IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • Identity Crime: Deliberating on Remedies for the Victim


    Author(s): HOLM, Eric

    Quick view | Full article | Citations | Views: 1,115


    Author(s) keywords: , , ,


    Reference keywords: ,


    Abstract:

    This paper explores the challenges faced by victims of identity crime following their victimization. It considers the impact of the crime on the victim and the many costs of the crime to them. The paper highlights the complicated pathways the victim faces to recovery and the aspects of reparation that fall short of supporting the many types of harm this crime causes victims. Lastly the paper postulates as to ways to avoid victimization and contemplates the issues pertaining to accuracy of data for the policy responses to identity crime.



    References:

    [1]. K. P. Mueller. (2015, January 29). Bamboozled: Don’t let thieves snatch your tax refund [Online] Available:
    http://www.nj.com/business/index.ssf/2015/01/bamboozled_dont_let_thieves_ snatch_your_tax_refund.html

    [2]. W. Goucher, “Being a cybercrime victim,” Computer Fraud & Security., vol. 2010, pp. 16-18. Jun. 2010.

    [3]. J. Benner, B. Givens and E. Mierzwinski, (2000, May 1). Nowhere to turn: Speak out on identity theft – A survey of Identity Theft Victims and Recommendations for Reform [Online]. Available: http://www.privacyrights.org/ar/idtheft2000.htm

    [4]. K. Turville, S.Firmin, J. Yearwood and C. Miller, “Understanding Victims of Identity Theft: A Grounded Theory Approach,” 5th Conference on Qualitative Research in Information Technology, Brisbane, Qld, 2010. p.3.

    [5]. G. R. Newman and M. M. McNally (2005). Identity Theft Literature Review [Online]. Available: https://www.ncjrs.gov/pdffiles1/nij/grants/210459.pdf

    [6]. M. Barnett, (2010), The Consumer Identity Theft Protection Manual [Online] Available:
    http://www.businessidtheft.org/Education/WhyBusinessIDTheft/tabid/85/Default.aspx

    [7]. R. Brody, “Phishing, Pharming and Identity theft,” Academy of Accounting and Financial Studies Journal., vol. 11, no. 3. p. 54, 2007.

    [8]. K. Turville, and J. Yearwood, C.Miller, “Understanding Victims of Identity Theft: Preliminary Insights,”in Cybercrime and Trustworthy Computing Workshop.,Ballarat, Vic, 2010, p.67.

    [9]. C. Bunton, "Corporate ID theft – is your company vulnerable?," Strategic Direction., vol. 21, no. 2, p. 4. Feb. 2005.

    [10]. M. Fullbright. (2014, March 3). Business Identity Theft [Online]. Available: http://www.slideshare.net/bluesme/business-credit-reports

    [11]. Equifax. (2015). A Lasting impact: The Emotional Toll of Identity Theft [Online] Available:
    http://www.equifax.com/assets/PSOL/15-9814_psol_emotionalToll_wp.pdf

    [12]. T. Sharp, A. Shreve-Neiger, W. Fremouw, J. Kane, and S. Hutton, “Exploring the psychological and somatic impact of identity theft,” Journal of Forensic Science, vol. 49, no. 1, pp. 131-136, Jan. 2004.

    [13]. M J. Sirgy, D. Lee and J. Bae, “Developing a Measure of Internet Well-Being: Nomological (Predictive) Validation,” vol. 78. No. 2. pp. 205-249. Sep. 2006.

    [14]. E. Shoudt, “Comment: Identity Theft: Victims “Cry out” for Reform,” American University Law Review, vol. 52, no. 1, pp.339-392. Oct. 2002.

    [15]. TRW, Inc v Andrews, 534 U.S. 19, 24, 2001.

    [16]. H. Copes, K. Kerley, H. Rodney and J. Kane, “Differentiating identity theft: An exploratory study of victims using a national victimisation survey,” Journal of Criminal Justice., vol. 38, Sep. 2010, p. 1048, doi:10.1016/j.jcrimjus.2010.07.007.

