Javascript must be enabled to continue!
The identity theft response system
View through CrossRef
Identity theft continues to grow in prevalence and complexity. Despite this growth, little is known about the identity theft response system and how it assists victims to recover. This study examines the response system by analysing 211 identity theft cases reported to IDCARE, a national identity and cybercrime victim support service. The study applies a sociotechnical systems methodology to establish the social, task and information processes of the Australian identity theft response system. The study also examines identity theft victims’ response activities and needs over a 12-month period. The identity theft response system is almost entirely dependent on the victim to respond to and limit the harm caused by identity theft. Overall, the response system is disjointed and lacking in coordination.
Title: The identity theft response system
Description:
Identity theft continues to grow in prevalence and complexity.
Despite this growth, little is known about the identity theft response system and how it assists victims to recover.
This study examines the response system by analysing 211 identity theft cases reported to IDCARE, a national identity and cybercrime victim support service.
The study applies a sociotechnical systems methodology to establish the social, task and information processes of the Australian identity theft response system.
The study also examines identity theft victims’ response activities and needs over a 12-month period.
The identity theft response system is almost entirely dependent on the victim to respond to and limit the harm caused by identity theft.
Overall, the response system is disjointed and lacking in coordination.
Related Results
Employee Online Reviews and Corporate Wage Theft
Employee Online Reviews and Corporate Wage Theft
<div>
Wage theft occurs when an employer withholds benefits, such as wages and breaks, to <span>which an employee is legally entitled. This practice is the la...
Gauging the effectiveness of US identity theft legislation
Gauging the effectiveness of US identity theft legislation
PurposeTo examine identity theft in the United States and to provide an overview and assessment of recent legislation designed to assist identity theft victims and punish offenders...
UNDERSTANDING IDENTITY THEFT AND FRAUD
UNDERSTANDING IDENTITY THEFT AND FRAUD
Identity theft and identity fraud represent the fastest-growing forms of computer crime, having significant consequences for individuals, corporations, and financial institutions. ...
Adoption of identity theft protection services in social media: A PMT investigation
Adoption of identity theft protection services in social media: A PMT investigation
In the last few years, social media has become a part of our lives. It is not a website anymore. It offers us blogging, watching videos, and connecting with more people. In our soc...
A Review of Cybersecurity as an Effective Tool for Fighting Identity Theft across United States
A Review of Cybersecurity as an Effective Tool for Fighting Identity Theft across United States
The study is focused on identity theft and cybersecurity in United States. Hence, the study is aimed at examining the impact of cybersecurity on identity theft in United States usi...
EPD Electronic Pathogen Detection v1
EPD Electronic Pathogen Detection v1
Electronic pathogen detection (EPD) is a non - invasive, rapid, affordable, point- of- care test, for Covid 19 resulting from infection with SARS-CoV-2 virus. EPD scanning techno...
SOCIOCULTURAL IDENTITY POSTMODERN: PROBLEM OF SOCIAL CONSTRUCTION
SOCIOCULTURAL IDENTITY POSTMODERN: PROBLEM OF SOCIAL CONSTRUCTION
Problem setting. The relevance of our study is due to the excessive popularity of the concept of «socio-cultural identity» as a scientific term and tool for studying the postmodern...
Smart Anti-Theft System for Electric Vehicle
Smart Anti-Theft System for Electric Vehicle
The Smart Anti-Theft Car System is an innovative project designed to enhance the security features of conventional vehicles and mitigate the risks associated with unauthorized acce...

