Psychiatry, Psychology and Law - Tài liệu tham khảo | Đại học Hoa Sen

Psychiatry, Psychology and Law - Tài liệu tham khảo | Đại học Hoa Sen và thông tin bổ ích giúp sinh viên tham khảo, ôn luyện và phục vụ nhu cầu học tập của mình cụ thể là có định hướng, ôn tập, nắm vững kiến thức môn học và làm bài tốt trong những bài kiểm tra, bài tiểu luận, bài tập kết thúc học phần, từ đó học tập tốt và có kết quả

Trường:

Đại học Hoa Sen 4.8 K tài liệu

Thông tin:
15 trang 1 tháng trước

Bình luận

Vui lòng đăng nhập hoặc đăng ký để gửi bình luận.

Psychiatry, Psychology and Law - Tài liệu tham khảo | Đại học Hoa Sen

Psychiatry, Psychology and Law - Tài liệu tham khảo | Đại học Hoa Sen và thông tin bổ ích giúp sinh viên tham khảo, ôn luyện và phục vụ nhu cầu học tập của mình cụ thể là có định hướng, ôn tập, nắm vững kiến thức môn học và làm bài tốt trong những bài kiểm tra, bài tiểu luận, bài tập kết thúc học phần, từ đó học tập tốt và có kết quả

43 22 lượt tải Tải xuống
This article was downloaded by: [York University Libraries]
On: 03 January 2015, At: 15:30
Publisher: Routledge
Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered
office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK
Psychiatry, Psychology and Law
Publication details, including instructions for authors and
subscription information:
http://www.tandfonline.com/loi/tppl20
Fear of Cyber-Identity Theft and
Related Fraudulent Activity
Lynne D. Roberts , David Indermaur & Caroline Spiranovic
a b b
a
School of Psychology and Speech Pathology, Curtin Health
Innovation Research Institute, Curtin University , Perth , Australia
b
Crime Research Centre, University of Western Australia ,
Crawley , Australia
Published online: 01 May 2012.
To cite this article: Lynne D. Roberts , David Indermaur & Caroline Spiranovic (2013) Fear of Cyber-
Identity Theft and Related Fraudulent Activity, Psychiatry, Psychology and Law, 20:3, 315-328, DOI:
10.1080/13218719.2012.672275
To link to this article: http://dx.doi.org/10.1080/13218719.2012.672275
PLEASE SCROLL DOWN FOR ARTICLE
Taylor & Francis makes every effort to ensure the accuracy of all the information (the
“Content”) contained in the publications on our platform. However, Taylor & Francis,
our agents, and our licensors make no representations or warranties whatsoever as to
the accuracy, completeness, or suitability for any purpose of the Content. Any opinions
and views expressed in this publication are the opinions and views of the authors,
and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content
should not be relied upon and should be independently verified with primary sources
of information. Taylor and Francis shall not be liable for any losses, actions, claims,
proceedings, demands, costs, expenses, damages, and other liabilities whatsoever
or howsoever caused arising directly or indirectly in connection with, in relation to or
arising out of the use of the Content.
This article may be used for research, teaching, and private study purposes. Any
substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing,
systematic supply, or distribution in any form to anyone is expressly forbidden. Terms &
Conditions of access and use can be found at http://www.tandfonline.com/page/terms-
and-conditions
© 2013 The Australian and New Zealand Association of Psychiatry, Psychology and Law
Psychiatry, Psychology and Law, 2013
Vol. 20, No. 3, 315–328, http://dx.doi.org/10.1080/13218719.2012.672275
Fear of Cyber-Identity Theft and Related Fraudulent Activity
Lynne D. Roberts
a
, David Indermaur
b
and Caroline Spiranovic
b
a
School of Psychology and Speech Pathology, Curtin Health Innovation Research Institute, Curtin
University, Perth, Australia;
b
Crime Research Centre, University of Western Australia, Crawley,
Australia
Identity theft and related fraudulent activities affect approximately one in twenty-five
adults each year across western societies. The Internet provides a new avenue for
obtaining identity tokens and identifying information and increases the scale on which
identity theft can be perpetrated. Recent research has suggested that fear of these types of
crimes now matches or exceeds the fear of traditional place-based crimes, and has the
potential to curtail online activities and hinder the further development of e-commerce
applications. In this article, we conduct exploratory research identifying predictors of
fear of cyber-identity theft and related fraudulent activities, based on the analysis of
items included in the Australian Survey of Social Attitudes (2007). Fear was predicted by
a generalized fear of crime component and a specific Internet exposure component.
Traditional predictors of fear of crime were insignificant or weak predictors, highlighting
the need for further research.
Key words: cyber-identity theft; cyber-victimization; fear of crime; fraud; identity theft.
The Internet provides new opportunities
for criminal activities. It may be used to
support existing criminal activities, provide
new ways of conducting existing criminal
activities, extend the geographic reach of
criminal activities or create new types of
criminal activity (Savona & Mignone,
2004). One type of cyber-criminal activity
that is frequently featured in the media is
cyber-identity theft and related fraudulent
activity. The Internet enables an extension
from ‘‘traditional’’ identity theft (the mis-
appropriation of identity tokens such as
credit cards through non-technical means
such as mail theft) to the online harvesting
of identity tokens, potentially on a larger
scale due to information and communica-
tion technologies increasing the ease and
reducing the costs (time, financial and
location) of data acquisition. Further, the
Internet provides the means for conducting
fraudulent activity with the stolen identity
tokens, including online banking and e-
commerce.
In this article, we first examine what is
currently known about cyber-identity theft.
Information on the incidence of identity
theft and related fraudulent activity across
three countries, the United States of Amer-
ica (USA), United Kingdom (UK) and
Australia is presented. This analysis high-
lights the difficulty of determining the
percentage of this activity that is cyber-
related. We then examine fear of cyber-
identity theft and related fraudulent activ-
ity, situating our discussion within the body
of literature concerning fear of traditional
place-based crimes. In the body of this
Correspondence: Lynne.Roberts@curtin.edu.au
Downloaded by [York University Libraries] at 15:30 03 January 2015
316 L. D. Roberts et al.
article we examine possible predictors of
fear of cyber-identity theft and related
fraudulent activity. Three categories of
predictors are considered. The first relates
to demographic variables, the second to
fear of traditional crime and the third to
levels of access and activity on the Internet.
It appears that traditional demographic
predictors of fear of crime victimization,
such as age and gender, are poor predictors
of fear of cyber-identity theft victimization.
By contrast, fear of physical place-based
crime and Internet use variables were
relatively stronger predictors of fear of
cyber-identity theft. These results suggest
that to understand the nature of the fear of
cyber-identity theft and related fraudulent
activity comprehensively, a research pro-
gramme incorporating investigations at
both quantitative and qualitative levels is
needed.
Cyber-Identity Theft
Cyber-identity theft
1
involves the online
misappropriation of identity tokens. Com-
mon online identity tokens include email
addresses, web pages and the combination
of username and password used to access
systems such as online banking. Traditional
identity tokens can also be harvested online
and include name, contact details (address,
telephone number), tax file numbers and
social security numbers. These identifiers
are sufficient for an individual to obtain a
credit card in the victim’s name (Sweeney,
2006).
Cyber-identity theft typically combines
the affordances of new information and
communication technologies (ICTs) with
social engineering and includes methods
such as hacking, phishing, pharming, traffic
redirectors, advance-fee frauds, fake taxa-
tion forms, keyloggers and password stea-
lers (Paget, 2007). Hacking has been
employed successfully to obtain mass iden-
tifying information, including the account
information held by Card Systems
Solutions for 40 million credit card custo-
mers (Haygood & Hensley, 2006). The ease
of obtaining identity tokens and identifying
information online changes the scale on
which identity theft can be perpetrated,
expanding the range of potential victims
(Finch, 2007; Marshall & Tompsett, 2005).
The number of individuals directly
affected by cyber-identity theft remains
difficult to estimate, partly because most
victims of identity theft and related frau-
dulent activity are unaware of how the
perpetrator obtained their identity tokens
or identifying information. Whilst the
individual knows they have been the victim
of a fraud, they remain unaware of whether
this was as a result of an online breach or
through some offline means. For example,
Synovate (2007) reported that the majority
(56%) of identity fraud victims did not
know how their identity information was
obtained. In 2001, a United States Federal
Trade Commission director claimed that
fewer than 1% of reported cases of identity
fraud could be linked to the Internet
(Verton, 2001). Similarly, the results from
the Pew Internet Tracking Report (Fox,
2001) indicated that only 8% of identity
theft victims indicated the Internet might
have been involved. Despite the technolo-
gical and personal factors conducive to
cyber-identity theft, at present offline iden-
tity theft appears to be the most commonly
utilized form, although this may change in
the future.
Although the proportion of identity
theft and related fraudulent activity attri-
butable to the Internet is unknown, popu-
lation surveys conducted over the last
decade are providing estimates of the
proportion of the population affected by
identity theft and related fraudulent activity
of all types. Available estimates from the
USA, UK and Australia are reviewed
below. While these prevalence statistics
provide an indication of the extent of the
problem of identity theft, White and Fisher
(2008) caution that our knowledge of
Downloaded by [York University Libraries] at 15:30 03 January 2015
Fear of Cyber-Identity Theft and Related Fraudulent Activity 317
identity theft is hampered by variations in
definitions used and reporting practices.
In the USA, major population surveys
on identity theft have been conducted by
two organizations, Synovate (for the Fed-
eral Trade Commission) and Javelin Strat-
egy and Research. Questions on identity
theft have also been included in the
National Crime Victimization Survey. Ja-
velin Strategy and Research conducted
population-based telephone surveys to es-
timate the number of identity fraud victims.
Survey estimates suggest that the annual
incidence of identity fraud victimizations
decreased over the period 2004 (4.25%) to
2007 (3.58%), but increased in 2008 to
4.32% (Javelin Strategy and Research,
2009). It was estimated that in 2009 in
excess of 11 million Americans had been the
victim of identity fraud (Javelin Strategy
and Research, 2010). The approximate
dollar value associated with the fraudulent
activity followed a similar trend, decreasing
from $60 in 2004 to $45 in 2007, followed
by an increase to $48 in 2008 and $363
2
in
2009 (Javelin Strategy and Research, 2009,
2010). Based on a population telephone
survey, Synovate (2007) estimated that
3.7% of the adult US population were a
victim of identity theft in 2005, a decline
from the 2003 survey estimate provided by
Synovate (2003) of 4.6%. Synovate esti-
mated that in 2005 the median ‘‘out of
pocket’’ expense to individual victims was
nil, and the median time spent resolving
identity theft problems was 4 hours. How-
ever, some victims incurred considerably
higher out of pocket expenses (95th per-
centile $2,000) and spent longer periods
resolving their problems (95th percentile
130 hours). Costs and hours were higher for
victimizations where new accounts were
established than where fraudulent activities
were restricted to existing credit and non-
credit card accounts (Synovate, 2007). The
National Crime Victimization Survey in-
cluded questions about identity theft in
2004, reporting that 3% (3.6 million) of
households in the USA had at least one
household member who was a victim of
identity theft in the previous six months
(Baum, 2006). The results obtained from
these population surveys are reasonably
consistent. They suggest that identity theft
affects about 1 in 25 adults in the USA each
year. However, for the majority of victims,
the financial impact of victimization is
small and only limited time is required to
resolve problems associated with the theft
and resultant fraud.
The major report on identity fraud in
the UK, Identity fraud: A study (Cabinet
Office, 2002); estimated the cost of identity
fraud was £1.3 billion, accounting for
approximately one tenth of all fraud in
the UK [updated in 2006 to £1.72 billion
(see http://www.ips.gov.uk/identity/down-
loads/FINAL-estimate-for-annual-cost-of-
fraud-table-v1-2.pdf]. Questions relating
specifically to credit card fraud experienced
by members of the public were included in
the 2005/2006 British Crime Survey. Based
on survey results, it was estimated that 4%
of UK credit card holders had been victim
of credit card fraud over the previous 12-
month period (Hoare & Wood, 2007). Thus
the estimates of prevalence are very similar
to those for the USA.
In Australia, the most recent reliable
estimates of the extent of identity fraud
come from the Australian Bureau of
Statistics (2008) Personal Fraud survey
conducted in the second half of 2007.