    [17]. R. Clarke, “Privacy as a Means of Engendering Trust in Cyberspace Commerce,” University of New South Wales Law Journal., vol. 24, no. 1, pp. 290-297. Mar. 2001.

    [18]. M. J. Sirgy and D. Lee, “Macro Measures of Consumer Well-Being: A Critical Analysis and a Research Agenda,” in 29th Annual Macro Marketing Conference, Vancouver, British Columbia, 2004, p. 132.

    [19]. G. Goodrich, G. “Identity theft awareness in North Central West Virginia” Master’s thesis, Marshall University, Huntington, WV, 2003.

    [20]. H. Copes, K. Kerley, H. Rodney and J. Kane, “Differentiating identity theft: An exploratory study of victims using a national victimisation survey,” Journal of Criminal Justice., vol. 38, Sep. 2010, p. 1049, doi:10.1016/j.jcrimjus.2010.07.007.

    [21]. D. W. Yang and B. M. Hoffstadt, “Countering the cybercrime threat,” American Criminal Law Review., vol. 43, no. 2, pp. 201–215, 2006.

    [22]. W. Goucher, “Being a cybercrime victim,” Computer Fraud & Security., vol. 2010, p. 17. Jun. 2010.

    [23]. W. G. Skogan (1992. Contacts between Police and Public: Findings from the 1992 British Crime Survey [Online] Available:
    http://www.skogan.org/files/Contact_Between_Police_Public_Hors_134.pdf

    [24]. P. L. Leoni, “Regulatory Practices and the Impossibility to Extract Truthful Risk Information,” International Journal of Business., vol.15, no. 3, p.271, 2010.

    [25]. Florida Legal Centre. (2000). Florida’s Identity Theft Victim Kit [Online] Available: http://myfloridalegal.com/idkitprintable.pdf

    [26]. Symantec. (2012, August 4). Norton Cybercrime Report: The Human Impact, Whom victims of cybercrime contact [Online]. Available:
    http://www.symantec.com/content/en/us/home_homeoffice/media/pdf/cybercrime _report/Norton_USA-Human%20Impact-A4_Aug4-2.pdf

    [27]. Australian Bureau of Statistics. (2012, April 18). Snapshot of Personal Fraud [Online] Available:
    http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/65767D57E11FC149CA2579E4 0012057F?opendocument

    [28]. C. DiGangi. (2013, December 31). These identity theft statistics are even scarier than you’d expect [Online] Available:
    http://www.dailyfinance.com/2013/12/31/scariest-identity-theft-statistics/

    [29]. C. Carcach. (1997, March) Reporting Crime to the Police [Online] Available: http://aic.gov.au/media_library/publications/tandi_pdf/tandi068.pdf

    [30]. J.Zhang, R. Berthier, W. Rhee, M. Bailey, P. Pal, F. Jahanian and W. H Saunders, “Safeguarding Academic Accounts and Resources with the University Credential Abuse Auditing System,” in International Conference on Dependable Systems and Networks., Boston, Massachusetts, 2012, p.7.

    [31]. K. Anderson, “Who Are the Victims of Identity Theft? The Effect of Demographics,” Journal of Public Policy & Marketing., vol. 25, 2006.

    [32]. E. Shoudt, “Comment: Identity Theft: Victims “Cry out” for Reform,” American University Law Review, vol. 52, no. 1, pp.358, 2002.

    [33]. Australian Law Reform Commission. (2008, August 12). You’re your Information: Australian Privacy Law and Practice (ALRC Report 108) [Online] Available: http://www.alrc.gov.au/publications/12.%20Identity%20Theft/what-identity-theft

    [34]. L. D. Roberts, D. Indermaur and C. Spiranovic, “Fear of Cyber-Identity Theft and Related Fraudulent Activity,” Psychiatry, Psychology and Law., vol. 20, no. 3, p.316. May, 2012.

    [35]. Identity Theft Resource Center. (2008). Identity Theft: The Aftermath 2008 [Online] Available:
    http://www.idtheftcenter.org/images/surveys_studies/Aftermath2008.pdf.

