Who Responded to Equifax? Self-Protection Strategies When Guardians Fail

Routine activity theory suggests that crime occurs when a motivated offender meets a suitable target and no capable guardian is present. In identity theft that occurs online, potential victims can sometimes act as their own guardians. Self-protection strategies, such as identity theft monitoring sof...

Full description

Saved in:  
Bibliographic Details
Main Author: Dearden, Thomas (Author)
Format: Electronic Article
Language:English
Published: 2021
In: Victims & offenders
Year: 2021, Volume: 16, Issue: 8, Pages: 1149-1160
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000naa a22000002c 4500
001 1774532042
003 DE-627
005 20211020061633.0
007 cr uuu---uuuuu
008 211020s2021 xx |||||o 00| ||eng c
024 7 |a 10.1080/15564886.2021.1876801  |2 doi 
035 |a (DE-627)1774532042 
035 |a (DE-599)KXP1774532042 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Dearden, Thomas  |e VerfasserIn  |4 aut 
245 1 0 |a Who Responded to Equifax? Self-Protection Strategies When Guardians Fail 
264 1 |c 2021 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Routine activity theory suggests that crime occurs when a motivated offender meets a suitable target and no capable guardian is present. In identity theft that occurs online, potential victims can sometimes act as their own guardians. Self-protection strategies, such as identity theft monitoring software, can be implemented by potential victims to act as guardians against identity theft. Little is known about the situations when a suitable target becomes their own guardian. This article seeks to understand this situation by looking at self-protection behaviors after the Equifax breach of 2017. Using data from a North Carolina Poll Survey, we examine self-protection measures implemented following this potential victimization. When do individuals enact their own self-guardian behaviors? We find that measures of computer use do not predict whether an individual will enact self-protection measures following the Equifax breach. Rather, we find that negative emotions around identity theft lead individuals to enact self-protection measures. 
650 4 |a Victimization 
650 4 |a Fraud 
650 4 |a Routine Activities Theory 
650 4 |a Technology 
773 0 8 |i Enthalten in  |t Victims & offenders  |d London [u.a.] : Taylor & Francis, 2006  |g 16(2021), 8, Seite 1149-1160  |h Online-Ressource  |w (DE-627)512879672  |w (DE-600)2237556-9  |w (DE-576)272350850  |x 1556-4991  |7 nnas 
773 1 8 |g volume:16  |g year:2021  |g number:8  |g pages:1149-1160 
856 4 0 |u https://doi.org/10.1080/15564886.2021.1876801  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3991487284 
LOK |0 003 DE-627 
LOK |0 004 1774532042 
LOK |0 005 20211020061633 
LOK |0 008 211020||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2021-10-19#FE1F7BED38FC403D2F7AC4B8582BF34C59210C38 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw