
Contents
-
-
-
-
-
-
-
-
-
-
-
I. Defining Identity Theft I. Defining Identity Theft
-
II. Patterns of Identity Theft II. Patterns of Identity Theft
-
A. Extent of Identity Theft A. Extent of Identity Theft
-
B. Clearance Rates B. Clearance Rates
-
-
III. Victims III. Victims
-
A. Special Victims A. Special Victims
-
B. Victim-Offender Relationship B. Victim-Offender Relationship
-
-
IV. Offenders IV. Offenders
-
V. Explaining Identity Theft V. Explaining Identity Theft
-
A. Lifestyle and Criminal Choice A. Lifestyle and Criminal Choice
-
B. Neutralizing Identity Theft B. Neutralizing Identity Theft
-
-
VI. Techniques VI. Techniques
-
A. Acquiring Identities A. Acquiring Identities
-
B. Converting Information B. Converting Information
-
-
VII. Policy VII. Policy
-
A. Identity Theft Legislation A. Identity Theft Legislation
-
B. Situational Crime Prevention B. Situational Crime Prevention
-
1. Increase Effort and Risk 1. Increase Effort and Risk
-
2. Remove Excuses 2. Remove Excuses
-
3. Change Perceptions 3. Change Perceptions
-
-
-
VIII. Conclusion VIII. Conclusion
-
Note Note
-
References References
-
-
-
-
-
-
-
-
-
-
10 Identity Theft
Get accessHeith Copes is a professor in the Department of Justice Sciences at the University of Alabama at Birmingham. His research addresses the criminal decision-making strategies of offenders and understanding the ways that offenders make sense of their lives and crimes.
Lynne M. Vieraitis is Professor of Criminology at the University of Texas at Dallas.
-
Published:18 September 2012
Cite
Abstract
This article provides an overview about identity theft. It elaborates the uncertainty and difficulties in defining the crime. It describes patterns and incidences of identity theft and mentions the primary sources of data that illuminates the extent and costs of this crime. It discusses those who are victimized by the crime and those who engage in it. This article offers two theoretical explanations for the reasons for committing identity theft by offenders. It details the common techniques used to locate information and convert it into cash or goods. Policy ideas, including existing legislation directed towards identity theft prevention, and the policy implications of current knowledge about identity theft are also discussed. Finally, the article outlines the need for future research to understand the crime of identity theft and thus increase the likelihood that policy makers and law enforcement are effective in reducing this crime.
Sign in
Personal account
- Sign in with email/username & password
- Get email alerts
- Save searches
- Purchase content
- Activate your purchase/trial code
- Add your ORCID iD
Purchase
Our books are available by subscription or purchase to libraries and institutions.
Purchasing informationMonth: | Total Views: |
---|---|
October 2022 | 1 |
January 2023 | 4 |
February 2023 | 5 |
March 2023 | 5 |
May 2023 | 1 |
June 2023 | 2 |
September 2023 | 1 |
October 2023 | 2 |
April 2024 | 5 |
May 2024 | 3 |
June 2024 | 7 |
August 2024 | 2 |
September 2024 | 1 |
November 2024 | 6 |
December 2024 | 4 |
April 2025 | 2 |
Get help with access
Institutional access
Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:
IP based access
Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.
Sign in through your institution
Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.
If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.
Sign in with a library card
Enter your library card number to sign in. If you cannot sign in, please contact your librarian.
Society Members
Society member access to a journal is achieved in one of the following ways:
Sign in through society site
Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:
If you do not have a society account or have forgotten your username or password, please contact your society.
Sign in using a personal account
Some societies use Oxford Academic personal accounts to provide access to their members. See below.
Personal account
A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.
Some societies use Oxford Academic personal accounts to provide access to their members.
Viewing your signed in accounts
Click the account icon in the top right to:
Signed in but can't access content
Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.
Institutional account management
For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.