Population estimates from the survey sug-
gest that in the previous 12 months, 3.1% of
Australians over the age of 15 years were
the victims of identity fraud. The majority
(77%) were victims of bank card or credit
card fraud and spent less than 10 hours
resolving the fraudulent activity. More than
a third (36.3%) of credit and bank card
fraud victims and more than a quarter
(26.8%) of other identity theft victims in
this Australian survey did not know the
method of fraud used. However, email or
Internet was identified as the method of
Downloaded by [York University Libraries] at 15:30 03 January 2015
318 L. D. Roberts et al.
fraud in 19.8% of incidents of credit or
bank card fraud and 21.2% of other
identity theft incidents (Australian Bureau
of Statistics, 2008). Despite this, almost half
(45%) of respondents in a further popula-
tion-based survey conducted in Australia
thought the Internet was the most likely
method of identity fraud, with 60% of
respondents concerned about becoming a
victim of identity fraud (Wallis Consulting
Group, 2007). These results indicate that
the public perceive cyber-identity theft to be
a more commonly used form of identity
theft than the statistics indicate is likely to
be the case.
Recent research has begun to analyse
the risk of victimization at state, commu-
nity and individual levels. At a macro level,
Higgins, Hughes, Ricketts, and Wolfe
(2008) examined state-level correlates of
identity theft victimization in the USA,
utilizing Federal Trade Commission re-
ports and census data. Identity theft com-
plaints were higher in states with lower
ratios of males, but higher ratios of African
Americans, residential mobility, public as-
sistance and recreation and entertainment
venues. At a micro level, Anderson (2006)
reanalysed the data from the Federal Trade
Commission’s 2003 survey to examine the
demographic characteristics of identity
theft victims. Age, gender and income
were predictors of identity theft victimiza-
tion, with younger adults, women and the
more affluent more likely to be victims.
In Australia, data regarding the char-
acteristics of victims of identify fraud
(including both identity theft and credit or
bank card fraud) are provided through the
Australian Bureau of Statistics (2008)
Personal Fraud survey. In the 12 months
prior to the survey, identity fraud victimi-
zation was more frequently reported by
males, those aged between 25 and 44 years,
those with higher educational qualifica-
tions, and those with the highest weekly
incomes. Contrasting these results with
those from the USA, it appears that there
may be some cross-cultural variability with
respect to the relationship between identity
fraud and victim demographics such as age
and gender. However, the Australian data
mirror those of the USA in indicating
that affluence is associated with identity
fraud.
Typically, individuals are not regarded
by law enforcement or legal agencies as the
primary victims of identity theft-related
fraud. Instead, the status of primary victim
is assigned to defrauded creditors: typically
banks and other financial organizations
which incur the financial cost of identity-
related fraud (LoPucki, 2001). As pre-
viously outlined, for most individual vic-
tims of identity theft, there are minimal
financial and time costs involved in dealing
with identity-related fraud. However, some
victims can incur financial costs associated
with lost wages, medical expenses and
expenses incurred in restoring the integrity
of identity (Identity Theft Resource Centre,
2003, 2005; Jefferson, 2004; LoPucki, 2001).
The cost to the individual is partially
dependent upon the time interval from the
theft to discovery, such that costs increase
with longer intervals (Synovate, 2003).
Secondary victimization in the form of
denial of credit, increased insurance and
credit card interest rates, cancellation of
credit cards, denial of services (phone,
utilities) and continued contact by collec-
tion agencies may result from impaired
credit rating (Baum, 2006; Identity Theft
Resource Centre, 2005; Synovate 2003).
The psychological, emotional and physical
impact of identity theft also increases for
those who are unable to easily resolve
problems associated with the identity theft
(Sharp, Shreve-Neiger, Fremouw, Kane, &
Hutton, 2004).
While it is possible that the psychologi-
cal impact of identity theft is not affected by
the actual method of its completion (cyber
versus traditional), there may be important
differences. Our current inability to differ-
entiate fraudulent activity by the source of
Downloaded by [York University Libraries] at 15:30 03 January 2015
Fear of Cyber-Identity Theft and Related Fraudulent Activity 319
identity theft means that we are not able to
study the effects with accuracy. However,
we are able to investigate the fear indivi-
duals have of these two forms of identity
theft.
Fear of Crime
While criminal activities can have direct
impacts on individual, organizational and
community victims, they also have a wider
indirect impact on individuals and society
through fear of crime. Fear of crime,
whether or not it has a basis in the
likelihood of crime victimization, can nega-
tively impact on an individual’s physical
and mental wellbeing and social function-
ing through the curtailment of physical and
social activities (Stafford, Chandola, &
Marmot, 2007).
Fear of crime is a concept that has been
defined and measured in a variety of ways
including concern about crime, perceived
risk of victimization, perceived threat and
behavioural responses to fear (Skogan,
1999). Doubt has been cast over whether
the much discussed concept of ‘‘fear of
crime’’ does indeed represent a fear, or is
more accurately defined in terms of a
general anxiety about crime (Warr, 2000).
There are also questions about the best way
to measure, reflect or tap in to the
experience of fear (see Ditton & Farrell
2007).
A range of theories has been developed
to make sense of what we know about the
fear of crime. Briefly, these can be classified
as relating to the vulnerability of the victim
(the ‘‘vulnerability thesis’’); the (perceived)
risk of victimization (the ‘‘instrumental
thesis’’); (perceived) incivilities within the
environment (the ‘‘incivilities thesis’’); and
psychological factors (Hale, 1996).
Demographic factors have been ex-
plored as predictors of fear of crime with
relatively consistent findings that women
and the elderly experience higher levels of
fear of crime than men or younger adults,
despite their lower risk of victimization
(see, e.g., Ziersch, Putland, Palmer, Mac-
Dougall, & Baum, 2007), providing support
for the vulnerability thesis. The vulnerabil-
ity hypothesis is also supported by a range
of findings which have shown that unfami-
liarity is linked to the fear of crime. Perhaps
not surprisingly, people tend to be more
aware of situations and places with which
they are less familiar. Even those who live in
relatively high crime neighbourhoods re-
port feeling safer in those areas closer to
home compared with other areas of the city
even though those other areas may, on an
objective level, be safer.
Fear of crime has consistently been
shown to be out of proportion with the
actual risk of victimization (Chadee, Aus-
ten, & Ditton, 2007). Research from Cana-
da suggests that about 12% of the variance
in fear of crime can be directly attributed to
differences in neighbourhood context (Fitz-
gerald, 2008), providing modest support for
the instrumental hypothesis that fear of
crime simply reflects actual crime rates, at
least at a local level.
Previous research has supported the
proposed relationship between perceptions
of incivilities and fear of crime those that
experience or perceive a higher level of
incivilities also experience higher levels of
fear of crime (Borooah & Carcach, 1997;
Carcach, Frampton, Thomas, & Cranich,
1995; Kanan & Pruitt, 2002; McCrea, Shyy,
Western, & Stimson, 2005; Roberts &
Indermaur, forthcoming; Wyant, 2008).
However, these findings may also be inter-
preted as being consistent with the vulner-
ability hypothesis as perceptions of
incivilities contribute to a heightened
awareness of vulnerability.
Fear of Cyber-Identity Theft
While fear of crime has received substantial
research attention, limited research has
been conducted on fear of cyber-crime, or
more specifically fear of cyber-identity theft
Downloaded by [York University Libraries] at 15:30 03 January 2015
320 L. D. Roberts et al.
and related fraudulent activity. Qualitative
research has suggested that fear of cyber-
identity theft incorporates fear of financial
losses, damage to reputation and loss of
online privacy (Hille, Walsh, Brach, &
Dose, 2011). Some researchers (e.g., Wall,
2008a, 2008b) have argued that fear of
cyber-crime is largely driven by myth
perpetuated by the media, and may not be
in proportion to the objective reality of
cyber-crime. The results from those studies
that have included measures relevant to the
fear of cyber-identity theft and related
fraud in the USA, UK and Australia are
summarized below.
In an early study by the Pew Internet
and American Life Project (Fox, 2001) the
majority of Americans surveyed (87%)
were concerned about credit card theft
online, with 69% ‘‘very concerned’’. Fe-
males, older adults and African Americans
were more likely to be ‘‘very concerned’’
than males, younger adults, Caucasians and
Hispanics respectively.
Although not directly asking about
online fraudulent activity, the British Crime
Survey in 2005/2006 included questions on
fear of credit card fraud. More than half
(57%) of the respondents who owned credit
cards reported that they were ‘‘fairly’’ or
‘‘very’’ worried about being a victim of card
fraud. Notably, this percentage was higher
than worry about any of the traditional
crimes also asked about in the survey.
Respondents who had been the victim of
credit card fraud in the previous year were
more likely to be worried than those who
had not (Hoare & Wood, 2007).
The Australian Survey of Social Atti-
tudes (AuSSA) has been conducted four
times between 2003 and 2009. The 2007
sweep of the survey included, for the first
time, items related to worry about a range
of crimes. Extending on our primary
analysis of the crime and justice items
included in the AuSSA 2007 survey
(Roberts & Indermaur, 2009), in our
recent research (Roberts & Indermaur,
forthcoming) we analysed the AuSSA
survey data to compare worry about tradi-
tional place-based crime with worry about
emerging forms of criminal activity enabled
by the rapid development of ICTs, particu-
larly the Internet. A major finding of this
research was that worry about identity-
related crime is now matching, and for
some offences exceeding, worry about more
traditional place-based crime. The illegal
use of credit cards over the Internet was one
of the crimes included in this survey that
generated the highest levels of worry (23%
‘‘very worried’’, 27.9% ‘‘fairly worried’’).
Fear of having identity stolen via the
Internet was also a source of worry
(15.9% ‘‘very worried’’, 24.4% ‘‘worried’’).
These two items were combined with
worry about having a credit card stolen to
produce a fear of identity-theft-related
crime scale. Then analyses of predictors of
fear as measured by this scale were under-
taken. Traditional predictors of fear of
crime (gender, age, years of education,
location) were found to be poor predictors
of worry about identity-theft-related crime.
Fear of identity-theft-related crime was
lower for males than females, but ac-
counted for less than 1% of the variation
in fear of identity-related crime scores. Age
was not a significant predictor. Location
(metro/rural) and perceptions of incivilities
were significant predictors, accounting for
5.3% of variance (Roberts & Indermaur,
forthcoming).
In this article, we build on this previous
research to specifically examine fear of
cyber-identity theft and related fraudulent
activity, using two items from the AuSSA
survey that specified the Internet in relation
to fear of crime. Given the poor predictive
ability of traditional predictors of fear of
crime to predict fear of cyber-identity theft
and related fraudulent activity, we were
interested in exploring a range of other
possible predictors.
First, a finding from the Australian
Bureau of Statistics (2008) Personal Fraud
Downloaded by [York University Libraries] at 15:30 03 January 2015
Fear of Cyber-Identity Theft and Related Fraudulent Activity 321
survey was that individuals on higher
incomes were at higher risk of victimiza-
tion. We hypothesized that if fear of crime
has some basis in risk of victimization (the
‘‘instrumental hypothesis’’), then fear of
cyber-identity theft and related fraudulent
activity will be higher for those with high
incomes than those on lower incomes.
Second, Roberts and Indermaur (forth-
coming) suggested there may be a general-
ized fear component underlying both fear
of traditional crime and fear of identity-
related crime. We hypothesized that fear of
place-based crime will significantly predict
fear of cyber-identity theft and related
fraudulent activity. Positive results here
would suggest the operation of a general-
ized fear of crime component. The failure to
find a significant relationship might suggest
that fear of place-based crime and fear of
cyber-crime are distinct concepts.
Third, we were interested in whether
Internet use variables could add explana-
tory power in predicting fear of cyber-
identity theft and related fraudulent activ-
ity. We hypothesized that Internet use will
significantly predict fear of cyber-identity
theft and related fraudulent activity (sug-
gesting a level of exposure component).
Positive results here would suggest that fear
may be related to the level of exposure; a
finding in line with the instrumental hy-
pothesis in regard to fear of crime. A
significant but inverse relationship might
suggest that fear is related to unfamiliarity;
a finding in line with the vulnerability
hypothesis.
Method
The AuSSA is a biennial mail-out survey
that measures Australians’ social attitudes
and behaviours (Gibson, Wilson, Meagher,
Denemark, & Western, 2005). The third
biennial survey, AuSSA 2007, was a cross-
sectional mail-out survey, consisting of
three questionnaire versions. A random
selection of 20,000 individuals was obtained
from the Australian electoral roll. Pre-
survey invitation letters were sent to the
randomly selected individuals and were
followed by the survey package and three
reminders. The final set of respondents
consisted of 8,133 adults from all states
and territories in Australia. Final response
rates for the three questionnaires ranged
from 39 to 42%. Further details of the
survey, methodology and weighting of the
sample are provided in Roberts and In-
dermaur (2009). The data set analysed was
provided by the Australian National Uni-
versity (Phillips, Mitchell, Tranter, Clark,
& Reed, 2008).
Participants
The subset of AuSSA 2007 survey respon-
dents included in this research is 1,550
respondents who completed Form C of the
survey and answered each of the questions
of interest for this analysis. Exactly half of
the sample (50%) was female. The mean age
of respondents was 47 years ( 15 years).SD ¼
The majority of respondents (74%) lived
within a metropolitan area of Australia and
had completed a mean of 14 years of
education (SD ¼ 4 years). The majority of
the sample had access to the Internet.
