Differentiating identity theft: An exploratory study of victims using a national victimization survey☆
暂无分享,去创建一个
John Kane | Heith Copes | Heith Copes | J. Kane | Kent R. Kerley | Rodney Huff | Kent Kerley | Rodney M Huff
[1] R. Groves. Theories and Methods of Telephone Surveys , 1990 .
[2] K. Anderson. Who are the Victims of Identity Theft? The Effect of Demographics , 2006 .
[3] S. Cole,et al. “Don’t Be Low Hanging Fruit”: Identity e as Moral Panic , 2006 .
[4] M. Benson,et al. Sentencing the White-Collar Offender , 1988 .
[5] Christine E. Bose,et al. THE SERIOUSNESS OF CRIMES: NORMATIVE STRUCTURE AND INDIVIDUAL DIFFERENCES* , 1974 .
[6] A. Schoepfer,et al. Studying the correlates of fraud victimization and reporting , 2009 .
[7] Marc G. Gertz,et al. Public perceptions of white-collar crime and punishment , 2008 .
[8] Stewart J. D'alessio,et al. Race, economic inequality, and violent crime , 2006 .
[9] A. Rose,et al. The Power Structure. , 1968 .
[10] Heith Copes,et al. Reporting behavior of fraud victims and black's theory of law: An empirical assessment , 2001 .
[11] M. Hindelang,et al. A consideration of telescoping and memory decay biases in victimization surveys , 1977 .
[12] Richard M. Stana. Identity Theft: Prevalence and Cost Appear to Be Growing , 2002 .
[13] Michael D. Reisig,et al. Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory , 2010 .
[14] T. Holt,et al. Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization , 2008 .
[15] Alex R. Piquero,et al. How Much is the Public Willing to Pay to be Protected from Identity Theft? , 2011 .
[16] T. Holt,et al. Exploring stolen data markets online: products and market forces , 2010 .
[17] G. McNair,et al. Identity Theft , 2007, The SAGE Encyclopedia of Criminal Psychology.
[18] Michael D. Reisig,et al. Perceived Risk of Internet Theft Victimization , 2009 .
[19] A. Piquero,et al. Research Note: Assessing the Perceived Seriousness of White-Collar and Street Crimes , 2008 .
[20] M. Benson,et al. The effect of social support on fraud victims' reporting behavior: A research note , 1996 .
[21] Robert G. Morris,et al. Media Constructions of Identity Theft , 2008 .
[22] Sean B. Hoar. Identity Theft: The Crime of the New Millenium , 2001 .
[23] Perspectives on Identity Theft , 2008 .
[24] D. Weisburd,et al. White-Collar Crime and Criminal Careers , 2001 .
[25] Lynne M. Vieraitis,et al. Bridging the Gap Between Research and Practice: How Neutralization Theory Can Inform Reid Interrogations of Identity Thieves , 2007 .
[26] T. Holt,et al. The Effect of Self-Control on Victimization in the Cyberworld , 2010 .
[27] G. Newman,et al. Identity Theft Literature Review , 2005 .
[28] Michael D. Reisig,et al. LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .
[29] L. Foley,et al. Identity Theft: The Aftermath 2008 , 2009 .
[30] Robert G. Morris. Identity Thieves and Levels of Sophistication: Findings from a National Probability Sample of American Newspaper Articles 1995–2005 , 2010 .
[31] Kim Michelle Lersch,et al. Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics , 2005 .
[32] F. T. Cullen,et al. Studying and Teaching White‐Collar Crime: Populist and Patrician Perspectives , 2008 .
[33] Robert F. Kidd,et al. Why Do Victims Fail to Report? The Psychology of Criminal Victimization , 1984 .
[34] Richard A. Clarke,et al. Cyber War: The Next Threat to National Security and What to Do About It , 2010 .
[35] Heith Copes,et al. Understanding Identity Theft , 2009 .
[36] Heith Copes,et al. Bounded rationality of identity thieves: Using offender‐based research to inform policy* , 2009 .