69
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Hello, You’ve been hacked: a study of victim notification preferences

, , , , &
Received 06 Oct 2023, Accepted 04 Apr 2024, Published online: 10 Apr 2024

References

  • Anderson, K. B., E. Durbin, and M. A. Salinger. 2008. “Identity Theft.” Journal of Economic Perspectives 22 (2): 171–192. https://doi.org/10.1257/jep.22.2.171.
  • Banks G. C., S. Kepes, and K. P. Banks. 2012. Publication Bias. Educational Evaluation and Policy Analysis 34 (3): 259–277. https://doi.org/10.3102/0162373712446144.
  • Barnes J. C., M. F. TenEyck, T. C. Pratt, and F. T. Cullen. 2020. How Powerful is the Evidence in Criminology? On Whether We Should Fear a Coming Crisis of Confidence. Justice Quarterly 37 (3): 383–409. https://doi.org/10.1080/07418825.2018.1495252.
  • Barnum, S. 2012. “Standardizing Cyber Threat Intelligence Information with the Structured Threat Information Expression (Stix).” The Mitre Corporation 11:1–22.
  • Burnes, D., M. DeLiema, and L. Langton. 2020. “Risk and Protective Factors of Identity Theft Victimization in the United States.” Preventive Medicine Reports 17 (2): 126. https://doi.org/10.1016/j.pmedr.2020.101058.
  • Button, M., and C. Cross. 2017. Cyber Frauds, Scams and Their Victims. London: Taylor & Francis.
  • Button, M., D. Shepherd, D. Blackbourn, L. Sugiura, R. Kapend, and V. Wang. 2022. “Assessing the Seriousness of Cybercrime: The Case of Computer Misuse Crime in the United Kingdom and the victims’ Perspective.” Criminology & Criminal Justice: 1–22. https://doi.org/10.1177/17488958221128128.
  • Chopra F., I. Haaland, C. Roth, and A. Stegmann. 2023. The Null Result Penalty. The Economic Journal 134 (657): 193–219. https://doi.org/10.1093/ej/uead060
  • Cooke, E. M., E. J. Connolly, D. L. Boisvert, T. A. Armstrong, R. H. Lewis, N. Kavish, M. Woeckener, J. Wells, and J. Harper. 2020. “Examining How Testosterone and Cortisol Influence the Relationship Between Strain, Negative Emotions, and Antisocial Behavior: A Gendered Analysis.” Crime & Delinquency 66 (10): 1470–1501. https://doi.org/10.1177/0011128720903047.
  • Cross, C. 2015. “No Laughing Matter: Blaming the Victim of Online Fraud.” International Review of Victimology 21 (2): 187–204. https://doi.org/10.1177/0269758015571471.
  • Cross, C. 2016. “’they’re Very lonely’: Understanding the Fraud Victimization of Seniors.” International Journal for Crime, Justice and Social Democracy 5 (4): 60–75. https://doi.org/10.5204/ijcjsd.v5i4.268.
  • Cross, C., K. Richards, and R. G. Smith. 2016. “The Reporting Experiences and Support Needs of Victims of Online Fraud.” Trends & Issues in Crime & Criminal Justice 518:1–14.
  • Crow M. S., J. O. Smykla, H. O’Brien, T. Cerna, A. Johnson, S. Pisaris, M. Suarez, and J. Wilder. 2023. What’s in Your File Drawer? The Case of the Missing Null in Criminology and Criminal Justice. Crime & Delinquency 69 (12): 2574–2594. https://doi.org/10.1177/00111287221090959.
  • De Kimpe, L., M. Walrave, T. Snaphaan, L. Pauwels, W. Hardyns, and K. Ponnet. 2021. “Research Note: An Investigation of Cybercrime victims’ Reporting Behavior.” European Journal of Crime, Criminal Law and Criminal Justice 29 (1): 66–78. https://doi.org/10.1163/15718174-bja10019.
  • Federal Bureau of Investigation. 2022. “Internet Crime Report.” https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf.
  • Floyd, D. L., S. Prentice‐Dunn, and R. W. Rogers. 2000. “A Meta‐Analysis of Research on Protection Motivation Theory.” Journal of Applied Social Psychology 30 (2): 407–429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x.