Seventy-four per cent of the sample used
the Internet at home, with 56% of the
sample using the Internet at work.
Measures
The AuSSA 2007 survey covered 35 cate-
gories of attitudes and behaviours. The full
questionnaires are available at http://aus-
sa.anu.edu.au/questionnaires.php. A range
of crime and justice items in the AuSSA
2007 survey were commissioned by the
Australian Institute of Criminology and
were included in two versions of the survey.
Two of the crime and justice items were
used together to produce the measure of
fear of cyber-identity theft and related
fraudulent activity. These items were:
Downloaded by [York University Libraries] at 15:30 03 January 2015
322 L. D. Roberts et al.
How worried are you that the following
will occur to you?
. having your identity stolen via the
Internet;
. having your credit card details used
illegally via the Internet.
These items were selected as covering
the two dimensions of definitions of cyber-
identity theft, the stealing of identity and
the use of the stolen identity in a fraudulent
act (Grover, Berghel, & Cobb, 2011). Each
item was measured on a 4-point response
scale ranging from ‘‘not worried at all’’ to
‘‘very worried’’. The two items were com-
puted into a scale with good internal
consistency (Cronbach’s alpha .86).¼
Data were recoded so that higher scores
on the scale reflects higher levels of fear of
crime. Possible scale scores thus range from
2 to 8.
A further four items were used as a
measure of fear of traditional place-based
crime. Using the same question stem (How
worried are you that the following will
occur to you?) respondents were asked
about being physically attacked at home,
being physically attacked on the street or
other public space, being sexually assaulted
and having their home/place of residence
broken into. Each item was measured on a
4-point response scale ranging from ‘‘not
worried at all’’ to ‘‘very worried’’. The four
items from the questionnaire were com-
bined to produce a scale with good internal
consistency (Cronbach’s alpha ¼ .86). Data
were recoded so that higher scores on the
scale reflect higher levels of fear of crime.
Possible scale scores range from 4 to 16.
Four items were used to provide mea-
sures of Internet use. Using the question
stem ‘‘Please tell us if you use the Internet at
any of the following?’’, two items related to
the site of Internet use (at home and/or at
work). A third item asked respondents: ‘‘In
general, how often do you use the Inter-
net?’’ and was measured on a 7-point scale
ranging from ‘‘several times a day’’ to ‘‘do
not use the Internet’’. The final item asked
respondents: ‘‘How important are the
following in informing your views of crime
trends and the criminal justice system?’’ and
respondents rated the extent to which the
Internet was important in this regard.
Single item measures of age (years),
gender, years of education, location and
gross household annual income were also
retained for the analysis. Gross household
income was recoded into three categories:
low ($0 to $31,199 per annum), medium
($31,200 to $77,999 per annum) and high
($78,000 plus per annum).
Results
Scores were computed for each individual
on the fear of crime scales. The mean scale
score on the fear of cyber-identity theft and
related fraudulent activity scale was 4.97
(SD ¼ 1.9) of a possible scale score range of
2 to 8. The mean scale score on the fear of
physical crime scale was 8.47 ( 2.68)SD ¼
out of a possible scale score range of 4 to 16.
To test the hypotheses that income, fear
of traditional place-based crime and Inter-
net use would be significant predictors of
cyber-identity theft and related fraudulent
activity a hierarchical multiple regression
analysis was conducted.
In the first step of the multiple regres-
sion analysis, traditional predictors of fear
of crime; age, gender, years of education
and location (metropolitan or non-metro-
politan), along with income, were entered
into the analysis. Combined, these demo-
graphic variables accounted for a small, but
significant 0.9% of the variance in fear
of cyber-identity theft and related fraudu-
lent activity (R
2
¼ ¼.009, F(6,1543) 2.34,
p 5 .05). Gender was the only significant
demographic predictor of cyber-identity
theft and related fraudulent activity.
In the second step, fear of physical crime
was entered into the analysis. This ac-
counted for a significant additional 15.7%
Downloaded by [York University Libraries] at 15:30 03 January 2015
Fear of Cyber-Identity Theft and Related Fraudulent Activity 323
of variance in fear of cyber-identity theft and
related fraudulent activity (DR
2
¼ .157,
DF(1,1542) ¼ 289.23, p 5 .001). In the third
and final step, the Internet use variables were
entered into the analysis, and accounted for
a significant additional 7.8% of variance in
fear of cyber-identity theft and related
fraudulent activity (DR
2
¼ .078, (4,1538)DF
39.78, p 5 .001). Combined, the predicting
variables accounted for almost a quarter of
the variance in fear of cyber-identity theft
and related fraudulent activity (R
2
¼ .24.4,
F(11,1538) ¼ 45.07, p 5 .001).
Table 1 provides the unstandardized
and standardized regression coefficients
and squared semipartial correlations for
each predictor variable in each step of the
multiple regression analysis. In the final
regression model (Step 3), the five signifi-
cant predictors were age (accounting for
less than 1% of the unique variance), fear of
traditional crime (accounting for 14.8% of
the unique variance), the importance of the
Internet for informing views of crime trends
and the criminal justice system (accounting
for 1.4% of the unique variance), using the
Internet at home (accounting for less than
1% of the unique variance) and Internet use
frequency (accounting for less than 1% of
the unique variance).
Discussion
Fear of cyber-victimization, and in parti-
cular the fear of identity theft over the
Internet, represents a significant threat to
the free movement and quality of life of
citizens in the 21st century. Indeed, identity
theft over the Internet could be likened to
highway robbery of earlier times when
roads and highways began to be used on a
regular basis. Just as in these earlier times
there is a predictable progression. First, a
new avenue of communication is estab-
lished, it slowly begins to be used, it is
quickly discovered as a criminal opportu-
nity and then exploited. Eventually me-
chanisms are developed to address and
prevent the criminal exploitation. In this
process the period of greatest fear is likely
to be the period when the form of commu-
nication is unfamiliar and potential users
are alerted to the dangers represented by
criminal opportunists. Arguably, we are at
that stage now and understanding the
dynamics of fear of identity theft over the
Internet represents a significant obstacle to
the development of this new facility that is
of benefit to citizens and their legitimate
activities everywhere.
Worry about cyber-identity theft and
related fraudulent activity is now greater
than worry about many traditional place-
based crimes. This is despite findings that
Table 1. Unstandardized (B) and standardised
(b) regression coefficients, and squared semi-
partial correlations (sr
2
) for each step of the
hierarchical multiple regression predicting fear
of cyber-identity theft and related fraudulent
activity.
Variable B b sr
2
Step 1
Age 7.002 7.013 .000
Sex (female) .209* .055 .003
Education (years) .042 .081 .001
Location (metro) .181 .043 .002
Income (medium) .085 .019 .000
Income (high) .124 .032 .001
Step 2
Age .000 7.007 .000
Sex (female) 7.182 7.048 .002
Education (years) .042** .081 .006
Location (metro) 7.028 7.007 .000
Income (medium) .195 .043 .001
Income (high) .276 .071 .003
Fear traditional crime .297** .416 .157
Step 3
Age .014** .107 .008
Sex (female) 7.126 7.033 .001
Education (years) .003 .006 .000
Location (metro) 7.111 7.026 .001
Income (medium) .107 .024 .000
Income (high) 7.009 .002 .000
Fear traditional crime .294** .411 .148
Internet views crime .248** .132 .014
Use Internet at home .583** .133 .008
Use Internet at work .113 .029 .000
Internet use frequency .119** .140 .006
*p 5 .05; ** .01.p 5
Downloaded by [York University Libraries] at 15:30 03 January 2015
324 L. D. Roberts et al.
the majority of individual victims of cyber-
identity theft and related fraudulent activity
experience either no or minimal financial
and time losses. Most costs are borne by
financial institutions providing credit or
access facilities. Indeed, Monahan (2009, p.
157) labels fear of cyber-identity theft a
‘‘moral panic’’ as ‘‘fear of being a victim of
identity theft far outstrips its actual occur-
rence, and because extreme actions are
taken to mitigate it’’. One potential societal
impact of an exaggerated fear of cyber-
identity theft is decreasing consumer trust
and confidence in using the Internet to
conduct business (Lynch, 2005). This has
major implications for the future of e-
commerce. Australian research (Australian
Bureau of Statistics, 2005) suggests that this
may already be impacting on consumer
behaviour, with security concerns prevent-
ing more than a quarter of Australians with
Internet access from engaging in online
purchasing and transactions. Similarly,
Reisig, Pratt, and Holtfreter (2009) re-
ported that as the perceived risk of Internet
theft victimization increased, online pur-
chasing decreased. Other service and gov-
ernment organizations may also be affected
as fear and lack of trust mean that
organizations increasingly need to adopt
offline methods for customer communica-
tion (Lynch, 2005).
We found mixed support for our
hypotheses regarding potential predictors
of fear of cyber-identity theft and related
fraudulent activity. Our first prediction,
based on the instrumental hypothesis, that
fear of cyber-identity theft and related
fraudulent activity would be greater for
those with high incomes, was not sup-
ported. Fear of cyber-identity theft and
related fraudulent activity appears to be a
fear common across all socio-economic
groups, even though victim surveys suggest
that is those on higher incomes who are the
most likely to be victimized.
Our second hypothesis, that fear of
place-based crime would significantly
predict fear of cyber-identity theft and
related fraudulent activity, was supported.
This finding that fear of traditional place-
based crime is a significant predictor of fear
of cyber-identity theft and related fraudu-
lent activity suggests that this ‘‘new’’ fear is
partially driven by an existing generalized
fear component towards all types of crime.
Indeed, fear of traditional place-based crime
was the strongest predictor of cyber-identity
theft and related fraudulent activity in this
study. This means that once we know that an
individual scores high on general fear of
crime we can predict that he/she will also
score high on fear of cyber-identity theft.
This finding supports the view that fear of
crime is a general dispositional factor and
not something that is highly discriminatory
or dependent on risk. Put another way, an
observed fear of cyber-identity theft prob-
ably tells us more about the person than it
does about the real risks of identity theft, or
indeed any situational contexts or cues
related to cyber-identity theft. This general-
ized fear of crime has been discussed widely
in the literature and the findings of the
present study support the robustness of this
construct. One implication of this observa-
tion is that in addressing fear of crime we
should focus more on individual, psycholo-
gical or dispositional factors related to fear
and focus rather less on the object of the fear.
Our third hypothesis, that Internet use
would significantly predict fear of cyber-
identity theft and related fraudulent activ-
ity, was also supported. Three of the four
Internet-use-related variables had a signifi-
cant positive association with fear of cyber-
identity theft and related fraudulent activ-
ity. The strongest Internet use predictor was
how important the Internet was in inform-
ing views of crime trends and the criminal
justice system. This variable was moder-
ately associated with frequency of Internet
use. In turn, frequency of Internet use and
use of the Internet at home were both
significant predictors of fear of cyber-
identity theft and related fraudulent
Downloaded by [York University Libraries] at 15:30 03 January 2015
Fear of Cyber-Identity Theft and Related Fraudulent Activity 325
activity. Taken together, these findings sug-
gest an ‘‘exposure effect’’, whereby the
predictive power of Internet use variables
relates to a rational evaluation process in
which a person may reason that they use the
Internet frequently and hence would have a
higher likelihood of being the victim of a
cyber-related offence. Alternatively, it could
be the case that frequent Internet users are
more ‘‘savvy’’ users and understand the ease
with which an offender could commit cyber-
crimes and hence conclude that they could
unwittingly become a victim of such crimes.
Nonetheless, further research is needed to
ascertain the basis for the predictive power of
Internet use variables in the context of cyber-
crime-related fear.
Most traditional predictors of fear of
crime included in this research gender,
education and location were poor pre-
dictors of fear of cyber-identity theft and
related fraudulent activity. These findings
suggest that variables traditionally linked
with fear of crime, such as gender, may not
be relevant in the non-contact online
environments. The lack of physicality of
participants in cyberspace changes some of
the fundamental relations and dynamics
that underlie the study of traditional forms
of crime and by extension the fear of crime.
Similarly, ‘‘physical location’’ is also irrele-
vant when it comes to cyber-identity theft.
One possible area for further research is
investigation of the possible role of ‘‘virtual
location’’ (the types of virtual environments
an individual uses) as a predictor of fear of
cyber-identity theft and related fraudulent
activity.
The only ‘‘traditional’’ significant fear
of crime predictor in this study was age,
accounting for less than 1% of the unique
variance in fear of cyber-identity theft and
related fraudulent activity. Across the three
models the contribution of age varied in
both significance and direction, leaving us
with little confidence that it is a meaningful
predictor of cyber-identity theft and related
fraudulent activity.
