Online Routines and Identity Theft Victimization

Objectives: The purpose of the current study was to extend recent work aimed at applying routine activity theory to crimes in which the victim and offender never come into physical proximity. To that end, relationships between individuals' online routines and identity theft victimization were examined. Method: Data from a subsample of 5,985 respondents from the 2008 to 2009 British Crime Survey were analyzed. Utilizing binary logistic regression, the relationships between individuals' online routine activities (e.g., banking, shopping, downloading), individual characteristics (e.g., gender, age, employment), and perceived risk of victimization on identity theft victimization were assessed. Results: The results suggest that individuals who use the Internet for banking and/or e-mailing/instant messaging are about 50 percent more likely to be victims of identity theft than others. Similarly, online shopping and downloading behaviors increased victimization risk by about 30 percent. Males, older persons, and those with higher incomes were also more likely to experience victimization, as were those who perceived themselves to be at greater risk of victimization. Conclusions: Although the routine activity approach was originally written to account for direct-contact offenses, it appears that the perspective also has utility in explaining crimes at a distance. Further research should continue to explore the online and offline routines that increase individuals' risks of identity theft victimization.

[1]  Tamara D. Madensen Eck, John E. , 2014 .

[2]  Emily Finch The problem of stolen identity and the Internet , 2013 .

[3]  Johan van Wilsem,et al.  ‘Bought it, but Never Got it’ Assessing Risk Factors for Online Consumer Fraud Victimization , 2013 .

[4]  Emily Finch,et al.  What a tangled web we weave: identity theft and the Internet , 2012 .

[5]  P. V. Schijndel Identity Theft and Fraud , 2011 .

[6]  Pamela Wilcox,et al.  Gender, Adolescent Lifestyles, and Violent Victimization: Implications for Routine Activity Theory , 2010 .

[7]  Michael D. Reisig,et al.  Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .

[8]  Catherine D. Marcum,et al.  Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routine Activity Theory , 2010 .

[9]  Bradford W. Reyns A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers , 2010 .

[10]  John E. Eck,et al.  Super controllers and crime prevention: A routine activity explanation of crime prevention success and failure , 2010 .

[11]  Alex R. Piquero,et al.  Low Self-Control and Fraud , 2010 .

[12]  B. Fisher,et al.  What Distinguishes Single from Recurrent Sexual Victims? The Role of Lifestyle‐Routine Activities and First‐Incident Characteristics , 2010 .

[13]  Alex R. Piquero,et al.  Low Self-Control and FraudOffending, Victimization, and Their Overlap , 2010 .

[14]  Joshua D. Freilich,et al.  An assessment of the empirical validity and conceptualization of individual level multivariate studies of lifestyle/routine activities theory published from 1995 to 2005 , 2009 .

[15]  Michael D. Reisig,et al.  Perceived Risk of Internet Theft Victimization , 2009 .

[16]  T. Holt,et al.  Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .

[17]  Michael D. Reisig,et al.  LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .

[18]  M. Levi Combating identity and other forms of payment fraud in the UK: an analytical history , 2008 .

[19]  Kyung-shick Choi Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .

[20]  Bert-Jaap Koops,et al.  Identity theft, identity fraud and/or identity-related crime , 2006, Datenschutz und Datensicherheit - DuD.

[21]  Kristy Holtfreter,et al.  Sociolegal change in consumer fraud: From victim-offender interactions to global networks , 2005 .

[22]  Ronald V. Clarke,et al.  Superhighway Robbery: Preventing E-commerce Crime , 2003 .

[23]  D. Cornish OPPORTUNITIES, PRECIPITATORS AND CRIMINAL DECISIONS: A REPLY TO WORTLEY'S CRITIQUE OF SITUATIONAL CRIME PREVENTION , 2003 .

[24]  Richard A. Wright,et al.  A study of individual and situational antecedents of violent victimization , 2002 .

[25]  R. Clarke Technology, Criminology and Crime Science , 2002 .

[26]  Mark Warr,et al.  Fear of Crime in the United States: Avenues for Research and Policy , 2000 .

[27]  Christopher J. Schreck Criminal victimization and low self-control: An extension and test of a general theory of crime , 1999 .

[28]  Richard Tewksbury,et al.  A Routine Activity Theory Explanation for Women's Stalking Victimizations , 1999, Violence against Women.

[29]  Richard Tewksbury,et al.  PREDICTING RISKS OF LARCENY THEFT VICTIMIZATION: A ROUTINE ACTIVITY ANALYSIS USING REFINED LIFESTYLE MEASURES , 1998 .

[30]  Francis T. Cullen,et al.  CRIME IN THE IVORY TOWER: THE LEVEL AND SOURCES OF STUDENT VICTIMIZATION* , 1998 .

[31]  D. Mann,et al.  NETCRIME More Change in the Organization of Thieving , 1998 .

[32]  John M. Boyle,et al.  Victimization of Persons by Fraud , 1995 .

[33]  Kenneth C. Land,et al.  MACRO‐MICRO INTEGRATION IN THE STUDY OF VICTIMIZATION: A HIERARCHICAL LOGISTIC MODEL ANALYSIS ACROSS SEATTLE NEIGHBORHOODS* , 1994 .

[34]  Terance D. Miethe,et al.  Opportunity, Choice, and Criminal Victimization: A Test of a Theoretical Model , 1990 .

[35]  Robert J. Sampson,et al.  Deviant Lifestyles, Proximity to Crime, and the Offender-Victim Link in Personal Violence , 1990 .

[36]  Leslie W. Kennedy,et al.  ROUTINE ACTIVITIES AND CRIME: AN ANALYSIS OF VICTIMIZATION IN CANADA * , 1990 .

[37]  Robert J. Sampson,et al.  Linking the micro- and macro-level dimensions of lifestyle-routine activity and opportunity models of predatory victimization , 1987 .

[38]  M. Maxfield Household composition, routine activity, and victimization: A comparative analysis , 1987 .

[39]  Judith R. Blau,et al.  Routine Leisure Activities and Rates of Crime: A Macro-Level Analysis , 1987 .

[40]  Kenneth C. Land,et al.  Age structure and crime: symmetry versus asymmetry and the projection of crime rates through the 1990s , 1987 .

[41]  Steven F. Messner,et al.  THE SOCIAL ECOLOGY OF URBAN HOMICIDE: AN APPLICATION OF THE “ROUTINE ACTIVITIES” APPROACH , 1985 .

[42]  James R. Kluegel,et al.  Social Inequality and Predatory Criminal Victimization: An Exposition and Test of a Formal Theory , 1981 .

[43]  Lawrence E. Cohen,et al.  The Determinants of Larceny: an Empirical and Theoretical Study , 1980 .

[44]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[45]  Michael R. Gottfredson,et al.  Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization , 1977 .