Search results
1 – 10 of over 10000Robert E. Holtfreter and Kristy Holtfreter
To examine identity theft in the United States and to provide an overview and assessment of recent legislation designed to assist identity theft victims and punish offenders.
Abstract
Purpose
To examine identity theft in the United States and to provide an overview and assessment of recent legislation designed to assist identity theft victims and punish offenders.
Design/methodology/approach
Statistics on the prevalence of identity theft are included, as well as details from a fact‐based, fairly typical case of identify theft. An overview of the Fair and Accurate Credit Transactions Act (FACTA) and the Identity Theft Penalty Act (ITPEA) are provided, and the provisions of each act are analyzed.
Findings
It will take time to determine to what extent the provisions in FACTA and ITPEA will prevent or reduce identity theft. No doubt, in the future, there will amendments to both acts.
Research limitations/implications
Future empirical studies could inform all interested parties by examining the impact of the FACTA and ITPEA over a multi‐year time frame. Moreover, cross‐cultural comparisons focusing on the ways in which other nations address identity theft will also shed light on the issues discussed herein.
Originality/value
The topic of identity theft remains salient to researchers as well as criminal justice practitioners and victim advocates. Public education to increase knowledge of identity theft, and to provide information and resources for victims, will be critical in the future.
Details
Keywords
Robert Smith and Gerard McElwee
To explore and document the emerging international market for stolen tractors and plant in the United Kingdom. Whilst this may appear to be a criminological problem relating…
Abstract
Purpose
To explore and document the emerging international market for stolen tractors and plant in the United Kingdom. Whilst this may appear to be a criminological problem relating specifically to rural crime, it is a sophisticated international criminal business organised by traditional organised crime groups (OCGs) such as the Italian, Polish and Turkish Mafia’s in conjunction with a network of criminal entrepreneurs.
Methodology/approach
Using annual statistical data provided by National Farmers Union (NFU) Mutual and Plant and Agricultural National Intelligence Unit (PANIU) and other material sourced using documentary research techniques supplemented by qualitative interviews with industry specialists we present 10 micro-case studies of rural OCGs engaged in this lucrative enterprise crime. The data is verified and authenticated using narrative inquiry techniques.
Findings
There is an entrepreneurial dimension to the crime because traditional criminal families with knowledge of rural areas and rural social capital form alliances with OCGs. The practical utility of the NFU model of entrepreneurial alliances with interested parties including the police is highlighted.
Research limitations/implications
Implications for research design, ethics and the conduct of such research which are identified and discussed. These include the need to develop an investigative framework to protect academic researchers similar to guidelines in place to protect investigative journalists.
Practical implications
An investigative framework and the adaption of the business model canvass (Osterwalder & Pigneur, 2010) to cover illegal business models are proposed.
Social implications
Suggestions are provided for the need to legislate against international criminal conspiracies.
Originality/value
Uses a mixture of entrepreneurship and criminological theories to help develop an understanding of the problem from an investigative perspective.
Details
Keywords
Alexander Joseph Vanhee and Rachel McNealey
The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate…
Abstract
Purpose
The purpose of this study is to examine the effect of micro-level place on identity theft victimization. This study uses the 2016 Identity Theft Supplement (ITS) to investigate whether aspects of an individual’s residence affect their likelihood of becoming identity theft victims.
Design/methodology/approach
The authors conduct logistic regressions of whether a respondent was an identity theft victim in the past year using the following variables as key predictors: number of housing units in a residence, whether the respondent operates a business out of their residence and if residence access is restricted.
Findings
The results suggest that location influences the likelihood of identity theft to a modest degree though some aspects of location (possibly those related to rewards perceptions) may be more relevant than others. Meanwhile, though location may influence initial target selection, whether someone is victimized may be more dependent on factors such as personal behavior.
Originality/value
To the best of the authors’ knowledge, this manuscript represents one of the first investigations into the relationship between microlevel place and the incidence of identity theft. Furthermore, it provides evidence that one does exist which bears further inquiry.