While the findings from this study
provide some interesting insights into the
fear of cyber-identity theft and related
fraudulent activity, a limitation of the study
is the way in which the constructs of interest
were operationalized. The analysis was
based on an existing data set confining the
selection of variables. Future research
would benefit from the development of an
expanded measure of fear of cyber-identity
theft and related fraudulent activity. As
previously mentioned, specific measures of
virtual location and the type of activities
engaged in online could be included in
future research. Other measures for con-
sideration for inclusion in future research
include previous victimization, perceptions
of likelihood of victimization and a mea-
sure of the extent to which the individual
employs technical and social precautions to
reduce their risk of cyber-identity theft and
related fraudulent activity.
In summary, this research contributes
towards an understanding of the basis of
fear of cyber-identity theft and related
fraudulent activity. Based on the analysis
of a survey of the Australian population,
predictors of this fear were identified. The
strongest predictor was fear of traditional
crime, accounting for approximately 15% of
the unique variance in fear scores, suggesting
a generalized fear of crime component
underlying the fear of cyber-identity theft
and related fraudulent activity. Internet use
variables also significantly contributed to the
prediction of fear of cyber-identity theft and
related fraudulent activity, with fear increas-
ing as use increased, and those using the
Internet at home experiencing higher levels
of fear than those who did not. Traditional
predictors of fear of crime were insignificant
or weak predictors of fear of cyber-identity
theft and related fraudulent activity. To
understand the nature of the fear of cyber-
identity theft and related fraudulent activity
comprehensively a research programme in-
corporating investigations at both quantita-
tive and qualitative levels is needed.
Downloaded by [York University Libraries] at 15:30 03 January 2015
326 L. D. Roberts et al.
To conclude, the findings from our study
contribute towards an understanding of the
fear of cyber-identity theft and related
fraudulent activity. This is an under-re-
searched area within criminology, yet the
impact of fear of cyber-crime may be large.
This study was important in analysing fear
of an acquisitive crime that is not in any way
related to physicality. The findings reflect a
central irony of our times: advances in
technology and communication are accom-
panied by, or co-occur with, a generalized
fear, aversion to risk and erosion of personal
confidence. Some scholars (e.g., Furedi,
1997, 2006) have focused on the culture of
fear which is exacerbated by media exposes
of victims. Best (1999) discussed how in this
regard media imperatives dictate a continu-
ing focus on ‘‘new’’ crimes and ‘‘new’’
dangers. Internet-related identity theft
clearly fits into these categories and provides
ready grist for the media mill, with a content
analysis of media reports on identity theft
identifying themes of identity theft as ‘‘un-
stoppable’’ and driven by new technologies
(Morris & Gilbert, 2008). The likelihood is
that as time passes the use of identity tokens
will be less novel and people will become
more familiar with them and their utility.
Better safety precautions and mechanisms to
prevent and reduce fraud will be developed.
However, the general erosion of trust and
feelings of impotence are less easily remedied
and belong to a much wider social project.
Notes
1. A detailed exploration of cyber-identity
theft is beyond the scope of this article.
For a review see Roberts (2008).
2. This is the 2009 figure based on only those
who incurred costs.
References
Anderson, K. B. (2006). Who are the victims of
identity theft? The effect of demographics.
Journal of Public Policy & Marketing, 25,
160–171.
Australian Bureau of Statistics. (2005). House-
hold use of information technology 2004–05,
Cat. no. 8146.0. Canberra: Author.
Australian Bureau of Statistics. (2008). Personal
fraud 2007. Canberra: Author.
Baum, K. (2006, April). Identity theft, 2004:
First estimates from the National Crime
Victimization Survey. Bureau of Justice
Statistics Bulletin. Retrieved May 27, 2007
from www.ojp.gov/bjs/pub/pdf/it04.pdf
Best, J. (1999). Random violence: How we talk
about new crimes and new victims. Berkeley:
University of California Press.
Borooah, V. K., & Carcach, C. A. (1997). Crime
and fear: Evidence from Australia. British
Journal of Criminology, 37, 635–657.
Cabinet Office. (2002). .Identity fraud: A study
Retrieved May 27, 2007 from http://www.
identitycards.gov.uk/downloads/id_fraud-
report.pdf
Carcach, C., Frampton, P., Thomas, K., &
Cranich, M. (1995). Explaining fear of crime
in Queensland. Journal of Quantitative
Criminology 11, , 271–287.
Chadee, D., Austen, L., & Ditton, J. (2007). The
relationship between likelihood and fear of
criminal victimization. British Journal of
Criminology 47, , 133–153.
Ditton, J., & Farrell, S. (2007). The British
Crime Survey and fear of crime. In M.
Hough, & M. Maxfield (Eds.), Surveying
crime in the 21st century (pp. 223–243).
Monsey, NY: Criminal Justice Press.
Finch, E. (2007). The problem of stolen identity
and the Internet. In Y. Jewkes (Ed.), Crime
on-line (pp. 29–43). Cullompton, UK: Willan.
Fitzgerald, R. (2008). Fear of crime and the
neighbourhood context in Canadian cities.
Crime and Justice Research Paper Series.
Ottawa, Ontario: Canadian Centre for
Justice Statistics.
Fox, S. (2001). Fear of online crime. Pew
Internet Tracking Report. Washington,
DC: Pew Internet & American Life Project.
Furedi F. (1997). Culture of fear: Risk-tasking
and the morality of low expectation. London:
Cassell.
Furedi, F. (2006). Culture of fear revisited: Risk-
taking and the morality of low expectation.
London: Continuum.
Gibson, R., Wilson, S., Meagher, G., Dene-
mark, D., & Western, M. (2005). Introduc-
tion. In S. Wilson, G. Meagher, R. Gibson,
D. Denemark, & M. Western (Eds.), Aus-
tralian social attitudes: The first report (pp.
1–11). Sydney: University of New South
Wales Press.
Downloaded by [York University Libraries] at 15:30 03 January 2015
Fear of Cyber-Identity Theft and Related Fraudulent Activity 327
Grover, A., Berghel, H., & Cobb, D. (2011).
The state of the art in identity theft.
Advances in Computers, 83, 1–50.
Hale, C. (1996). Fear of crime: A review of the
literature. International Review of Victimol-
ogy 4, , 79–150.
Haygood, R., & Hensley, R. (2006). Preventing
identity theft: New legal obligations for
businesses. ,Employment Relations Today
33(3), 71–83.
Higgins, G. E., Hughes, T., Ricketts, M. L., &
Wolfe, S. E. (2008). Identity theft com-
plaints: Exploring the state-level correlates.
Journal of Financial Crime, 15, 295–307.
Hille, P., Walsh, G., Brach, S., & Dose, D.
(2011). Why online identity theft poses a
major threat to e-business. In: Proceedings
of the ACM WebSci’11 (pp. 1–2). Retrieved
August 20, 2011 from http://journal.web
science.org/518/.
Hoare, J., & Wood C. (2007). Plastic card and
identity fraud. In J. Fkatekley (Ed.), Mobile
phone theft, plastic card and identity fraud:
Findings from the 2005/06 British Crime
Survey (Supplementary Volume 2). Retrieved
February 21, 2009 from http://rds.home
office.gov.uk/rds/pdfs07/hosb1007.pdf
Identity Theft Resource Centre. (2003). Identity
theft: The aftermath 2003. Retrieved March
2, 2007 from http://www.idtheftcenter.org/
idaftermath.pdf
Identity Theft Resource Centre. (2005). Identity
theft: The aftermath 2004. Retrieved March
2, 2007 from http://www.idtheftcenter.org/
idaftermath2004.pdf
Javelin Strategy and Research. (2009). 2009 iden-
tity fraud survey report: Identity fraud on the
rise but consumer costs plummet as protections
increase. Pleasanton, CA: Author. Report
preview retrieved February 21, 2009 from
http://javelinstrategy.com/research
Javelin Strategy and Research. (2010). 2010
identity fraud survey report: Consumer ver-
sion. Pleasanton, CA: Author. Report pre-
view retrieved August 16, 2011 from https://
www.javelinstrategy.com/uploads/files/1004.
R_2010IdentityFraudSurveyConsumer.pdf
Jefferson, J. (2004). Police and identity theft
victims Preventing further victimisation.
Australasian Centre for Policing Research, No
7. Retrieved March 2, 2007 from http://www.
gov.au/publications2.asp?Report_ID 154.¼
Kanan, J. W., & Pruitt, M. V. (2002).
Modeling fear of crime and perceived
victimization risk: The (in)significance of
neighborhood integration. Sociological In-
quiry 72, , 527–548.
LoPucki, L. M. (2001). Human identification
theory and the identity theft problem. Texas
Law Review, 80, 89–135.
Lynch, J. (2005). Identity theft in cyberspace:
Crime control methods and their effective-
ness in combating phishing attacks. Berke-
ley Technology Journal, 20, 259–300.
Marshall, A. M., & Tompsett, B. C. (2005).
Identity theft in an online world. Computer
Law & Security Report, 21, 128–137.
McCrea, R., Shyy, T-K., Western, J., &
Stimson, R. J. (2005). Fear of crime in
Brisbane: Individual, social and neighbour-
hood factors in perspective. Journal of
Sociology 41, , 7–27.
Monahan, T. (2009). Identity theft vulnerability:
Neoliberal governance through crime con-
struction. Theoretical Criminology, 13, 155
176.
Morris, R. G., & Longmire, D. R. (2008). Media
constructions of identity theft. The Journal of
Criminal Justice and Popular Culture, 15, 76–
93.
Paget, F. (2007). Identity theft. McAfee Avert
Labs technical white paper No 1. Retrieved
May 27, 2007 from http://www.mcafee.com/
us/local_content/white_papers/wp_id_theft_
en.pdf
Phillips, T., Mitchell, D., Tranter, B., Clark, J.,
& Reed, K. (2008). The Australian Survey of
Social Attitudes, 2007. Canberra: Australian
Social Science Data Archive, The Austra-
lian National University.
Reisig, M. D., Pratt, T. C., & Holtfreter, K.
(2009). Risk of internet theft victimization:
Examining the effects of social vulnerability
and financial impulsivity. Criminal Justice
and Behavior, 36, 369–384.
Roberts, L., & Indermaur, D. (2009). What
Australians think about crime and criminal
justice: Results from the 2007 Australian
Survey of Social Attitudes. Canberra: Aus-
tralian Institute of Criminology.
Roberts, L., & Indermaur, D. (forthcoming).
Are neighbourhood incivilities associated
with fear of crime? In A. Evans (Ed.),
Australian social attitudes, Vol. 3.
Roberts, L. D., (2008). Cyber identity theft. In
R. Luppicini, & R. Adell (Eds.), Handbook
of research on technoethics (pp. 542–557).
Hershey, PA: Information Science
Reference.
Savona, E. U., & Mignone, M. (2004).
The fox and the hunters: How IC tech-
nologies change the crime race. European
Journal on Criminal Policy and Research,
10, 3–26.
Downloaded by [York University Libraries] at 15:30 03 January 2015
328 L. D. Roberts et al.
Sharp, T., Shreve-Neiger, A., Fremouw, W.,
Kane, J., & Hutton, S. (2004). Exploring the
psychological and somatic impact of iden-
tity theft. (1),Journal of Forensic Sciences, 49
131–136.
Skogan, W. (1999)Measuring what matters:
Crime, disorder and fear. In R. Langworthy
(Ed.), Measuring what matters (pp. 37–53).
Washington, DC: U.S. Department of
Justice, National Institute of Justice and
Office of Community Oriented Policing
Services.
Stafford, M., Chandola, T., & Marmot, M.
(2007). Association between fear of crime
and mental health and physical functioning.
American Journal of Public Health, 97,
2076–2081.
Sweeney, L. (2006). Protecting job seekers from
identity theft. ,IEEE Internet Computing
10(2), 74–78.
Synovate. (2003). Federal Trade Commission
Identity theft survey report. Report prepared
for Federal Trade Commission. Retrieved
May 20, 2007 from http://www.ftc.gov/os/
2003/09/synovatereport.pdf
Synovate. (2007). Federal Trade Commission
2006 identity theft survey report. Report
prepared for Federal Trade Commission.
Verton, D. (2001). Identity thefts skyrocket, but
less than 1% occur online. ,Computerworld
35(7), 7.
Wall, D. S. (2008a). Cybercrime and the culture
of fear. Information, Communication and
Society 11, , 861–884.
Wall, D. S. (2008b). Cybercrime, media and
insecurity: The shaping of public percep-
tions of cybercrime. International Review of
Law, Computers and Technology, 22, 45–63.
Wallis Consulting Group. (2007). Community
attitudes to privacy 2007. Report prepared
for the Office of the Privacy Commissioner,
Australia. Retrieved from http://www.privacy.
gov.au/publications/rcommunity07.pdf
Warr, M. (2000). Fear of crime in the United
States: Avenues for research and policy.
Criminal Justice, 4, 451–489.
White, M. D., & Fisher, C. (2008). Assessing
our knowledge of identity theft: The chal-
lenges to effective prevention and control
efforts. ,Criminal Justice Policy Review, 19
3–24.
Wyant, B. R. (2008). Multilevel impacts of per-
ceived incivilities and perceptions of crime
risk on fear of crime. Journal of Research in
Crime and Delinquency, 45, 39–64.
Ziersch, A., Putland, C., Palmer, C., MacDou-
gall, C., & Baum, F. (2007). Neighbourhood
life, social capital and perceptions of safety
in the western suburbs of Adelaide. Aus-
tralian Journal of Social Issues, 42, 549–562.
Downloaded by [York University Libraries] at 15:30 03 January 2015
| 1/15

Preview text:

This article was downloaded by: [York University Libraries] On: 03 January 2015, At: 15:30 Publisher: Routledge
Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered
office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Psychiatry, Psychology and Law
Publication details, including instructions for authors and subscription information:
http://www.tandfonline.com/loi/tppl20
Fear of Cyber-Identity Theft and Related Fraudulent Activity
Lynne D. Roberts a , David Indermaur b & Caroline Spiranovic b
a School of Psychology and Speech Pathology, Curtin Health
Innovation Research Institute, Curtin University , Perth , Australia
b Crime Research Centre, University of Western Australia , Crawley , Australia Published online: 01 May 2012.
To cite this article: Lynne D. Roberts , David Indermaur & Caroline Spiranovic (2013) Fear of Cyber-
Identity Theft and Related Fraudulent Activity, Psychiatry, Psychology and Law, 20:3, 315-328, DOI: 10.1080/13218719.2012.672275
To link to this article: http://dx.doi.org/10.1080/13218719.2012.672275 PLEASE SCROLL DOWN FOR ARTICLE
Taylor & Francis makes every effort to ensure the accuracy of all the information (the
“Content”) contained in the publications on our platform. However, Taylor & Francis,
our agents, and our licensors make no representations or warranties whatsoever as to
the accuracy, completeness, or suitability for any purpose of the Content. Any opinions
and views expressed in this publication are the opinions and views of the authors,
and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content
should not be relied upon and should be independently verified with primary sources
of information. Taylor and Francis shall not be liable for any losses, actions, claims,
proceedings, demands, costs, expenses, damages, and other liabilities whatsoever
or howsoever caused arising directly or indirectly in connection with, in relation to or
arising out of the use of the Content.
This article may be used for research, teaching, and private study purposes. Any
substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing,
systematic supply, or distribution in any form to anyone is expressly forbidden. Terms &
Conditions of access and use can be found at http://www.tandfonline.com/page/terms- and-conditions
Psychiatry, Psychology and Law, 2013
Vol. 20, No. 3, 315–328, http://dx.doi.org/10.1080/13218719.2012.672275
Fear of Cyber-Identity Theft and Related Fraudulent Activity
Lynne D. Robertsa, David Indermaurb and Caroline Spiranovicb
a School of Psychology and Speech Pathology, Curtin Health Innovation Research Institute, Curtin
University, Perth, Australia; bCrime Research Centre, University of Western Australia, Crawley, Australia
Identity theft and related fraudulent activities affect approximately one in twenty-five
adults each year across western societies. The Internet provides a new avenue for
obtaining identity tokens and identifying information and increases the scale on which
identity theft can be perpetrated. Recent research has suggested that fear of these types of
crimes now matches or exceeds the fear of traditional place-based crimes, and has the
potential to curtail online activities and hinder the further development of e-commerce
applications. In this article, we conduct exploratory research identifying predictors of
fear of cyber-identity theft and related fraudulent activities, based on the analysis of
items included in the Australian Survey of Social Attitudes (2007). Fear was predicted by
a generalized fear of crime component and a specific Internet exposure component.
Traditional predictors of fear of crime were insignificant or weak predictors, highlighting the need for further research.
Key words: cyber-identity theft; cyber-victimization; fear of crime; fraud; identity theft.
The Internet provides new opportunities
location) of data acquisition. Further, the
for criminal activities. It may be used to
Internet provides the means for conducting
ork University Libraries] at 15:30 03 January 2015
support existing criminal activities, provide
fraudulent activity with the stolen identity
new ways of conducting existing criminal
tokens, including online banking and e-
activities, extend the geographic reach of commerce.
criminal activities or create new types of
In this article, we first examine what is
criminal activity (Savona & Mignone,
currently known about cyber-identity theft.
2004). One type of cyber-criminal activity
Information on the incidence of identity
that is frequently featured in the media is
theft and related fraudulent activity across Downloaded by [Y
cyber-identity theft and related fraudulent
three countries, the United States of Amer-
activity. The Internet enables an extension
ica (USA), United Kingdom (UK) and
from ‘‘traditional’’ identity theft (the mis-
Australia is presented. This analysis high-
appropriation of identity tokens such as
lights the difficulty of determining the
credit cards through non-technical means
percentage of this activity that is cyber-
such as mail theft) to the online harvesting
related. We then examine fear of cyber-
of identity tokens, potentially on a larger
identity theft and related fraudulent activ-
scale due to information and communica-
ity, situating our discussion within the body
tion technologies increasing the ease and
of literature concerning fear of traditional
reducing the costs (time, financial and
place-based crimes. In the body of this
Correspondence: Lynne.Roberts@curtin.edu.au
© 2013 The Australian and New Zealand Association of Psychiatry, Psychology and Law
316 L. D. Roberts et al.
article we examine possible predictors of
Solutions for 40 million credit card custo-
fear of cyber-identity theft and related
mers (Haygood & Hensley, 2006). The ease
fraudulent activity. Three categories of
of obtaining identity tokens and identifying
predictors are considered. The first relates
information online changes the scale on
to demographic variables, the second to
which identity theft can be perpetrated,
fear of traditional crime and the third to
expanding the range of potential victims
levels of access and activity on the Internet.
(Finch, 2007; Marshall & Tompsett, 2005).
It appears that traditional demographic
The number of individuals directly
predictors of fear of crime victimization,
affected by cyber-identity theft remains
such as age and gender, are poor predictors
difficult to estimate, partly because most
of fear of cyber-identity theft victimization.
victims of identity theft and related frau-
By contrast, fear of physical place-based
dulent activity are unaware of how the
crime and Internet use variables were
perpetrator obtained their identity tokens
relatively stronger predictors of fear of
or identifying information. Whilst the
cyber-identity theft. These results suggest
individual knows they have been the victim
that to understand the nature of the fear of
of a fraud, they remain unaware of whether
cyber-identity theft and related fraudulent
this was as a result of an online breach or
activity comprehensively, a research pro-
through some offline means. For example,
gramme incorporating investigations at
Synovate (2007) reported that the majority
both quantitative and qualitative levels is
(56%) of identity fraud victims did not needed.
know how their identity information was
obtained. In 2001, a United States Federal
Trade Commission director claimed that Cyber-Identity Theft
fewer than 1% of reported cases of identity
Cyber-identity theft1 involves the online
fraud could be linked to the Internet
misappropriation of identity tokens. Com-
(Verton, 2001). Similarly, the results from
mon online identity tokens include email
the Pew Internet Tracking Report (Fox,
addresses, web pages and the combination
2001) indicated that only 8% of identity
of username and password used to access
theft victims indicated the Internet might
ork University Libraries] at 15:30 03 January 2015
systems such as online banking. Traditional
have been involved. Despite the technolo-
identity tokens can also be harvested online
gical and personal factors conducive to
and include name, contact details (address,
cyber-identity theft, at present offline iden-
telephone number), tax file numbers and
tity theft appears to be the most commonly
social security numbers. These identifiers
utilized form, although this may change in
are sufficient for an individual to obtain a the future. Downloaded by [Y
credit card in the victim’s name (Sweeney,
Although the proportion of identity 2006).
theft and related fraudulent activity attri-
Cyber-identity theft typically combines
butable to the Internet is unknown, popu-
the affordances of new information and
lation surveys conducted over the last
communication technologies (ICTs) with
decade are providing estimates of the
social engineering and includes methods
proportion of the population affected by
such as hacking, phishing, pharming, traffic
identity theft and related fraudulent activity
redirectors, advance-fee frauds, fake taxa-
of all types. Available estimates from the
tion forms, keyloggers and password stea-
USA, UK and Australia are reviewed
lers (Paget, 2007). Hacking has been
below. While these prevalence statistics
employed successfully to obtain mass iden-
provide an indication of the extent of the
tifying information, including the account
problem of identity theft, White and Fisher information held by Card Systems
(2008) caution that our knowledge of
Fear of Cyber-Identity Theft and Related Fraudulent Activity 317
identity theft is hampered by variations in
households in the USA had at least one
definitions used and reporting practices.
household member who was a victim of
In the USA, major population surveys
identity theft in the previous six months
on identity theft have been conducted by
(Baum, 2006). The results obtained from
two organizations, Synovate (for the Fed-
these population surveys are reasonably
eral Trade Commission) and Javelin Strat-
consistent. They suggest that identity theft
egy and Research. Questions on identity
affects about 1 in 25 adults in the USA each
theft have also been included in the
year. However, for the majority of victims,
National Crime Victimization Survey. Ja-
the financial impact of victimization is
velin Strategy and Research conducted
small and only limited time is required to
population-based telephone surveys to es-
resolve problems associated with the theft
timate the number of identity fraud victims. and resultant fraud.
Survey estimates suggest that the annual
The major report on identity fraud in
incidence of identity fraud victimizations
the UK, Identity fraud: A study (Cabinet
decreased over the period 2004 (4.25%) to
Office, 2002); estimated the cost of identity
2007 (3.58%), but increased in 2008 to
fraud was £1.3 billion, accounting for
4.32% (Javelin Strategy and Research,
approximately one tenth of all fraud in
2009). It was estimated that in 2009 in
the UK [updated in 2006 to £1.72 billion
excess of 11 million Americans had been the
(see http://www.ips.gov.uk/identity/down-
victim of identity fraud (Javelin Strategy
loads/FINAL-estimate-for-annual-cost-of-
and Research, 2010). The approximate
fraud-table-v1-2.pdf]. Questions relating
dollar value associated with the fraudulent
specifically to credit card fraud experienced
activity followed a similar trend, decreasing
by members of the public were included in
from $60 in 2004 to $45 in 2007, followed
the 2005/2006 British Crime Survey. Based
by an increase to $48 in 2008 and $3632 in
on survey results, it was estimated that 4%
2009 (Javelin Strategy and Research, 2009,
of UK credit card holders had been victim
2010). Based on a population telephone
of credit card fraud over the previous 12-
survey, Synovate (2007) estimated that
month period (Hoare & Wood, 2007). Thus
3.7% of the adult US population were a
the estimates of prevalence are very similar
ork University Libraries] at 15:30 03 January 2015
victim of identity theft in 2005, a decline to those for the USA.
from the 2003 survey estimate provided by
In Australia, the most recent reliable
Synovate (2003) of 4.6%. Synovate esti-
estimates of the extent of identity fraud
mated that in 2005 the median ‘‘out of
come from the Australian Bureau of
pocket’’ expense to individual victims was
Statistics (2008) Personal Fraud survey
nil, and the median time spent resolving
conducted in the second half of 2007. Downloaded by [Y
identity theft problems was 4 hours. How-
Population estimates from the survey sug-
ever, some victims incurred considerably
gest that in the previous 12 months, 3.1% of
higher out of pocket expenses (95th per-
Australians over the age of 15 years were
centile $2,000) and spent longer periods
the victims of identity fraud. The majority
resolving their problems (95th percentile
(77%) were victims of bank card or credit
130 hours). Costs and hours were higher for
card fraud and spent less than 10 hours
victimizations where new accounts were
resolving the fraudulent activity. More than
established than where fraudulent activities
a third (36.3%) of credit and bank card
were restricted to existing credit and non-
fraud victims and more than a quarter
credit card accounts (Synovate, 2007). The
(26.8%) of other identity theft victims in
National Crime Victimization Survey in-
this Australian survey did not know the
cluded questions about identity theft in
method of fraud used. However, email or
2004, reporting that 3% (3.6 million) of
Internet was identified as the method of
318 L. D. Roberts et al.
fraud in 19.8% of incidents of credit or
may be some cross-cultural variability with
bank card fraud and 21.2% of other
respect to the relationship between identity
identity theft incidents (Australian Bureau
fraud and victim demographics such as age
of Statistics, 2008). Despite this, almost half
and gender. However, the Australian data
(45%) of respondents in a further popula-
mirror those of the USA in indicating
tion-based survey conducted in Australia
that affluence is associated with identity
thought the Internet was the most likely fraud.