  • Franco, A., N. Malhotra, and G. Simonovits. 2014. Publication bias in the social sciences: Unlocking the file drawer. Science 345 (6203): 1502–1505.
  • Frik, A., L. Nurgalieva, J. Bernd, J. Lee, F. Schaub, and S. Egelman. 2019. “Privacy and Security Threat Models and Mitigation Strategies of Older Adults”. In Fifteenth Symposium On Usable Privacy And Security (SOUPS), Santa Clara, CA, 21–40.
  • FTC (Federal Trade Commission). 2007. 2006 Identity Theft Survey Report. Federal Trade Commission, 1–109. Retrieved from https://www.ftc.gov/reports/federal-trade-commission-2006-identity-theft-survey-report-prepared-commission-synovate.
  • Guedes, I., M. Martins, and C. Cardoso. 2023. “Exploring the determinants of victimization and fear of online identity theft: An empirical study.” Security Journal 36 (3): 472–497.
  • Harrell, E. 2019. Victims of Identity Theft, 2016. Washington DC: U.S. Department of Justice: Bureau of Justice Statistics 1–29. Bulletin No. NCJ251147.
  • Harrell, E., and A. Thompson. October, 2023. Victims of Identity Theft. US Department of Justice, Bureau of Justice Statistics. https://bjs.ojp.gov/media/document/70156.
  • Hayes, B. E., E. N. O’Neal, and C. N. Hernandez. 2021. “The Sexual Victimization of College Students: A Test of Routine Activity Theory.” Crime & Delinquency 67 (12): 2043–2068. https://doi.org/10.1177/0011128720954347.
  • Howell, C. J., T. Fisher, C. N. Muniz, D. Maimon, and Y. Rotzinger. 2023. “A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach.” Journal of Contemporary Criminal Justice 39 (2): 298–317.
  • Howell, C. J., and D. Maimon. 2022. “Darknet Markets Generate Millions in Revenue Selling Stolen Personal Data, Supply Chain Study Finds.” The Conversation. https://theconversation.com/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data-supply-chain-study-finds-193506.
  • Howell, C. J., and Maimon, D. 2023. “Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds.” The Conversation. https://theconversation.com/darknet-markets-generate-millions-in-revenue-selling-stolen-personal-data-supply-chain-study-finds-193506
  • Jamieson, R., L. P. W. Land, D. Winchester, G. Stephens, A. Steel, A. Maurushat, and R. Sarre. 2012. “Addressing Identity Crime in Crime Management Information Systems: Definitions, Classification, and Empirics.” Computer Law & Security Review 28 (4): 381–395. https://doi.org/10.1016/j.clsr.2012.03.013.
  • Javelin. 2021. 2021 Identity Fraud Study: Shifting Angles. Javelin Strategy & Research.
  • Kabiri, S., J. Choi, S. M. Shadmanfaat, and J. Lee. 2021. “Using Structural Equations to Test a Multi-Theoretical Framework with Data on Cyberstalking Victimization in Iran: Self-Control, Control Deficit, peers’ Online Deviant Behaviors, and Online Deviant Lifestyles.” Crime & Delinquency 67 (11): 1706–1727. https://doi.org/10.1177/0011128720968501.
  • Leukfeldt, R. J., R. Notté, and M. Malsch. 2020. “Exploring the Needs of Victims of Cyber-Dependent and Cyber-Enabled Crimes.” Victims & Offenders 15 (1): 60–77. https://doi.org/10.1080/15564886.2019.1672229.
  • Li, Y., A. Yazdanmehr, J. Wang, and H. R. Rao. 2019. “Responding to Identity Theft: A Victimization Perspective.” Decision Support Systems 121:13–24. https://doi.org/10.1016/j.dss.2019.04.002.
  • Muniz, C. N. 2023. “Hello, You’ve Been Hacked: A Study of Victim Notification Preferences.” Conference presentationDefense and Innovation: A Cybercrime Symposium, Tampa, FL, United States, February 14-15.
  • Muniz, C. N., R. A. Powers, and K. Bleeker. 2022. “Crime Discounting of Violent Victimization: The Role of Crime Type and Incident-Level Correlates.” Crime & Delinquency 70 (1): 182–205. https://doi.org/10.1177/00111287221077636.