Details
Keywords
Abdullah Maitlo, Nisreen Ameen, Hamid Reza Peikari and Mahmood Shah
Knowledge-sharing (KS) for preventing identity theft has become a major challenge for organisations. The purpose of this paper is to fill a gap in the literature by investigating…
Abstract
Purpose
Knowledge-sharing (KS) for preventing identity theft has become a major challenge for organisations. The purpose of this paper is to fill a gap in the literature by investigating barriers to effective KS in preventing identity theft in online retail organisations.
Design/methodology/approach
A framework was proposed based on a reconceptualisation and extension of the KS enablers framework (Chong et al., 2011). A qualitative case study research method was used for the data collection. In total, 34 semi-structured interviews were conducted in three online retail organisations in the UK.
Findings
The findings suggest that the major barriers to effective KS for preventing identify theft in online retail organisations are: lack of leadership support; lack of employee willingness to share knowledge; lack of employee awareness of KS; inadequate learning opportunities; lack of trust in colleagues; insufficient information-sourcing opportunities and information and communications technology infrastructure; a weak KS culture; lack of feedback on performance; and lack of job rotation.
Practical implications
The research provides solutions for removing existing barriers to KS in preventing identity theft. This is important to reduce the number of cases of identity theft in the UK.
Originality/value
This research extends knowledge of KS in a new context: preventing identity theft in online retail organisations. The proposed framework extends the KS enablers framework by identifying major barriers to KS in the context of preventing identity theft.
Details
Keywords
Employee theft is a significant part of retail losses from shrinkage, yet has been comparatively underexplored compared with shoplifting. The purpose of this paper is to assess…
Abstract
Purpose
Employee theft is a significant part of retail losses from shrinkage, yet has been comparatively underexplored compared with shoplifting. The purpose of this paper is to assess the impacts of different forms of staff theft and fraud upon retail crime losses and analyse the characteristics of offenders.
Design/methodology/approach
The approach is based on a statistical analysis of the details (from retail records) of all staff offenders apprehended for theft by four major UK retailers over a two‐year period. The results are then compared with shrinkage losses for these retailers to discuss the implications of the findings.
Findings
Retailer concentration upon customer theft is difficult to explain given the significance of perceived staff theft on losses from crime. Only a small percentage of staff offenders were caught by retailers, but estimation problems were caused by the fact it was difficult to value the exact amount stolen over time by serial offenders. The majority of people apprehended were young and were believed to have stolen comparatively small amounts of cash or goods. In contrast, a small number of large‐scale offenders were responsible for 47 per cent of total known staff theft. Only a relatively small proportion of known staff crime involved collusion, the major losses were caused by theft of cash, major fraud losses, merchandise and refund fraud.
Practical implications
The implications of this study are significant for retailers. They suggest that retailers may concentrate on smaller‐scale wrongdoers rather than major frauds and that retailers may benefit from switching part of their loss‐prevention resources from shoplifting and minor staff offending to more considerable in‐house frauds.
Originality/value
The paper presents original data based on the characteristics of actual apprehended thieves rather than a discussion based primarily on shrinkage estimates). It presents new information for the academic community concerning the impact of different types of theft and fraud and challenges part at least of retailing conventional wisdom about “Who steals?” and “How?” It is valuable both to the academic community and to retail practitioners.
Details
Keywords
Gary Tryon and Brian H. Kleiner
According to the American Institute of Criminology and Research, employee theft is responsible for over $50 billion worth of losses for both small and large businesses in the USA…
Abstract
According to the American Institute of Criminology and Research, employee theft is responsible for over $50 billion worth of losses for both small and large businesses in the USA. Of this “shrinkage”, approximately 60 per cent is due to employee theft. Explains what kinds of activities constitute employee theft, and discusses the employee motivations, justifications and psychological drives, based on current social science thinking. Identifies the types of evidence ‐ documentary, physical, personal observations and testimonial ‐ and the techniques that can be used to gather this evidence and investigate the theft. Also discusses preventive measures in the form of revised employee reward systems and employee hot lines.