method of identity fraud, with 60% of
Typically, individuals are not regarded
respondents concerned about becoming a
by law enforcement or legal agencies as the
victim of identity fraud (Wallis Consulting
primary victims of identity theft-related
Group, 2007). These results indicate that
fraud. Instead, the status of primary victim
the public perceive cyber-identity theft to be
is assigned to defrauded creditors: typically
a more commonly used form of identity
banks and other financial organizations
theft than the statistics indicate is likely to
which incur the financial cost of identity- be the case.
related fraud (LoPucki, 2001). As pre-
Recent research has begun to analyse
viously outlined, for most individual vic-
the risk of victimization at state, commu-
tims of identity theft, there are minimal
nity and individual levels. At a macro level,
financial and time costs involved in dealing
Higgins, Hughes, Ricketts, and Wolfe
with identity-related fraud. However, some
(2008) examined state-level correlates of
victims can incur financial costs associated
identity theft victimization in the USA,
with lost wages, medical expenses and
utilizing Federal Trade Commission re-
expenses incurred in restoring the integrity
ports and census data. Identity theft com-
of identity (Identity Theft Resource Centre,
plaints were higher in states with lower
2003, 2005; Jefferson, 2004; LoPucki, 2001).
ratios of males, but higher ratios of African
The cost to the individual is partially
Americans, residential mobility, public as-
dependent upon the time interval from the
sistance and recreation and entertainment
theft to discovery, such that costs increase
venues. At a micro level, Anderson (2006)
with longer intervals (Synovate, 2003).
reanalysed the data from the Federal Trade
Secondary victimization in the form of
ork University Libraries] at 15:30 03 January 2015
Commission’s 2003 survey to examine the
denial of credit, increased insurance and
demographic characteristics of identity
credit card interest rates, cancellation of
theft victims. Age, gender and income
credit cards, denial of services (phone,
were predictors of identity theft victimiza-
utilities) and continued contact by collec-
tion, with younger adults, women and the
tion agencies may result from impaired
more affluent more likely to be victims.
credit rating (Baum, 2006; Identity Theft Downloaded by [Y
In Australia, data regarding the char-
Resource Centre, 2005; Synovate 2003).
acteristics of victims of identify fraud
The psychological, emotional and physical
(including both identity theft and credit or
impact of identity theft also increases for
bank card fraud) are provided through the
those who are unable to easily resolve
Australian Bureau of Statistics (2008)
problems associated with the identity theft
Personal Fraud survey. In the 12 months
(Sharp, Shreve-Neiger, Fremouw, Kane, &
prior to the survey, identity fraud victimi- Hutton, 2004).
zation was more frequently reported by
While it is possible that the psychologi-
males, those aged between 25 and 44 years,
cal impact of identity theft is not affected by
those with higher educational qualifica-
the actual method of its completion (cyber
tions, and those with the highest weekly
versus traditional), there may be important
incomes. Contrasting these results with
differences. Our current inability to differ-
those from the USA, it appears that there
entiate fraudulent activity by the source of
Fear of Cyber-Identity Theft and Related Fraudulent Activity 319
identity theft means that we are not able to
despite their lower risk of victimization
study the effects with accuracy. However,
(see, e.g., Ziersch, Putland, Palmer, Mac-
we are able to investigate the fear indivi-
Dougall, & Baum, 2007), providing support
duals have of these two forms of identity
for the vulnerability thesis. The vulnerabil- theft.
ity hypothesis is also supported by a range
of findings which have shown that unfami-
liarity is linked to the fear of crime. Perhaps Fear of Crime
not surprisingly, people tend to be more
While criminal activities can have direct
aware of situations and places with which
impacts on individual, organizational and
they are less familiar. Even those who live in
community victims, they also have a wider
relatively high crime neighbourhoods re-
indirect impact on individuals and society
port feeling safer in those areas closer to
through fear of crime. Fear of crime,
home compared with other areas of the city
whether or not it has a basis in the
even though those other areas may, on an
likelihood of crime victimization, can nega- objective level, be safer.
tively impact on an individual’s physical
Fear of crime has consistently been
and mental wellbeing and social function-
shown to be out of proportion with the
ing through the curtailment of physical and
actual risk of victimization (Chadee, Aus-
social activities (Stafford, Chandola, &
ten, & Ditton, 2007). Research from Cana- Marmot, 2007).
da suggests that about 12% of the variance
Fear of crime is a concept that has been
in fear of crime can be directly attributed to
defined and measured in a variety of ways
differences in neighbourhood context (Fitz-
including concern about crime, perceived
gerald, 2008), providing modest support for
risk of victimization, perceived threat and
the instrumental hypothesis that fear of
behavioural responses to fear (Skogan,
crime simply reflects actual crime rates, at
1999). Doubt has been cast over whether least at a local level.
the much discussed concept of ‘‘fear of
Previous research has supported the
crime’’ does indeed represent a fear, or is
proposed relationship between perceptions
more accurately defined in terms of a
of incivilities and fear of crime – those that
ork University Libraries] at 15:30 03 January 2015
general anxiety about crime (Warr, 2000).
experience or perceive a higher level of
There are also questions about the best way
incivilities also experience higher levels of
to measure, reflect or tap in to the
fear of crime (Borooah & Carcach, 1997;
experience of fear (see Ditton & Farrell
Carcach, Frampton, Thomas, & Cranich, 2007).
1995; Kanan & Pruitt, 2002; McCrea, Shyy,
A range of theories has been developed
Western, & Stimson, 2005; Roberts & Downloaded by [Y
to make sense of what we know about the
Indermaur, forthcoming; Wyant, 2008).
fear of crime. Briefly, these can be classified
However, these findings may also be inter-
as relating to the vulnerability of the victim
preted as being consistent with the vulner-
(the ‘‘vulnerability thesis’’); the (perceived) ability hypothesis as perceptions of
risk of victimization (the ‘‘instrumental
incivilities contribute to a heightened
thesis’’); (perceived) incivilities within the awareness of vulnerability.
environment (the ‘‘incivilities thesis’’); and
psychological factors (Hale, 1996).
Demographic factors have been ex- Fear of Cyber-Identity Theft
plored as predictors of fear of crime with
While fear of crime has received substantial
relatively consistent findings that women
research attention, limited research has
and the elderly experience higher levels of
been conducted on fear of cyber-crime, or
fear of crime than men or younger adults,
more specifically fear of cyber-identity theft
320 L. D. Roberts et al.
and related fraudulent activity. Qualitative
forthcoming) we analysed the AuSSA
research has suggested that fear of cyber-
survey data to compare worry about tradi-
identity theft incorporates fear of financial
tional place-based crime with worry about
losses, damage to reputation and loss of
emerging forms of criminal activity enabled
online privacy (Hille, Walsh, Brach, &
by the rapid development of ICTs, particu-
Dose, 2011). Some researchers (e.g., Wall,
larly the Internet. A major finding of this
2008a, 2008b) have argued that fear of
research was that worry about identity-
cyber-crime is largely driven by myth
related crime is now matching, and for
perpetuated by the media, and may not be
some offences exceeding, worry about more
in proportion to the objective reality of
traditional place-based crime. The illegal
cyber-crime. The results from those studies
use of credit cards over the Internet was one
that have included measures relevant to the
of the crimes included in this survey that
fear of cyber-identity theft and related
generated the highest levels of worry (23%
fraud in the USA, UK and Australia are
‘‘very worried’’, 27.9% ‘‘fairly worried’’). summarized below.
Fear of having identity stolen via the
In an early study by the Pew Internet
Internet was also a source of worry
and American Life Project (Fox, 2001) the
(15.9% ‘‘very worried’’, 24.4% ‘‘worried’’).
majority of Americans surveyed (87%)
These two items were combined with
were concerned about credit card theft
worry about having a credit card stolen to
online, with 69% ‘‘very concerned’’. Fe-
produce a fear of identity-theft-related
males, older adults and African Americans
crime scale. Then analyses of predictors of
were more likely to be ‘‘very concerned’’
fear as measured by this scale were under-
than males, younger adults, Caucasians and
taken. Traditional predictors of fear of Hispanics respectively.
crime (gender, age, years of education,
Although not directly asking about
location) were found to be poor predictors
online fraudulent activity, the British Crime
of worry about identity-theft-related crime.
Survey in 2005/2006 included questions on
Fear of identity-theft-related crime was
fear of credit card fraud. More than half
lower for males than females, but ac-
(57%) of the respondents who owned credit
counted for less than 1% of the variation
ork University Libraries] at 15:30 03 January 2015
cards reported that they were ‘‘fairly’’ or
in fear of identity-related crime scores. Age
‘‘very’’ worried about being a victim of card
was not a significant predictor. Location
fraud. Notably, this percentage was higher
(metro/rural) and perceptions of incivilities
than worry about any of the traditional
were significant predictors, accounting for
crimes also asked about in the survey.
5.3% of variance (Roberts & Indermaur,
Respondents who had been the victim of forthcoming). Downloaded by [Y
credit card fraud in the previous year were
In this article, we build on this previous
more likely to be worried than those who
research to specifically examine fear of
had not (Hoare & Wood, 2007).
cyber-identity theft and related fraudulent
The Australian Survey of Social Atti-
activity, using two items from the AuSSA
tudes (AuSSA) has been conducted four
survey that specified the Internet in relation
times between 2003 and 2009. The 2007
to fear of crime. Given the poor predictive
sweep of the survey included, for the first
ability of traditional predictors of fear of
time, items related to worry about a range
crime to predict fear of cyber-identity theft
of crimes. Extending on our primary
and related fraudulent activity, we were
analysis of the crime and justice items
interested in exploring a range of other included in the AuSSA 2007 survey possible predictors.
(Roberts & Indermaur, 2009), in our
First, a finding from the Australian
recent research (Roberts & Indermaur,
Bureau of Statistics (2008) Personal Fraud
Fear of Cyber-Identity Theft and Related Fraudulent Activity 321
survey was that individuals on higher
from the Australian electoral roll. Pre-
incomes were at higher risk of victimiza-
survey invitation letters were sent to the
tion. We hypothesized that if fear of crime
randomly selected individuals and were
has some basis in risk of victimization (the
followed by the survey package and three
‘‘instrumental hypothesis’’), then fear of
reminders. The final set of respondents
cyber-identity theft and related fraudulent
consisted of 8,133 adults from all states
activity will be higher for those with high
and territories in Australia. Final response
incomes than those on lower incomes.
rates for the three questionnaires ranged
Second, Roberts and Indermaur (forth-
from 39 to 42%. Further details of the
coming) suggested there may be a general-
survey, methodology and weighting of the
ized fear component underlying both fear
sample are provided in Roberts and In-
of traditional crime and fear of identity-
dermaur (2009). The data set analysed was
related crime. We hypothesized that fear of
provided by the Australian National Uni-
place-based crime will significantly predict
versity (Phillips, Mitchell, Tranter, Clark,
fear of cyber-identity theft and related & Reed, 2008).
fraudulent activity. Positive results here
would suggest the operation of a general-
ized fear of crime component. The failure to Participants
find a significant relationship might suggest
The subset of AuSSA 2007 survey respon-
that fear of place-based crime and fear of
dents included in this research is 1,550
cyber-crime are distinct concepts.
respondents who completed Form C of the
Third, we were interested in whether
survey and answered each of the questions
Internet use variables could add explana-
of interest for this analysis. Exactly half of
tory power in predicting fear of cyber-
the sample (50%) was female. The mean age
identity theft and related fraudulent activ-
of respondents was 47 years (SD ¼ 15 years).
ity. We hypothesized that Internet use will
The majority of respondents (74%) lived
significantly predict fear of cyber-identity
within a metropolitan area of Australia and
theft and related fraudulent activity (sug-
had completed a mean of 14 years of
gesting a level of exposure component).
education (SD ¼ 4 years). The majority of
ork University Libraries] at 15:30 03 January 2015
Positive results here would suggest that fear
the sample had access to the Internet.
may be related to the level of exposure; a
Seventy-four per cent of the sample used
finding in line with the instrumental hy-
the Internet at home, with 56% of the
pothesis in regard to fear of crime. A
sample using the Internet at work.
significant but inverse relationship might
suggest that fear is related to unfamiliarity; Downloaded by [Y
a finding in line with the vulnerability Measures hypothesis.
The AuSSA 2007 survey covered 35 cate-
gories of attitudes and behaviours. The full
questionnaires are available at http://aus- Method
sa.anu.edu.au/questionnaires.php. A range
The AuSSA is a biennial mail-out survey
of crime and justice items in the AuSSA
that measures Australians’ social attitudes
2007 survey were commissioned by the
and behaviours (Gibson, Wilson, Meagher,
Australian Institute of Criminology and
Denemark, & Western, 2005). The third
were included in two versions of the survey.
biennial survey, AuSSA 2007, was a cross-
Two of the crime and justice items were
sectional mail-out survey, consisting of
used together to produce the measure of
three questionnaire versions. A random
fear of cyber-identity theft and related
selection of 20,000 individuals was obtained
fraudulent activity. These items were:
322 L. D. Roberts et al.
How worried are you that the following
ranging from ‘‘several times a day’’ to ‘‘do will occur to you?
not use the Internet’’. The final item asked
respondents: ‘‘How important are the
. having your identity stolen via the
following in informing your views of crime Internet;
trends and the criminal justice system?’’ and
. having your credit card details used
respondents rated the extent to which the illegally via the Internet.
