Access the full text.
Sign up today, get DeepDyve free for 14 days.
Chad Albrecht, Conan Albrecht, S. Landau, Ricardo Malagueño (2008)
Financial Statement Fraud: learn from the mistakes of the U.S. or follow in the footsteps of its errors
Wenjie Wang, Yufei Yuan, N. Archer (2006)
A contextual framework for combating identity theftIEEE Security & Privacy, 4
Jennifer Lynch (2005)
Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing AttacksLSN: Unsolicited Commercial Email (Spam) (Sub-Topic)
W.S. Albrecht, C.C. Albrecht, C. Albrecht, M. Zimbelman
Fraud Examination
Katherine Slosarik (2002)
Identity theft: An overview of the problemThe Justice Professional, 15
H. Berghel (2000)
Identity theft, social security numbers, and the WebCommun. ACM, 43
K. Saunders, Bruce Zucker (1999)
Counteracting Identity Fraud in the Information Age: The Identitiy Theft and Assumption Deterrence ActInternational Review of Law, Computers & Technology, 13
K.M. Saunders, B. Zucker
Counteracting identity fraud in the information age: the identity theft and assumption act
H. Towle (2004)
Identity Theft: Myths, Methods, and New LawRutgers Computer and Technology Law Journal, 30
Avivah Litan (2005)
Phishing Attack Victims Likely Targets for Identity Theft
A. Elbirt (2005)
Who are you? How to protect against identity theftIEEE Technology and Society Magazine, 24
T. Donaldson, L. Preston (1995)
The Stakeholder Theory of the Corporation: Concepts, Evidence, and ImplicationsAcademy of Management Review, 20
United States Federal Trade Commission
Identity Theft, Consumer Sentinel Network
W. Albrecht, Chad Albrecht (2003)
Fraud Examination and Prevention
T. Sharp, Andrea Shreve-Neiger, W. Fremouw, J. Kane, S. Hutton (2004)
Exploring the psychological and somatic impact of identity theft.Journal of forensic sciences, 49 1
Alan Smith, Allen Lias (2005)
Identity Theft and E-Fraud as Critical CRM ConcernsInt. J. Enterp. Inf. Syst., 1
Catherine Pastrikos (2004)
Identity Theft Statutes: Which Will Protect Americans the Most?Albany law review, 67
Purpose – The purpose of this paper is to present and explain the identity theft cycle. The identity theft cycle explains how a perpetrator goes through various stages of confidence and experimentation when stealing an individual's identity. Design/methodology/approach – The paper takes a conceptual approach by first describing identity theft in detail and then discussing the seriousness of identity theft for consumers today. The paper then presents and explains the identity theft cycle in greater detail including the stages of discovery, action, and trial. Findings – The paper provides evidence to suggest that if identity theft is detected early, consumers can protect themselves from the vast and difficult consequences of identity theft. Originality/value – This paper fulfills an important area of research by providing basic information about the nature of identity theft. This paper also discusses the various ways that perpetrators steal consumers' information, as well as teaches consumers how to proactively protect themselves from identity theft.
Journal of Financial Crime – Emerald Publishing
Published: Oct 11, 2011
Keywords: Fraud; Theft; Consumer fraud; Identity theft; The identity theft cycle
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.