    [36]. R. T. Mercuri, “Scoping identity theft,” Communications of the ACM, vol. 49, pp. 17-21, May 2006, doi=10.1145/1125944.1125961

    [37]. L. Langton, M. Planty and US Department of Justice (2008, Dec.). Victims of Identity Theft, 2008 [Online] Available:
    http://bjs.ojp.usdoj.gov/content/pub/pdf/vit08.pdf

    [38]. B. Wright, “Internet break-ins: new legal liability,” Computer Law & Security Review., vol. 20, no. 3, p. 171, 2004.

    [39]. E. Fuchs. (2013, December 13). Identity theft now costs far more than all other property crimes COMBINED [Online] Available:
    http://www.businessinsider.com.au/bureau-of-justice-statistics-identity-theft-report-2013-12

    [40]. Australian Government, Attorney-General’s Department. (2014, October 21). Identity crime in Australia [Online] Available:
    https://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Pages/Trends-in-Identity-Crime.aspx

    [41]. M. Perl, “It’s Not Always about the Money: Why the State Identity Theft Laws Fail to Adequately Address Criminal Record Identity Theft,” Journal of Criminal Law and Criminology, vol. 94, no. 1. Fall. 2003, pp.169-208.

    [42]. S. Hindujaa and J. Patchin, “Personal information of adolescents on the Internet: A quantitative content analysis of MySpace,” Journal of Adolescence, vol. 31, Jan. 2008, pp. 125-146, doi:10.1016/j.adolescence.2007.05.004.

    [43]. E. Holm, “Social Networking, the Catalyst for Identity Thefts in the Digital Society,” International Journal on Advances in Life Sciences, vol. 6, no. 3&4, Dec. 2014. pp. 157-163.

    [44]. H. Jelicic, D. Bobek, E. Phelps, and R. Lerner, “Using positive youth development to predict contribution and risk behaviors in early adolescence: Findings from the first two waves of the 4-H Study of Positive Youth Development,” International Journal of Behavioral Development, vol. 31, May. 2007, pp. 263–273, doi: 10.1177/0165025407076439.

    [45]. J. Huang, D. Jacobs, D. Derevensky, J. Gupta, R, and T. Paskus, “Gambling and health risk behaviors among US college student-athletes: Findings from a national study,” Journal of Adolescent Health., vol. 40, May. 2007, pp. 390-397, doi:10.1016/j.jadohealth.2006.11.146.

    [46]. H. Copes, K. Kerley, H. Rodney and J. Kane, “Differentiating identity theft: An exploratory study of victims using a national victimisation survey,” Journal of Criminal Justice., vol. 38, Sep. 2010, p. 1050, doi:10.1016/j.jcrimjus.2010.07.007.

    [47]. S. Livingstone and E. Helsper, “Parental mediation and children’s Internet use,” Journal of Broadcasting and Electronic Media., vol. 52, pp. 581–599, Dec. 2008, doi: 10.1080/08838150802437396.

    [48]. Elsevier, “Fraud complaints down, but still high,” Computer Fraud & Security., vol. 2011, no. 3, p.20 Apr. 2011, doi.org/10.1016/S1361-3723(11)70033-1.

    [49]. Parliamentary Joint Committee on the Australian Crime Commission. (2007) Inquiry into the Future Impact of Serious and Organized Crime on Australian society [Online] Available:
    http://www.aph.gov.au/Senate/Committee/acc_ctte/completed_inquiries/2004-07/organised_crime/report/report.pdf

    [50]. Criminal Code Act 1995 (Cth) div 375.2(1)(a).

    [51]. Criminal Code Act 1995 (Cth) div 375.2(1)(b).

    [52]. Criminal Code Act 1995 (Cth) div 375.1.

    [53]. Pub. L. 110-326, title II, Sept. 26, 2008, 122 Stat. 3560.

    [54]. Victims of Crime. (2015). Victims of crime: compensation and counselling [Online] Available: http://victimsofcrime.com.au/.