Internet was important in this regard.
Single item measures of age (years),
These items were selected as covering
gender, years of education, location and
the two dimensions of definitions of cyber-
gross household annual income were also
identity theft, the stealing of identity and
retained for the analysis. Gross household
the use of the stolen identity in a fraudulent
income was recoded into three categories:
act (Grover, Berghel, & Cobb, 2011). Each
low ($0 to $31,199 per annum), medium
item was measured on a 4-point response
($31,200 to $77,999 per annum) and high
scale ranging from ‘‘not worried at all’’ to ($78,000 plus per annum).
‘‘very worried’’. The two items were com-
puted into a scale with good internal consistency (Cronbach’s alpha ¼ .86). Results
Data were recoded so that higher scores
Scores were computed for each individual
on the scale reflects higher levels of fear of
on the fear of crime scales. The mean scale
crime. Possible scale scores thus range from
score on the fear of cyber-identity theft and 2 to 8.
related fraudulent activity scale was 4.97
A further four items were used as a
(SD ¼ 1.9) of a possible scale score range of
measure of fear of traditional place-based
2 to 8. The mean scale score on the fear of
crime. Using the same question stem (How
physical crime scale was 8.47 (SD ¼ 2.68)
worried are you that the following will
out of a possible scale score range of 4 to 16.
occur to you?) respondents were asked
To test the hypotheses that income, fear
about being physically attacked at home,
of traditional place-based crime and Inter-
being physically attacked on the street or
net use would be significant predictors of
ork University Libraries] at 15:30 03 January 2015
other public space, being sexually assaulted
cyber-identity theft and related fraudulent
and having their home/place of residence
activity a hierarchical multiple regression
broken into. Each item was measured on a analysis was conducted.
4-point response scale ranging from ‘‘not
In the first step of the multiple regres-
worried at all’’ to ‘‘very worried’’. The four
sion analysis, traditional predictors of fear
items from the questionnaire were com-
of crime; age, gender, years of education Downloaded by [Y
bined to produce a scale with good internal
and location (metropolitan or non-metro-
consistency (Cronbach’s alpha ¼ .86). Data
politan), along with income, were entered
were recoded so that higher scores on the
into the analysis. Combined, these demo-
scale reflect higher levels of fear of crime.
graphic variables accounted for a small, but
Possible scale scores range from 4 to 16.
significant 0.9% of the variance in fear
Four items were used to provide mea-
of cyber-identity theft and related fraudu-
sures of Internet use. Using the question
lent activity (R2 ¼ .009, F(6,1543) ¼ 2.34,
stem ‘‘Please tell us if you use the Internet at
p 5 .05). Gender was the only significant
any of the following?’’, two items related to
demographic predictor of cyber-identity
the site of Internet use (at home and/or at
theft and related fraudulent activity.
work). A third item asked respondents: ‘‘In
In the second step, fear of physical crime
general, how often do you use the Inter-
was entered into the analysis. This ac-
net?’’ and was measured on a 7-point scale
counted for a significant additional 15.7%
Fear of Cyber-Identity Theft and Related Fraudulent Activity 323
of variance in fear of cyber-identity theft and Table 1.
Unstandardized (B) and standardised
related fraudulent activity (DR2
(b) regression coefficients, and squared semi- ¼ .157,
partial correlations (sr2) for each step of the
DF(1,1542) ¼ 289.23, p 5 .001). In the third
hierarchical multiple regression predicting fear
and final step, the Internet use variables were
of cyber-identity theft and related fraudulent
entered into the analysis, and accounted for activity.
a significant additional 7.8% of variance in
fear of cyber-identity theft and related Variable B b sr2
fraudulent activity (DR2 ¼ .078, DF(4,1538) Step 1
39.78, p 5 .001). Combined, the predicting Age 7.002 7.013 .000 Sex (female) .209* .055 .003
variables accounted for almost a quarter of Education (years) .042 .081 .001
the variance in fear of cyber-identity theft Location (metro) .181 .043 .002
and related fraudulent activity (R2 ¼ .24.4, Income (medium) .085 .019 .000
F(11,1538) ¼ 45.07, p 5 .001). Income (high) .124 .032 .001
Table 1 provides the unstandardized Step 2
and standardized regression coefficients Age .000 7.007 .000 Sex (female) 7.182 7.048 .002
and squared semipartial correlations for Education (years) .042** .081 .006
each predictor variable in each step of the Location (metro) 7.028 7.007 .000
multiple regression analysis. In the final Income (medium) .195 .043 .001
regression model (Step 3), the five signifi- Income (high) .276 .071 .003 Fear traditional crime .297** .416 .157
cant predictors were age (accounting for
less than 1% of the unique variance), fear of Step 3 Age .014** .107 .008
traditional crime (accounting for 14.8% of Sex (female) 7.126 7.033 .001
the unique variance), the importance of the Education (years) .003 .006 .000
Internet for informing views of crime trends Location (metro) 7.111 7.026 .001
and the criminal justice system (accounting Income (medium) .107 .024 .000 Income (high) 7.009 .002 .000
for 1.4% of the unique variance), using the Fear traditional crime .294** .411 .148
Internet at home (accounting for less than Internet views crime .248** .132 .014
1% of the unique variance) and Internet use Use Internet at home .583** .133 .008
frequency (accounting for less than 1% of Use Internet at work .113 .029 .000
ork University Libraries] at 15:30 03 January 2015 Internet use frequency .119** .140 .006 the unique variance). *p 5 .05; **p 5 .01. Discussion
prevent the criminal exploitation. In this
Fear of cyber-victimization, and in parti-
process the period of greatest fear is likely
cular the fear of identity theft over the
to be the period when the form of commu- Downloaded by [Y
Internet, represents a significant threat to
nication is unfamiliar and potential users
the free movement and quality of life of
are alerted to the dangers represented by
citizens in the 21st century. Indeed, identity
criminal opportunists. Arguably, we are at
theft over the Internet could be likened to
that stage now and understanding the
highway robbery of earlier times when
dynamics of fear of identity theft over the
roads and highways began to be used on a
Internet represents a significant obstacle to
regular basis. Just as in these earlier times
the development of this new facility that is
there is a predictable progression. First, a
of benefit to citizens and their legitimate
new avenue of communication is estab- activities everywhere.
lished, it slowly begins to be used, it is
Worry about cyber-identity theft and
quickly discovered as a criminal opportu-
related fraudulent activity is now greater
nity and then exploited. Eventually me-
than worry about many traditional place-
chanisms are developed to address and
based crimes. This is despite findings that
324 L. D. Roberts et al.
the majority of individual victims of cyber-
predict fear of cyber-identity theft and
identity theft and related fraudulent activity
related fraudulent activity, was supported.
experience either no or minimal financial
This finding that fear of traditional place-
and time losses. Most costs are borne by
based crime is a significant predictor of fear
financial institutions providing credit or
of cyber-identity theft and related fraudu-
access facilities. Indeed, Monahan (2009, p.
lent activity suggests that this ‘‘new’’ fear is
157) labels fear of cyber-identity theft a
partially driven by an existing generalized
‘‘moral panic’’ as ‘‘fear of being a victim of
fear component towards all types of crime.
identity theft far outstrips its actual occur-
Indeed, fear of traditional place-based crime
rence, and because extreme actions are
was the strongest predictor of cyber-identity
taken to mitigate it’’. One potential societal
theft and related fraudulent activity in this
impact of an exaggerated fear of cyber-
study. This means that once we know that an
identity theft is decreasing consumer trust
individual scores high on general fear of
and confidence in using the Internet to
crime we can predict that he/she will also
conduct business (Lynch, 2005). This has
score high on fear of cyber-identity theft.
major implications for the future of e-
This finding supports the view that fear of
commerce. Australian research (Australian
crime is a general dispositional factor and
Bureau of Statistics, 2005) suggests that this
not something that is highly discriminatory
may already be impacting on consumer
or dependent on risk. Put another way, an
behaviour, with security concerns prevent-
observed fear of cyber-identity theft prob-
ing more than a quarter of Australians with
ably tells us more about the person than it
Internet access from engaging in online
does about the real risks of identity theft, or
purchasing and transactions. Similarly,
indeed any situational contexts or cues
Reisig, Pratt, and Holtfreter (2009) re-
related to cyber-identity theft. This general-
ported that as the perceived risk of Internet
ized fear of crime has been discussed widely
theft victimization increased, online pur-
in the literature and the findings of the
chasing decreased. Other service and gov-
present study support the robustness of this
ernment organizations may also be affected
construct. One implication of this observa-
as fear and lack of trust mean that
tion is that in addressing fear of crime we
ork University Libraries] at 15:30 03 January 2015
organizations increasingly need to adopt
should focus more on individual, psycholo-
offline methods for customer communica-
gical or dispositional factors related to fear tion (Lynch, 2005).
and focus rather less on the object of the fear. We found mixed support for our
Our third hypothesis, that Internet use
hypotheses regarding potential predictors
would significantly predict fear of cyber-
of fear of cyber-identity theft and related
identity theft and related fraudulent activ- Downloaded by [Y
fraudulent activity. Our first prediction,
ity, was also supported. Three of the four
based on the instrumental hypothesis, that
Internet-use-related variables had a signifi-
fear of cyber-identity theft and related
cant positive association with fear of cyber-
fraudulent activity would be greater for
identity theft and related fraudulent activ-
those with high incomes, was not sup-
ity. The strongest Internet use predictor was
ported. Fear of cyber-identity theft and
how important the Internet was in inform-
related fraudulent activity appears to be a
ing views of crime trends and the criminal
fear common across all socio-economic
justice system. This variable was moder-
groups, even though victim surveys suggest
ately associated with frequency of Internet
that is those on higher incomes who are the
use. In turn, frequency of Internet use and most likely to be victimized.
use of the Internet at home were both
Our second hypothesis, that fear of
significant predictors of fear of cyber- place-based crime would significantly identity theft and related fraudulent
Fear of Cyber-Identity Theft and Related Fraudulent Activity 325
activity. Taken together, these findings sug-
While the findings from this study
gest an ‘‘exposure effect’’, whereby the
provide some interesting insights into the
predictive power of Internet use variables
fear of cyber-identity theft and related
relates to a rational evaluation process in
fraudulent activity, a limitation of the study
which a person may reason that they use the
is the way in which the constructs of interest
Internet frequently and hence would have a
were operationalized. The analysis was
higher likelihood of being the victim of a
based on an existing data set confining the
cyber-related offence. Alternatively, it could
selection of variables. Future research
be the case that frequent Internet users are
would benefit from the development of an
more ‘‘savvy’’ users and understand the ease
expanded measure of fear of cyber-identity
with which an offender could commit cyber-
theft and related fraudulent activity. As
crimes and hence conclude that they could
previously mentioned, specific measures of
unwittingly become a victim of such crimes.
virtual location and the type of activities
Nonetheless, further research is needed to
engaged in online could be included in
ascertain the basis for the predictive power of
future research. Other measures for con-
Internet use variables in the context of cyber-
sideration for inclusion in future research crime-related fear.
include previous victimization, perceptions
Most traditional predictors of fear of
of likelihood of victimization and a mea-
crime included in this research – gender,
sure of the extent to which the individual
education and location – were poor pre-
employs technical and social precautions to
dictors of fear of cyber-identity theft and
reduce their risk of cyber-identity theft and
related fraudulent activity. These findings related fraudulent activity.
suggest that variables traditionally linked
In summary, this research contributes
with fear of crime, such as gender, may not
towards an understanding of the basis of
be relevant in the non-contact online
fear of cyber-identity theft and related
environments. The lack of physicality of
fraudulent activity. Based on the analysis
participants in cyberspace changes some of
of a survey of the Australian population,
the fundamental relations and dynamics
predictors of this fear were identified. The
that underlie the study of traditional forms
strongest predictor was fear of traditional
ork University Libraries] at 15:30 03 January 2015
of crime and by extension the fear of crime.
crime, accounting for approximately 15% of
Similarly, ‘‘physical location’’ is also irrele-
the unique variance in fear scores, suggesting
vant when it comes to cyber-identity theft.
a generalized fear of crime component
One possible area for further research is
underlying the fear of cyber-identity theft
investigation of the possible role of ‘‘virtual
and related fraudulent activity. Internet use
location’’ (the types of virtual environments
variables also significantly contributed to the Downloaded by [Y
an individual uses) as a predictor of fear of
prediction of fear of cyber-identity theft and
cyber-identity theft and related fraudulent
related fraudulent activity, with fear increas- activity.
ing as use increased, and those using the
The only ‘‘traditional’’ significant fear
Internet at home experiencing higher levels
of crime predictor in this study was age,
of fear than those who did not. Traditional
accounting for less than 1% of the unique
predictors of fear of crime were insignificant
variance in fear of cyber-identity theft and
or weak predictors of fear of cyber-identity
related fraudulent activity. Across the three
theft and related fraudulent activity. To
models the contribution of age varied in
understand the nature of the fear of cyber-
both significance and direction, leaving us
identity theft and related fraudulent activity
with little confidence that it is a meaningful
comprehensively a research programme in-
predictor of cyber-identity theft and related
corporating investigations at both quantita- fraudulent activity.
tive and qualitative levels is needed.
