scispace - formally typeset
Journal ArticleDOI

Identity theft and university students: do they know, do they care?

Ludek Seda
- 17 Oct 2014 - 
- Vol. 21, Iss: 4, pp 461-483
TLDR
In this paper, the authors investigated the relationship between the university students' knowledge of the risk of identity theft and the preventive measures they take, and found that the students demonstrated a significant misunderstanding of who perpetrators typically were targeting when stealing personal information or what perpetrators were looking for.
Abstract
Purpose – This study aims to explain what factors influence the relationship between the university students’ knowledge of the risk of identity theft and the preventive measures they take. Design/methodology/approach – A series of semi-structured interviews was used as the primary data collection tool. The sample for this study comprised 12 undergraduate students (six males and six females) from the Flinders Business School. The interviews were designed as face-to-face interviews. Findings – The current findings indicate that, despite the fact that students were reasonably knowledgeable regarding the general risk of identity theft, many of the students had only limited knowledge about specific issues related to identity theft. It was found that the limited knowledge or misunderstanding of specific issues prevented students from using appropriate measures that could reduce the risk of identity theft. The students demonstrated a significant misunderstanding of who perpetrators typically were targeting when stealing personal information or what perpetrators of identity theft were looking for. Originality/value – The results of the study contribute to a better understanding of the students’ knowledge about the risks associated with identity crime. They may also assist governments and other stakeholders with vested interests, such as financial institutions and educational providers, to educate individuals about the circumstances where they are potentially vulnerable to identity theft.

read more

Citations
More filters
Journal ArticleDOI

Responding to identity theft: A victimization perspective

TL;DR: It is found that perceived victimization severity, which is determined by the magnitude of financial loss, the extent of misuse of personal information, and the amount of time spent resolving the issue, has apositive impact on perceived distress, and perceived distress has a positive impact on the behavioral responses.
Journal ArticleDOI

Investigating identity fraud management practices in e-tail sector: a systematic review

TL;DR: The research finds that literature on practices for identity fraud management is scattered and reveals that firms assume identity fraud issues as a technological challenge, which is one of the major reasons for a gap in effective management of identity frauds.
Journal ArticleDOI

“I Suspect That the Pictures Are Stolen”: Romance Fraud, Identity Crime, and Responding to Suspicions of Inauthentic Identities:

TL;DR: Romance fraud impacts the lives of thousands of people globally as discussed by the authors and financial losses exceed millions of dollars each year and are steadily increasing annually, and it occurs when an offender uses the guis...

Identifying Business Risk Factors of Identity Theft

TL;DR: Minniti et al. as mentioned in this paper identified business risk factors of identity theft, including international immigration, state-specific unemployment rates, and state specific instances of ID theft, using the fraud triangle theory.

Cyber Security Challenges in Social Media

Erdal Ozkaya
TL;DR: This research has studied the ways in which social media platforms are inherently putting users in the way of security and privacy threats and formulated some recommendations that it hopes will reduce theSecurity and privacy issues that users are facing on social media.
References
More filters
Journal ArticleDOI

How Many Interviews Are Enough?: An Experiment with Data Saturation and Variability

TL;DR: The authors operationalize saturation and make evidence-based recommendations regarding nonprobabilistic sample sizes for interviews and found that saturation occurred within the first twelve interviews, although basic elements for metathemes were present as early as six interviews.
Book ChapterDOI

Social Change and Crime Rate Trends: A Routine Activity Approach

TL;DR: In this paper, a "routine activity approach" is presented for analyzing crime rate trends and cycles. But rather than emphasizing the characteristics of offenders, with this approach, the authors concentrate upon the circumstances in which they carry out predatory criminal acts, and hypothesize that the dispersion of activities away from households and families increases the opportunity for crime and thus generates higher crime rates.
Journal ArticleDOI

Sample Size and Saturation in PhD Studies Using Qualitative Interviews

TL;DR: In this article, a sample of PhD studies using qualitative approaches, and qualitative interviews as the method of data collection was taken from theses.com and contents analysed for their sample sizes.
Book

Qualitative Data Analysis: A User Friendly Guide for Social Scientists

Ian Dey
TL;DR: In this paper, Qualitative Data Analysis shows that learning how to analyse qualitative data by computer can be fun, and is written in a stimulating style, with examples drawn mainly from every day life and contemporary humour, it should appeal to a wide audience.
Journal ArticleDOI

Hot Spots of Predatory Crime: Routine Activities and the Criminology of Place

TL;DR: In this article, the authors used spatial data on 323,979 calls to police over all 115,000 addresses and intersections in Minneapolis over 1 year, showing that crime is both rare (only 3.6% of the city could have had a robbery with no repeat addresses) and concentrated, although the magnitude of concentration varies by offense type.
Related Papers (5)