2008
DOI: 10.1504/ijmc.2008.016577
|View full text |Cite
|
Sign up to set email alerts
|

Identity theft in the USA: evidence from 2002 to 2006

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
9
0
2

Year Published

2008
2008
2023
2023

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 17 publications
2
9
0
2
Order By: Relevance
“…In addition to the five characteristics, many studies have identified ICT security or confidentiality and costs as significant factors influencing ICT adoption (Aljitri et al , 2003; Asia Pacific Economic Cooperation, 1999; Beale, 1999; Bhimani, 1996; Bird, 1997; Chou et al , 2008; Ernst & Young, 2001; Hill and Jones, 2001; Hoi et al , 2003; Hussin and Noor, 2005; James, 2003; Koong et al , 2008; Light, 2001; Limthongchai and Speece, 2003; Organization for Economic Cooperation and Development, 2000; Ratnasingam, 2001; Rose et al , 1999). All these seven measures are therefore integrated to form the independent variables of this study.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition to the five characteristics, many studies have identified ICT security or confidentiality and costs as significant factors influencing ICT adoption (Aljitri et al , 2003; Asia Pacific Economic Cooperation, 1999; Beale, 1999; Bhimani, 1996; Bird, 1997; Chou et al , 2008; Ernst & Young, 2001; Hill and Jones, 2001; Hoi et al , 2003; Hussin and Noor, 2005; James, 2003; Koong et al , 2008; Light, 2001; Limthongchai and Speece, 2003; Organization for Economic Cooperation and Development, 2000; Ratnasingam, 2001; Rose et al , 1999). All these seven measures are therefore integrated to form the independent variables of this study.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Hackers often attack mobile devices to obtain transient information and static information. Transient information includes the phone's location, its power usage, and other data the device does not normally record (Koong et al, 2008). Even without advanced location services, attacks can still locate phones with mobile regions even if the phones are not in active use.…”
Section: Threatsmentioning
confidence: 99%
“…Since the decade when the internet has been opened for commercial use, computer crimes have flourished (Hancock, 1999;Swartz, 2004). Nations, big and small, economies that are classified as advanced or developing, countries located across the globe, religious or secular by culture, have occurrences of financial and other types of fraud reported (Gengler, 2001;Hunton, 2009;Koong et al, 2008b;Liu et al, 2005;Meulen, 2006;Roberts et al, 2013;Sandywell, 2010). For example, in the Western world, one of every 25 adults has been a victim of internet crime (Roberts et al, 2013).…”
Section: Introductionmentioning
confidence: 99%