326 L. D. Roberts et al.
To conclude, the findings from our study
Australian Bureau of Statistics. (2005). House-
contribute towards an understanding of the
hold use of information technology 2004–05,
Cat. no. 8146.0. Canberra: Author.
fear of cyber-identity theft and related
Australian Bureau of Statistics. (2008). Personal
fraudulent activity. This is an under-re- fraud 2007. Canberra: Author.
searched area within criminology, yet the
Baum, K. (2006, April). Identity theft, 2004:
impact of fear of cyber-crime may be large.
First estimates from the National Crime
This study was important in analysing fear
Victimization Survey. Bureau of Justice
Statistics Bulletin. Retrieved May 27, 2007
of an acquisitive crime that is not in any way
from www.ojp.gov/bjs/pub/pdf/it04.pdf
related to physicality. The findings reflect a
Best, J. (1999). Random violence: How we talk
central irony of our times: advances in
about new crimes and new victims. Berkeley:
technology and communication are accom-
University of California Press.
panied by, or co-occur with, a generalized
Borooah, V. K., & Carcach, C. A. (1997). Crime
and fear: Evidence from Australia. British
fear, aversion to risk and erosion of personal
Journal of Criminology, 37, 635–657.
confidence. Some scholars (e.g., Furedi,
Cabinet Office. (2002). Identity fraud: A study.
1997, 2006) have focused on the culture of
Retrieved May 27, 2007 from http://www.
fear which is exacerbated by media exposes
identitycards.gov.uk/downloads/id_fraud-
of victims. Best (1999) discussed how in this report.pdf
Carcach, C., Frampton, P., Thomas, K., &
regard media imperatives dictate a continu-
Cranich, M. (1995). Explaining fear of crime
ing focus on ‘‘new’’ crimes and ‘‘new’’
in Queensland. Journal of Quantitative dangers. Internet-related identity theft Criminology, 11, 271–287.
clearly fits into these categories and provides
Chadee, D., Austen, L., & Ditton, J. (2007). The
ready grist for the media mill, with a content
relationship between likelihood and fear of
criminal victimization. British Journal of
analysis of media reports on identity theft Criminology, 47, 133–153.
identifying themes of identity theft as ‘‘un-
Ditton, J., & Farrell, S. (2007). The British
stoppable’’ and driven by new technologies
Crime Survey and fear of crime. In M.
(Morris & Gilbert, 2008). The likelihood is
Hough, & M. Maxfield (Eds.), Surveying
crime in the 21st century (pp. 223–243).
that as time passes the use of identity tokens
Monsey, NY: Criminal Justice Press.
will be less novel and people will become
Finch, E. (2007). The problem of stolen identity
more familiar with them and their utility.
and the Internet. In Y. Jewkes (Ed.), Crime
ork University Libraries] at 15:30 03 January 2015
Better safety precautions and mechanisms to
on-line (pp. 29–43). Cullompton, UK: Willan.
prevent and reduce fraud will be developed.
Fitzgerald, R. (2008). Fear of crime and the
However, the general erosion of trust and
neighbourhood context in Canadian cities.
Crime and Justice Research Paper Series.
feelings of impotence are less easily remedied
Ottawa, Ontario: Canadian Centre for
and belong to a much wider social project. Justice Statistics.
Fox, S. (2001). Fear of online crime. Pew Internet Tracking Report. Washington, Downloaded by [Y
DC: Pew Internet & American Life Project. Notes
Furedi F. (1997). Culture of fear: Risk-tasking 1.
A detailed exploration of cyber-identity
and the morality of low expectation. London:
theft is beyond the scope of this article. Cassell.
For a review see Roberts (2008).
Furedi, F. (2006). Culture of fear revisited: Risk- 2.
This is the 2009 figure based on only those
taking and the morality of low expectation. who incurred costs. London: Continuum.
Gibson, R., Wilson, S., Meagher, G., Dene-
mark, D., & Western, M. (2005). Introduc- References
tion. In S. Wilson, G. Meagher, R. Gibson,
Anderson, K. B. (2006). Who are the victims of
D. Denemark, & M. Western (Eds.), Aus-
identity theft? The effect of demographics.
tralian social attitudes: The first report (pp.
Journal of Public Policy & Marketing, 25,
1–11). Sydney: University of New South 160–171. Wales Press.
Fear of Cyber-Identity Theft and Related Fraudulent Activity 327
Grover, A., Berghel, H., & Cobb, D. (2011).
LoPucki, L. M. (2001). Human identification
The state of the art in identity theft.
theory and the identity theft problem. Texas
Advances in Computers, 83, 1–50. Law Review, 80, 89–135.
Hale, C. (1996). Fear of crime: A review of the
Lynch, J. (2005). Identity theft in cyberspace:
literature. International Review of Victimol-
Crime control methods and their effective- ogy, 4, 79–150.
ness in combating phishing attacks. Berke-
Haygood, R., & Hensley, R. (2006). Preventing
ley Technology Journal, 20, 259–300.
identity theft: New legal obligations for
Marshall, A. M., & Tompsett, B. C. (2005).
businesses. Employment Relations Today,
Identity theft in an online world. Computer 33(3), 71–83.
Law & Security Report, 21, 128–137.
Higgins, G. E., Hughes, T., Ricketts, M. L., &
McCrea, R., Shyy, T-K., Western, J., &
Wolfe, S. E. (2008). Identity theft com-
Stimson, R. J. (2005). Fear of crime in
plaints: Exploring the state-level correlates.
Brisbane: Individual, social and neighbour-
Journal of Financial Crime, 15, 295–307.
hood factors in perspective. Journal of
Hille, P., Walsh, G., Brach, S., & Dose, D. Sociology, 41, 7–27.
(2011). Why online identity theft poses a
Monahan, T. (2009). Identity theft vulnerability:
major threat to e-business. In: Proceedings
Neoliberal governance through crime con-
of the ACM WebSci’11 (pp. 1–2). Retrieved
struction. Theoretical Criminology, 13, 155–
August 20, 2011 from http://journal.web 176. science.org/518/.
Morris, R. G., & Longmire, D. R. (2008). Media
Hoare, J., & Wood C. (2007). Plastic card and
constructions of identity theft. The Journal of
identity fraud. In J. Fkatekley (Ed.), Mobile
Criminal Justice and Popular Culture, 15, 76–
phone theft, plastic card and identity fraud: 93.
Findings from the 2005/06 British Crime
Paget, F. (2007). Identity theft. McAfee Avert
Survey (Supplementary Volume 2). Retrieved
Labs technical white paper No 1. Retrieved
February 21, 2009 from http://rds.home
May 27, 2007 from http://www.mcafee.com/
office.gov.uk/rds/pdfs07/hosb1007.pdf
us/local_content/white_papers/wp_id_theft_
Identity Theft Resource Centre. (2003). Identity en.pdf
theft: The aftermath 2003. Retrieved March
Phillips, T., Mitchell, D., Tranter, B., Clark, J.,
2, 2007 from http://www.idtheftcenter.org/
& Reed, K. (2008). The Australian Survey of idaftermath.pdf
Social Attitudes, 2007. Canberra: Australian
Identity Theft Resource Centre. (2005). Identity
Social Science Data Archive, The Austra-
theft: The aftermath 2004. Retrieved March lian National University.
2, 2007 from http://www.idtheftcenter.org/
Reisig, M. D., Pratt, T. C., & Holtfreter, K. idaftermath2004.pdf
(2009). Risk of internet theft victimization:
ork University Libraries] at 15:30 03 January 2015
Javelin Strategy and Research. (2009). 2009 iden-
Examining the effects of social vulnerability
tity fraud survey report: Identity fraud on the
and financial impulsivity. Criminal Justice
rise but consumer costs plummet as protections and Behavior, 36, 369–384.
increase. Pleasanton, CA: Author. Report
Roberts, L., & Indermaur, D. (2009). What
preview retrieved February 21, 2009 from
Australians think about crime and criminal
http://javelinstrategy.com/research
justice: Results from the 2007 Australian
Javelin Strategy and Research. (2010). 2010
Survey of Social Attitudes. Canberra: Aus- Downloaded by [Y
identity fraud survey report: Consumer ver-
tralian Institute of Criminology.
sion. Pleasanton, CA: Author. Report pre-
Roberts, L., & Indermaur, D. (forthcoming).
view retrieved August 16, 2011 from https://
Are neighbourhood incivilities associated
www.javelinstrategy.com/uploads/files/1004.
with fear of crime? In A. Evans (Ed.),
R_2010IdentityFraudSurveyConsumer.pdf
Australian social attitudes, Vol. 3.
Jefferson, J. (2004). Police and identity theft
Roberts, L. D., (2008). Cyber identity theft. In
victims – Preventing further victimisation.
R. Luppicini, & R. Adell (Eds.), Handbook
Australasian Centre for Policing Research, No
of research on technoethics (pp. 542–557).
7. Retrieved March 2, 2007 from http://www. Hershey, PA: Information Science
gov.au/publications2.asp?Report_ID¼154. Reference.
Kanan, J. W., & Pruitt, M. V. (2002). Savona, E. U., & Mignone, M. (2004). Modeling fear of crime and perceived
The fox and the hunters: How IC tech-
victimization risk: The (in)significance of
nologies change the crime race. European
neighborhood integration. Sociological In-
Journal on Criminal Policy and Research, quiry, 72, 527–548. 10, 3–26.
328 L. D. Roberts et al.
Sharp, T., Shreve-Neiger, A., Fremouw, W.,
Wall, D. S. (2008a). Cybercrime and the culture
Kane, J., & Hutton, S. (2004). Exploring the
of fear. Information, Communication and
psychological and somatic impact of iden- Society, 11, 861–884.
tity theft. Journal of Forensic Sciences, 49(1),
Wall, D. S. (2008b). Cybercrime, media and 131–136.
insecurity: The shaping of public percep-
Skogan, W. (1999)Measuring what matters:
tions of cybercrime. International Review of
Crime, disorder and fear. In R. Langworthy
Law, Computers and Technology, 22, 45–63.
(Ed.), Measuring what matters (pp. 37–53).
Wallis Consulting Group. (2007). Community
Washington, DC: U.S. Department of
attitudes to privacy 2007. Report prepared
Justice, National Institute of Justice and
for the Office of the Privacy Commissioner,
Office of Community Oriented Policing
Australia. Retrieved from http://www.privacy. Services.
gov.au/publications/rcommunity07.pdf
Stafford, M., Chandola, T., & Marmot, M.
Warr, M. (2000). Fear of crime in the United
(2007). Association between fear of crime
States: Avenues for research and policy.
and mental health and physical functioning.
Criminal Justice, 4, 451–489.
American Journal of Public Health, 97,
White, M. D., & Fisher, C. (2008). Assessing 2076–2081.
our knowledge of identity theft: The chal-
Sweeney, L. (2006). Protecting job seekers from
lenges to effective prevention and control
identity theft. IEEE Internet Computing,
efforts. Criminal Justice Policy Review, 19, 10(2), 74–78. 3–24.
Synovate. (2003). Federal Trade Commission –
Wyant, B. R. (2008). Multilevel impacts of per-
Identity theft survey report. Report prepared
ceived incivilities and perceptions of crime
for Federal Trade Commission. Retrieved
risk on fear of crime. Journal of Research in
May 20, 2007 from http://www.ftc.gov/os/
Crime and Delinquency, 45, 39–64. 2003/09/synovatereport.pdf
Ziersch, A., Putland, C., Palmer, C., MacDou-
Synovate. (2007). Federal Trade Commission –
gall, C., & Baum, F. (2007). Neighbourhood
2006 identity theft survey report. Report
life, social capital and perceptions of safety
prepared for Federal Trade Commission.
in the western suburbs of Adelaide. Aus-
Verton, D. (2001). Identity thefts skyrocket, but
tralian Journal of Social Issues, 42, 549–562.
less than 1% occur online. Computerworld, 35(7), 7.
ork University Libraries] at 15:30 03 January 2015 Downloaded by [Y