    [55]. E. A. Fattah, “Victimology: Past, present and future,” Criminologie, vol.33, no.1, pp. 17–46, 2000, doi: 10.7202/004720ar.

    [56]. K. Turville, J. Yearwood and C.Miller, “Understanding Victims of Identity Theft: Preliminary Insights,” in Cybercrime and Trustworthy Computing Workshop.,Ballarat, Vic, 2010, p.63.

    [57]. T. Moore, R. Clayton and R. Anderson, “The Economics of Online Crime,” Journal of Economic Perspectives, vol. 23 no. 3, pp.3-20, Jun.2009.

    [58]. United States Court of Appeals, Ninth Circuit. Adelaide ANDREWS, Plaintiff-Appellant, v. TRW INC., Defendant-Appellee. No. 98-56624.

    [59]. K. Turville, S.Firmin, J. Yearwood and C.Miller, “Understanding Victims of Identity Theft: A Grounded Theory Approach,” 5th Conference on Qualitative Research in Information Technology, Brisbane., Qld, 2010. p.5.

    [60]. W. Goucher, “Being a cybercrime victim,” Computer Fraud & Security., vol. 2010, p. 16. Jun. 2010.

    [61]. L. Roberts. (2008, October 6). Cyber-victimisation in Australia: extent, impact on individuals and responses [Online] Available: http://www.utas.edu.au/_data/assets/pdf_file/0004/293773/Briefing_Paper_No_6.pdf

    [62]. A. Mefford, “Lex Informatica: Foundations of Law on the Internet,” Indiana Journal of Global Legal Studies., vol. 5, no. 1, p. 211. Fall. 1997.

    [63]. D.J. Svantesson, “The Relation between Public International Law and Private International Law in the Internet Context,” in Australasian Law Teachers Association Conference, Hamilton, New Zealand, 2005, p.160.

    [64]. J.A. Conser and G.D. Russell, Law enforcement in the United States, Aspen Gaithersburg, MD: Aspen Publishers 2000.

    [65]. R.S Groover, “Overcoming obstacles: preparing for computer-related crime,” FBI Law Enforcement Bulletin, vol.65, no 8, pp 8-10, Aug. 1996.

    [66]. D. B. Hollis, “An e-SOS for Cyberspace,” Harvard International Law Journal., vol. 52, no.2, p. 405. Summer, 2011.

    [67]. N. Archer, S. Sproule, Y. Yuan, K. Guo and J. Xiang, Identity Theft and Fraud Evaluating and Managing Risk. Ottawa, Canada: University of Ottawa Press, 2012, p. 107.

    [68]. R. Anderson, C. Barton C, R. Bohme, R. Clayton, M. J. van Eeten, M. Levi M, T. Moore and S. Savage, “Measuring the cost of cybercrime,” in Workshop on the Economics of Information Security., Berlin, Germany, 2012, pp.1-31, [Online] Available: http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf

    [69]. D. S. Wall, “Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime,” International Review of Law, Computers and Technology., vol. 22, no. 1-2, pp. 45–63. Apr. 2008, doi:10.1080/13600860801924907.

    [70]. I. Bernik, “Cybercrime: The Cost of Investments into Protection,” Journal of Criminal Justice & Security., vol. 6, no. 2, p. 105. Feb. 2014.

    [71]. Australian Federal Police. (2015) Identity Crime [Online]. Available:http://www.afp.gov.au/policing/fraud/identity-crime#q7

    [72]. Veda. (2013) What should I do if I think my identity has been stolen [Online] Available: https://www.veda.com.au/yourcreditandidentity/protect/what-should-i-do-if-i-think-my-identity-has-been-stolen

    [73]. Veda. (2013) What is identity theft? [Online] Available:
    https://www.veda.com.au/yourcreditandidentity/protect/what-is-identity-theft

    [74]. Veda. (2013) How can I check my credit history [Online] Available: https://www.veda.com.au/yourcreditandidentity/tips-mythbusters/faqs/how-can-i-check-my-credit-history

    [75]. I. Bernik, “Cybercrime: The Cost of Investments into Protection,” Journal of Criminal Justice & Security., vol. 6, no. 2, p. 111. Feb. 2014.

