Hello, You’ve been hacked: a study of victim notification preferences
In the context of identity theft, raising victims’ awareness is crucial to mitigate ensuing fraud. This study employs a two-part approach to evaluate the mode and content preferences for identity theft victimization notifications as well as recipients’ willingness to engage with these notifications....
Main Author: | |
---|---|
Contributors: | ; ; ; ; |
Format: | Electronic Article |
Language: | English |
Published: |
2025
|
In: |
Journal of crime and justice
Year: 2025, Volume: 48, Issue: 1, Pages: 56-72 |
Online Access: |
Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000caa a22000002c 4500 | ||
---|---|---|---|
001 | 1916275346 | ||
003 | DE-627 | ||
005 | 20250205043101.0 | ||
007 | cr uuu---uuuuu | ||
008 | 250204s2025 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1080/0735648X.2024.2340554 |2 doi | |
035 | |a (DE-627)1916275346 | ||
035 | |a (DE-599)KXP1916275346 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Muniz, Caitlyn N. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hello, You’ve been hacked: a study of victim notification preferences |
264 | 1 | |c 2025 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a In the context of identity theft, raising victims’ awareness is crucial to mitigate ensuing fraud. This study employs a two-part approach to evaluate the mode and content preferences for identity theft victimization notifications as well as recipients’ willingness to engage with these notifications. Notably, results underscore young adults’ inclination toward text message notifications featuring legitimizing credentials, signifying authenticity, and fostering rapid responses. Surprisingly, a randomized controlled trial yields a counterintuitive finding: actual identity theft victims display restrained interaction with text-based notifications, regardless of credential presence. The implications of these unexpected patterns guide theory and aid in the development of proactive policy initiatives. | ||
650 | 4 | |a Victimization | |
650 | 4 | |a Fraud | |
650 | 4 | |a Identity Theft | |
650 | 4 | |a Cybercrime | |
700 | 1 | |a Fisher, Taylor |e VerfasserIn |0 (DE-588)1313960470 |0 (DE-627)187631835X |4 aut | |
700 | 1 | |a Smith, Katelyn |e VerfasserIn |4 aut | |
700 | 1 | |a Ali, Roan |e VerfasserIn |4 aut | |
700 | 1 | |a Howell, Christian Jordan |e VerfasserIn |0 (DE-588)131401160X |0 (DE-627)1876362200 |4 aut | |
700 | 1 | |a Maimon, David |d 1978- |e VerfasserIn |0 (DE-588)1172431957 |0 (DE-627)104120115X |0 (DE-576)51451289X |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Journal of crime and justice |d London [u.a.] : Routledge, Taylor & Francis Group, 1984 |g 48(2025), 1, Seite 56-72 |h Online-Ressource |w (DE-627)654743452 |w (DE-600)2599262-4 |w (DE-576)352346353 |x 2158-9119 |7 nnas |
773 | 1 | 8 | |g volume:48 |g year:2025 |g number:1 |g pages:56-72 |
856 | 4 | 0 | |u https://doi.org/10.1080/0735648X.2024.2340554 |x Resolving-System |z lizenzpflichtig |3 Volltext |
935 | |a mkri | ||
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4660293920 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1916275346 | ||
LOK | |0 005 20250204043606 | ||
LOK | |0 008 250204||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2025-02-03#6A9DB820CE8F1E5288B8CF05B2E3B0F8DD64B3B6 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota | ||
ORI | |a SA-MARC-krimdoka001.raw |