) Malware Infections in Protected Systems
  • 39
    • 35048877207 scopus 로고    scopus 로고
    • Pew Internet and American Life
    • Pew Internet and American Life. 2005. Pew Internet and American Life Project. Available at (http://www.pewinternet.org/Reports/2009/10Home_BroadbandAdoption-2009.aspx) (accessed August 4, 2007).
    • (2005) Pew Internet and American Life Project
  • 40
    • 84858230810 scopus 로고    scopus 로고
    • Gartner: Victims of Online Phishing up nearly 40 Percent in 2007
    • Available at(accessed March 2, 2009)
    • Rogers, Jack. 2007. "Gartner: Victims of Online Phishing up nearly 40 Percent in 2007." SC Magazine. Available at (http://www.scmagazineus.com/Gartner-Victims-ofonline-phishing-up-nearly-40-percent-in-2007/article/99768) (accessed March 2, 2009).
    • (2007) SC Magazine
    • Rogers, J.1
  • 42
    • 0002038917 scopus 로고
    • Protective Factors in Children's Responses to Stress and Disadvantage
    • In: Kent M. W., editorsRolf J. E., editors University Press of New England
    • Rutter, M. 1979. "Protective Factors in Children's Responses to Stress and Disadvantage." Pp. 49-79 in Primary Prevention in Psychopathology: Social Competence in Children, edited by M. W. Kent and J. E. Rolf. Hanover, NH: University Press of New England.
    • (1979) Primary Prevention in Psychopathology: Social Competence in Children , pp. 49-79
    • Rutter, M.1
  • 43
    • 0030668250 scopus 로고    scopus 로고
    • A Social Learning Theory Analysis of Computer Crime among College Students
    • Skinner, William F. and Anne M. Fream. 1997. "A Social Learning Theory Analysis of Computer Crime among College Students." Journal of Research in Crime and Delinquency 34: 495-518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 44
    • 0000981354 scopus 로고
    • Resilient Youth: Identifying Factors that Prevent High-Risk Youth from Engaging in Delinquency and Drug Use
    • In: Blau Z. S., editorsHagan J., editors Jai Press
    • Smith, C., A. J. Lizotte, T. P. Thornberry, and M. D. Krohn. 1995. "Resilient Youth: Identifying Factors that Prevent High-Risk Youth from Engaging in Delinquency and Drug Use." Pp. 217-247 in Current Perspectives on Aging and the Life Cycle, edited by Z. S. Blau and J. Hagan. Greenwich, CT: Jai Press.
    • (1995) Current Perspectives on Aging and the Life Cycle , pp. 217-247
    • Smith, C.1    Lizotte, A.J.2    Thornberry, T.P.3    Krohn, M.D.4
  • 47
    • 65349183727 scopus 로고    scopus 로고
    • Examining the Cumulative Effects of Protective Factors: Resiliency among a National Sample of High-Risk Youths
    • Turner, Michael G., Jennifer L. Hartman, M. Lyn Exum, and Francis T. Cullen. 2007. "Examining the Cumulative Effects of Protective Factors: Resiliency among a National Sample of High-Risk Youths." Journal of Offender Rehabilitation 46: 81-111.
    • (2007) Journal of Offender Rehabilitation , vol.46 , pp. 81-111
    • Turner, M.G.1    Hartman, J.L.2    Lyn Exum, M.3    Cullen, F.T.4
  • 49
    • 0001924695 scopus 로고
    • Stress and Protective Factors in Children's Lives
    • In: Nichol A. R., editors John Wiley and Sons
    • Werner, E. E. 1985. "Stress and Protective Factors in Children's Lives." Pp. 335-355 in Longitudinal Studies in Child Psychology and Psychiatry, edited by A. R. Nichol. New York: John Wiley and Sons.
    • (1985) Longitudinal Studies in Child Psychology and Psychiatry , pp. 335-355
    • Werner, E.E.1
  • 51
    • 34247657469 scopus 로고    scopus 로고
    • The Novelty of Cybercrime
    • Yar, Majid. 2005. "The Novelty of Cybercrime." European Journal of Criminology 2: 407-427.
    • (2005) European Journal of Criminology , vol.2 , pp. 407-427
    • Yar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.