    [76]. P. Räsänen, A. Kouvo, “Linked or divided by the web? Internet and sociability in four European countries,” Information, Communication & Society, vol.10, no. 2, pp. 219–241. Apr. 2007, doi:10.1080/13691180701307461.

    [77]. D.B Weber, “The Cybernetic Sea: Australia’s Approach to the Wave of Cybercrime, QUT Law Review, Vol. 14, no.2. p.71. 2014.

    [78]. G.R. Newman, “Policy thoughts on “bounded rationality of identity thieves,” Criminology & Public Policy, vol. 8, no. 2. pp. 271–278. Jun. 2009, doi: 10.1111/j.1745-9133.2009.00562.x.

    [79]. W. Ahmad, “Is Credit Card Fraud a Real Crime? Does it really Cripple the E-Commerce Sector of E-Business?” in International Conference on Management of e-commerce and e-government, Jianxi, China Oct. 2008 p.367.

    [80]. A. Asllani, “Privacy Concerns in Higher Education: Traditional Versus Online Education,” International Journal of Computer Science and Information Security., vol.10, no.2, pp. 6- 9, 2012.

    [81]. I. Bernik, “Cybercrime: The Cost of Investments into Protection,” Journal of Criminal Justice & Security., vol. 6, no. 2, p. 113, 2014.

    [82]. E. Shoudt, “Comment: Identity Theft: Victims “Cry out” for Reform,” American University Law Review, vol. 52, no. 1, p.366, 2002.

    [83]. Australian Government. ACORN: Australian Cybercrime Online Reporting Network [Online] Available:http://www.acorn.gov.au/

    [84]. Australian Government. (2013, August 20). National Plan to Combat Cybercrime [Online] Available:http://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Documents/ National%20Plan%20to%20Combat%20Cybercrime.pdf

    [85]. Commission of the European Communities (1988, June 7). Green Paper on Copyright and the Challenge of Technology – Copyright Issues Requiring Immediate Action [Online] Available:
    http://aei.pitt.edu/1209/1/COM_%2888%29_172_final.pdf

    [86]. Federal Trade Commission. (2014, September). A CAN-SPAM Informant Reward System: A Report to Congress [Online] Available:
    https://www.ftc.gov/reports/can-spam-informant-reward-system-federal-trade-commission-report-congress

    [87]. Austrac (2015). The document verification service and individual customer and beneficial owner [Online] Available:
    http://www.austrac.gov.au/document-verification-service-and-individual-customer-and-beneficial-owner-identification

    [88]. E. Holm, “Responding to identity crime on the Internet,” International Journal of Cyber-Security and Digital Forensics., vol. 1, no. 2, pp. 67-74. Jun. 2012.

    [89]. S. N. Bridgett, “Classifying Crime Victim Restitution: The Theoretical Arguments and Practical Consequences of Labelling Restitution as either a Criminal or Civil Law Concept,” Lewis & Clark Law Review, vol. 18, no. 3, p. 804. Oct. 2014.

    [90]. B.N. Shephard, “Classifying Crime Victim Restitution: The Theoretical Arguments and Practical Consequences of Labelling Restitution as either a Criminal or Civil Law Concept,” Lewis & Clark Law Review., vol. 18, no. 3, p. 826. 2014.

    [91]. I. Bernik, “Cybercrime: The Cost of Investments into Protection,” Journal of Criminal Justice & Security., vol. 6, no. 2, p. 109. Feb. 2014.



    Additional Information

    Article Title: Identity Crime: Deliberating on Remedies for the Victim
    Author(s): HOLM, Eric
    Date of Publication: 2015-12-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2015.02.05
    Issue: Volume 4, Issue 2, Year 2015
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 49-60 (12 pages)



    Copyright

    Copyright ©2012-2019 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.