Hello, You’ve been hacked: a study of victim notification preferences

In the context of identity theft, raising victims’ awareness is crucial to mitigate ensuing fraud. This study employs a two-part approach to evaluate the mode and content preferences for identity theft victimization notifications as well as recipients’ willingness to engage with these notifications....

Full description

Saved in:  
Bibliographic Details
Main Author: Muniz, Caitlyn N. (Author)
Contributors: Fisher, Taylor ; Smith, Katelyn ; Ali, Roan ; Howell, Christian Jordan ; Maimon, David 1978-
Format: Electronic Article
Language:English
Published: 2025
In: Journal of crime and justice
Year: 2025, Volume: 48, Issue: 1, Pages: 56-72
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002c 4500
001 1916275346
003 DE-627
005 20250205043101.0
007 cr uuu---uuuuu
008 250204s2025 xx |||||o 00| ||eng c
024 7 |a 10.1080/0735648X.2024.2340554  |2 doi 
035 |a (DE-627)1916275346 
035 |a (DE-599)KXP1916275346 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Muniz, Caitlyn N.  |e VerfasserIn  |4 aut 
245 1 0 |a Hello, You’ve been hacked: a study of victim notification preferences 
264 1 |c 2025 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a In the context of identity theft, raising victims’ awareness is crucial to mitigate ensuing fraud. This study employs a two-part approach to evaluate the mode and content preferences for identity theft victimization notifications as well as recipients’ willingness to engage with these notifications. Notably, results underscore young adults’ inclination toward text message notifications featuring legitimizing credentials, signifying authenticity, and fostering rapid responses. Surprisingly, a randomized controlled trial yields a counterintuitive finding: actual identity theft victims display restrained interaction with text-based notifications, regardless of credential presence. The implications of these unexpected patterns guide theory and aid in the development of proactive policy initiatives. 
650 4 |a Victimization 
650 4 |a Fraud 
650 4 |a Identity Theft 
650 4 |a Cybercrime 
700 1 |a Fisher, Taylor  |e VerfasserIn  |0 (DE-588)1313960470  |0 (DE-627)187631835X  |4 aut 
700 1 |a Smith, Katelyn  |e VerfasserIn  |4 aut 
700 1 |a Ali, Roan  |e VerfasserIn  |4 aut 
700 1 |a Howell, Christian Jordan  |e VerfasserIn  |0 (DE-588)131401160X  |0 (DE-627)1876362200  |4 aut 
700 1 |a Maimon, David  |d 1978-  |e VerfasserIn  |0 (DE-588)1172431957  |0 (DE-627)104120115X  |0 (DE-576)51451289X  |4 aut 
773 0 8 |i Enthalten in  |t Journal of crime and justice  |d London [u.a.] : Routledge, Taylor & Francis Group, 1984  |g 48(2025), 1, Seite 56-72  |h Online-Ressource  |w (DE-627)654743452  |w (DE-600)2599262-4  |w (DE-576)352346353  |x 2158-9119  |7 nnas 
773 1 8 |g volume:48  |g year:2025  |g number:1  |g pages:56-72 
856 4 0 |u https://doi.org/10.1080/0735648X.2024.2340554  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4660293920 
LOK |0 003 DE-627 
LOK |0 004 1916275346 
LOK |0 005 20250204043606 
LOK |0 008 250204||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2025-02-03#6A9DB820CE8F1E5288B8CF05B2E3B0F8DD64B3B6 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw