Who Responded to Equifax? Self-Protection Strategies When Guardians Fail
Routine activity theory suggests that crime occurs when a motivated offender meets a suitable target and no capable guardian is present. In identity theft that occurs online, potential victims can sometimes act as their own guardians. Self-protection strategies, such as identity theft monitoring sof...
1. VerfasserIn: | |
---|---|
Medienart: | Elektronisch Aufsatz |
Sprache: | Englisch |
Veröffentlicht: |
2021
|
In: |
Victims & offenders
Jahr: 2021, Band: 16, Heft: 8, Seiten: 1149-1160 |
Online-Zugang: |
Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Verfügbarkeit prüfen: | HBZ Gateway |
Schlagwörter: |
MARC
LEADER | 00000naa a22000002c 4500 | ||
---|---|---|---|
001 | 1774532042 | ||
003 | DE-627 | ||
005 | 20211020061633.0 | ||
007 | cr uuu---uuuuu | ||
008 | 211020s2021 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1080/15564886.2021.1876801 |2 doi | |
035 | |a (DE-627)1774532042 | ||
035 | |a (DE-599)KXP1774532042 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Dearden, Thomas |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Who Responded to Equifax? Self-Protection Strategies When Guardians Fail |
264 | 1 | |c 2021 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Routine activity theory suggests that crime occurs when a motivated offender meets a suitable target and no capable guardian is present. In identity theft that occurs online, potential victims can sometimes act as their own guardians. Self-protection strategies, such as identity theft monitoring software, can be implemented by potential victims to act as guardians against identity theft. Little is known about the situations when a suitable target becomes their own guardian. This article seeks to understand this situation by looking at self-protection behaviors after the Equifax breach of 2017. Using data from a North Carolina Poll Survey, we examine self-protection measures implemented following this potential victimization. When do individuals enact their own self-guardian behaviors? We find that measures of computer use do not predict whether an individual will enact self-protection measures following the Equifax breach. Rather, we find that negative emotions around identity theft lead individuals to enact self-protection measures. | ||
650 | 4 | |a Victimization | |
650 | 4 | |a Fraud | |
650 | 4 | |a Routine Activities Theory | |
650 | 4 | |a Technology | |
773 | 0 | 8 | |i Enthalten in |t Victims & offenders |d London [u.a.] : Taylor & Francis, 2006 |g 16(2021), 8, Seite 1149-1160 |h Online-Ressource |w (DE-627)512879672 |w (DE-600)2237556-9 |w (DE-576)272350850 |x 1556-4991 |7 nnas |
773 | 1 | 8 | |g volume:16 |g year:2021 |g number:8 |g pages:1149-1160 |
856 | 4 | 0 | |u https://doi.org/10.1080/15564886.2021.1876801 |x Resolving-System |z lizenzpflichtig |3 Volltext |
935 | |a mkri | ||
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3991487284 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1774532042 | ||
LOK | |0 005 20211020061633 | ||
LOK | |0 008 211020||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2021-10-19#FE1F7BED38FC403D2F7AC4B8582BF34C59210C38 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota | ||
ORI | |a SA-MARC-krimdoka001.raw |