Differentiating identity theft: An exploratory study of victims using a national victimization survey☆

Despite the widespread attention given to identity theft, there is much confusion on how best to define and measure it. Recent attempts to measure its extent through victimization surveys or law enforcement files have varied considerably in the types of crimes included as identity theft. Some studies include credit card fraud, while others exclude it. This inconsistency in data collection has made it difficult to assess properly the extent of the crime. The current study uses data from the National Public Survey on White Collar Crime to determine the degree to which including credit card fraud as a type of identity theft affects victim profiles encompassing demographic characteristics, risky activities, and reporting decisions. Specifically, we compare victim profiles for victims of existing credit card fraud, new credit card fraud, and existing bank account fraud. Findings from our exploratory study suggest that including existing credit card fraud may obscure the fact that those who are female, black, young, and low income are disproportionately victimized by existing bank account fraud, which is the type of identity theft most financially damaging and most difficult to clear up for individuals.

[1]  R. Groves Theories and Methods of Telephone Surveys , 1990 .

[2]  K. Anderson Who are the Victims of Identity Theft? The Effect of Demographics , 2006 .

[3]  S. Cole,et al.  “Don’t Be Low Hanging Fruit”: Identity e as Moral Panic , 2006 .

[4]  M. Benson,et al.  Sentencing the White-Collar Offender , 1988 .

[5]  Christine E. Bose,et al.  THE SERIOUSNESS OF CRIMES: NORMATIVE STRUCTURE AND INDIVIDUAL DIFFERENCES* , 1974 .

[6]  A. Schoepfer,et al.  Studying the correlates of fraud victimization and reporting , 2009 .

[7]  Marc G. Gertz,et al.  Public perceptions of white-collar crime and punishment , 2008 .

[8]  Stewart J. D'alessio,et al.  Race, economic inequality, and violent crime , 2006 .

[9]  A. Rose,et al.  The Power Structure. , 1968 .

[10]  Heith Copes,et al.  Reporting behavior of fraud victims and black's theory of law: An empirical assessment , 2001 .

[11]  M. Hindelang,et al.  A consideration of telescoping and memory decay biases in victimization surveys , 1977 .

[12]  Richard M. Stana Identity Theft: Prevalence and Cost Appear to Be Growing , 2002 .

[13]  Michael D. Reisig,et al.  Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .

[14]  T. Holt,et al.  Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .

[15]  Alex R. Piquero,et al.  How Much is the Public Willing to Pay to be Protected from Identity Theft? , 2011 .

[16]  T. Holt,et al.  Exploring stolen data markets online: products and market forces , 2010 .

[17]  G. McNair,et al.  Identity Theft , 2007, The SAGE Encyclopedia of Criminal Psychology.

[18]  Michael D. Reisig,et al.  Perceived Risk of Internet Theft Victimization , 2009 .

[19]  A. Piquero,et al.  Research Note: Assessing the Perceived Seriousness of White-Collar and Street Crimes , 2008 .

[20]  M. Benson,et al.  The effect of social support on fraud victims' reporting behavior: A research note , 1996 .

[21]  Robert G. Morris,et al.  Media Constructions of Identity Theft , 2008 .

[22]  Sean B. Hoar Identity Theft: The Crime of the New Millenium , 2001 .

[23]  Perspectives on Identity Theft , 2008 .

[24]  D. Weisburd,et al.  White-Collar Crime and Criminal Careers , 2001 .

[25]  Lynne M. Vieraitis,et al.  Bridging the Gap Between Research and Practice: How Neutralization Theory Can Inform Reid Interrogations of Identity Thieves , 2007 .

[26]  T. Holt,et al.  The Effect of Self-Control on Victimization in the Cyberworld , 2010 .

[27]  G. Newman,et al.  Identity Theft Literature Review , 2005 .

[28]  Michael D. Reisig,et al.  LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .

[29]  L. Foley,et al.  Identity Theft: The Aftermath 2008 , 2009 .

[30]  Robert G. Morris Identity Thieves and Levels of Sophistication: Findings from a National Probability Sample of American Newspaper Articles 1995–2005 , 2010 .

[31]  Kim Michelle Lersch,et al.  Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics , 2005 .

[32]  F. T. Cullen,et al.  Studying and Teaching White‐Collar Crime: Populist and Patrician Perspectives , 2008 .

[33]  Robert F. Kidd,et al.  Why Do Victims Fail to Report? The Psychology of Criminal Victimization , 1984 .

[34]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[35]  Heith Copes,et al.  Understanding Identity Theft , 2009 .

[36]  Heith Copes,et al.  Bounded rationality of identity thieves: Using offender‐based research to inform policy* , 2009 .