  • National Council on Identity Theft Protection. 2023. “2023 Identity Theft Facts and Statistics.” https://identitytheft.org/statistics/#:~:text=33%25%20of%20Americans%20Faced%20Some,theft%20attempt%20in%20their%20lives.
  • Ogbanufe, O., and R. Pavur. 2022. “Going Through the Emotions of Regret and Fear: Revisiting Protection Motivation for Identity Theft Protection.” International Journal of Information Management 62:102432. https://doi.org/10.1016/j.ijinfomgt.2021.102432.
  • Randa, R., and B. W. Reyns. 2020. “The Physical and Emotional Toll of Identity Theft Victimization: A Situational and Demographic Analysis of the National Crime Victimization Survey.” Deviant Behavior 41 (10): 1290–1304. https://doi.org/10.1080/01639625.2019.1612980.
  • Redmiles, E. M., S. Kross, and M. L. Mazurek. 2017. “Where Is the Digital Divide? A Survey of Security, Privacy, and Socioeconomics.” In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, 931–936.
  • Reisig, M. D., S. E. Wolfe, and T. C. Pratt. 2012. “Low Self-Control and the Religiosity-Crime Relationship.” Criminal Justice and Behavior 39 (9): 1172–1191. https://doi.org/10.1177/0093854812442916.
  • Reynolds, D. 2022. “Decisions, Decisions: An Analysis of Identity Theft victims’ Reporting to Police, Financial Institutions, and Credit Bureaus.” Victims & Offenders 18 (7): 1–28. https://doi.org/10.1080/15564886.2022.2128129.
  • Reyns, B. W., B. S. Fisher, and R. Randa. 2018. “Explaining Cyberstalking Victimization Against College Women Using a Multitheoretical Approach: Self-Control, Opportunity, and Control Balance.” Crime & Delinquency 64 (13): 1742–1764. https://doi.org/10.1177/0011128717753116.
  • Reyns, B. W., and R. Randa. 2017. “Victim Reporting Behaviors Following Identity Theft Victimization: Results from the National Crime Victimization Survey.” Crime & Delinquency 63 (7): 814–838. https://doi.org/10.1177/0011128715620428.
  • Rogers, R. W. 1975. “A Protection Motivation Theory of Fear Appeals and Attitude Change.” The Journal of Psychology 91 (1): 93–114. https://doi.org/10.1080/00223980.1975.9915803.
  • Rogers, R. W. 1983. “Cognitive and Physiological Processes in Fear-Based Attitude Change: A Revised Theory of Protection Motivation.” In Social Psychophysiology. A Sourcebook, edited by J. Cacioppo and R. Petty, 153–176. New York. NY: Guilford.
  • Sommestad, T., H. Karlzén, and J. Hallberg. 2015. “A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour.” International Journal of Information Security and Privacy 9 (1): 26–46. https://doi.org/10.4018/IJISP.2015010102.
  • Song, H., and S. S. Lee. 2020. “Motivations, Propensities, and Their Interplays on Online Bullying Perpetration: A Partial Test of Situational Action Theory.” Crime & Delinquency 66 (12): 1787–1808. https://doi.org/10.1177/0011128719850500.
  • Tsai, H. Y. S., M. Jiang, S. Alhabash, R. LaRose, N. J. Rifon, and S. R. Cotten. 2016. “Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective.” Computers & Security 59:138–150. https://doi.org/10.1016/j.cose.2016.02.009.
  • Van Bavel, R., N. Rodríguez-Priego, J. Vila, and P. Briggs. 2019. “Using Protection Motivation Theory in the Design of Nudges to Improve Online Security Behavior.” International Journal of Human-Computer Studies 123:29–39. https://doi.org/10.1016/j.ijhcs.2018.11.003.
  • Van de Weijer, S. G., R. Leukfeldt, and W. Bernasco. 2019. “Determinants of Reporting Cybercrime: A Comparison Between Identity Theft, Consumer Fraud, and Hacking.” European Journal of Criminology 16 (4): 486–508. https://doi.org/10.1177/1477370818773610.
  • White House. 2022. National Security Strategy. https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.