Details
Keywords
Becky J. Oliphant and Gary C. Oliphant
The consequences of employee theft have a profound impact on employers, employees, consumers, and society. Estimates of employee theft range from $40 to $400 billion a year in the…
Abstract
The consequences of employee theft have a profound impact on employers, employees, consumers, and society. Estimates of employee theft range from $40 to $400 billion a year in the USA alone. Although identifying employee theft is difficult, certain behavioral‐based studies have been able to separate employee theft from customer theft (shoplifting). The current study extends a behavioral‐based technique (posting) by posting total monetary loss and total items missing rather than posting the individual targeted items as in the prior studies. The study was conducted in an retail setting (one drug store in a large chain) for a 12‐week period. Data demonstrated posting was able to lower the amount of employee theft while also providing the ability to separate most of the losses caused by employee theft versus shoplifting. Furthermore, the results appear to reinforce the hypothesis that survey data alone may underestimate the actual amount of employee theft.
Details
Keywords
Catherine D. Marcum, George E. Higgins and Alexandria Mackinnon
The purpose of this paper was to explore the identity theft victimization experiences of high school students, as well as the predictors of it being reported to school counselors.
Abstract
Purpose
The purpose of this paper was to explore the identity theft victimization experiences of high school students, as well as the predictors of it being reported to school counselors.
Design/methodology/approach
In July and August 2014, an online survey was sent to every registered member of the American School Counselor’s Association (ASCA). School counselors were questioned about their experiences in regarding online victimization of their students.
Findings
Results of this analysis revealed extremely interesting predictors of school counselor demographics related to the number of reports filed by students.
Research limitations/implications
There was a small response rate because the survey was sent to all registered members of the ASCA, instead of a specific targeted group (which would have been more appropriate).
Practical implications
The results indicate a need for further resources and training dedicated to school counselors to manage identity theft victimization of students.
Originality/value
As far as the authors are aware, no other study of this kind has previously been performed. In addition, there is little known about identity theft victimization of adolescents.
Details
Keywords
The purpose of this paper is to investigate consumer behaviour as it relates to identity theft and fraud.
Abstract
Purpose
The purpose of this paper is to investigate consumer behaviour as it relates to identity theft and fraud.
Design/methodology/approach
Using survey data, this paper models the relationship between past experience of consumers and their levels of concern, and derives the principal components that make up consumer behaviours.
Findings
The components are physical prevention measures, account monitoring, agency monitoring, password security, and risky behaviour avoidance. These components were found to be almost orthogonal, implying that consumers tend to “buy into” a particular component of behaviour. The proposed model of consumer behaviour, while statistically significant, did not have high predictive value.
Research limitations/implications
The survey data used were collected without reference to the model used in this paper, which limits the efficacy of the model.
Practical implications
Consumers use all the behaviours in one component without regard to other components. This can leave “holes” in consumer defence against identity theft and fraud. Consumer education on identity theft and fraud needs to stress that consumers need to employ all behaviours that can minimise risk and loss.
Originality/value
This paper puts forward an initial model of consumer behaviours as it relates to identity theft and fraud. The derivation of the orthogonal components of behaviour is a new and important finding.
Details
Keywords
Benjamin K. Ngugi, Kuo-Ting Hung and Yuanxiang John Li
Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The…
Abstract
Purpose
Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The victim is the real owner of the social security number who will have difficulties getting a tax refund, as the offender has already taken a refund for the year in question. This paper aims to investigate whether the increased use and adoption of electronic tax filing (i.e. E-Filing) technologies has inadvertently resulted in a corresponding growth in Tax Identity Theft.
Design/methodology/approach
Multiple regressions are used to analyze the data that is extracted from the Identity Theft complaint reports (maintained by the Federal Trade Commission) and the tax filing statistics (retrieved from the Internal Revenue Service).
Findings
The results indicate that E-Filing can indirectly but significantly increase Tax Identity Theft through the full mediation effects of individual Self-E-Filing and Direct Deposit adoption, after controlling for general Identity Theft, the number of Individual Tax Returns and Total Refunds.
Originality/value
The authors explore the association between the adoption of tax e-filing technologies and Tax Identity Theft. The findings suggest that the key loopholes in the Tax Identity Theft process are at the Self-E-Filing and the Direct Deposit points. Several practical recommendations for patching these loopholes are provided and discussed.
Details