scispace - formally typeset
Search or ask a question
Author

Eva Velasquez

Bio: Eva Velasquez is an academic researcher. The author has contributed to research in topics: Identity (social science) & White-collar crime. The author has an hindex of 2, co-authored 3 publications receiving 11 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: An estimated 26 million American citizens per year have been victims of an identity-based crime as mentioned in this paper, and the authors of this paper contribute to the scholarship on financial crimes facilitated through identity based crime.
Abstract: An estimated 26 million American citizens per year have been victims of an identity-based crime. This study contributes to the scholarship on financial crimes facilitated through identity-based cri...

8 citations

Journal ArticleDOI
TL;DR: The authors used interview data collected from individuals to investigate victim services for identity-based crimes and found that victim services can be useful in identifying identity based crimes and identifying identity-related crimes.
Abstract: Although much has been written about identity-based crimes, much less is known about victim services for identity-based crimes. This paper uses in-depth interview data collected from individuals wh...

7 citations

Journal ArticleDOI
TL;DR: In this paper, the authors contributed to the scholarship on identity-based crime by examining serious identi city-based crimes. But they focused on identity theft, not identity theft.
Abstract: An estimated 26 million American citizens per year have been victims of an identity-based crime. This study contributes to the scholarship on identity-based crime by examining serious ident...

6 citations


Cited by
More filters
Book
01 Jul 2005
TL;DR: This paper explains some of the methods used by ID thieves and focuses on Phishing, a web-based social engineering method of extracting personal information for the purpose of assuming the identity of the unsuspecting.
Abstract: On February 7, 2005, the Federal Trade Commission reported that at least 10 million Americans are affected by identity (ID) theft each year[7]. The US Department of Justice defines identity theft as ”all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain[17].” ID thieves target any personal information they can get including social security numbers, bank account or credit card numbers, mother’s maiden name, drivers license numbers, financial account numbers and pins, and online account names and passwords[7], [17]. These criminals use many different methods to attack unsuspecting people, gaining information that they then use to pretend to be those people. In this paper we explain some of the methods used by ID thieves. We will focus on Phishing, a web-based social engineering method of extracting personal information for the purpose of assuming the identity of the unsuspecting. The government has stepped up legislation to help prosecute those caught engaging in identity theft, but we must do more through education and personal protection[17], [7], [4]. II. GOALS AND MOTIVATION

158 citations

Journal ArticleDOI
TL;DR: In this article, the authors emphasized the linkage between the frequency or actual length of time individuals spend online engaging in certain activities and the risk of cyber-crime victimization, and the likelihood of being targeted by cyber-criminals.
Abstract: Prior research on cybercrime victimization has generally emphasized the linkage between the frequency or actual length of time individuals spend online engaging in certain activities and the risk o

14 citations

Journal ArticleDOI
TL;DR: Identity theft is a pervasive and expensive problem as discussed by the authors, not only does the crime incur a significant financial and mental cost on the victim, but also exhibits a financial toll on the organizations that have to deal with it.
Abstract: Identity theft is a pervasive and expensive problem. Not only does the crime incur a significant financial and mental cost on the victim, but also exhibits a financial toll on the organizations tha...

9 citations

Journal ArticleDOI
TL;DR: An estimated 26 million American citizens per year have been victims of an identity-based crime as mentioned in this paper, and the authors of this paper contribute to the scholarship on financial crimes facilitated through identity based crime.
Abstract: An estimated 26 million American citizens per year have been victims of an identity-based crime. This study contributes to the scholarship on financial crimes facilitated through identity-based cri...

8 citations

Journal ArticleDOI
TL;DR: The results reveal that privacy concerns have an effect on attitude toward privacy protection, which affects continuous usage intention with regard to MMHS, and offer practical guidelines for breaking the paradox through the design of user-centered and privacy-preserving MMHS.
Abstract: Background Mobile mental health systems (MMHS) have been increasingly developed and deployed in support of monitoring, management, and intervention with regard to patients with mental disorders. However, many of these systems rely on patient data collected by smartphones or other wearable devices to infer patients’ mental status, which raises privacy concerns. Such a value-privacy paradox poses significant challenges to patients’ adoption and use of MMHS; yet, there has been limited understanding of it. Objective To address the significant literature gap, this research aims to investigate both the antecedents of patients’ privacy concerns and the effects of privacy concerns on their continuous usage intention with regard to MMHS. Methods Using a web-based survey, this research collected data from 170 participants with MMHS experience recruited from online mental health communities and a university community. The data analyses used both repeated analysis of variance and partial least squares regression. Results The results showed that data type (P=.003), data stage (P<.001), privacy victimization experience (P=.01), and privacy awareness (P=.08) have positive effects on privacy concerns. Specifically, users report higher privacy concerns for social interaction data (P=.007) and self-reported data (P=.001) than for biometrics data; privacy concerns are higher for data transmission (P=.01) and data sharing (P<.001) than for data collection. Our results also reveal that privacy concerns have an effect on attitude toward privacy protection (P=.001), which in turn affects continuous usage intention with regard to MMHS. Conclusions This study contributes to the literature by deepening our understanding of the data value-privacy paradox in MMHS research. The findings offer practical guidelines for breaking the paradox through the design of user-centered and privacy-preserving MMHS.

5 citations