The relationship between receiving phishing attempt and identity theft victimization in South Korea

作者: Seung Yeop Paek , Mahesh K. Nalla

DOI: 10.1016/J.IJLCJ.2015.02.003

关键词: PhishingSocial psychologyCybercrimePsychologyIdentity theft

摘要: Abstract In this research, the authors employ framework of Routine Activities Theory (RAT) to examine how receiving phishing attempts is associated with identity theft victimization. addition, study assesses whether mediates relationships between other indicators, including routine online activities, fear victimization, and sociodemographic characteristics Data from Korea Crime Victim Survey (KCVS) 2008 analyzed results suggest that respondents who have received are more likely be victimized by theft. Moreover, education level, activities victimization positively related

参考文章(37)
Kyung-shick Choi, Computer Crime Victimization and Integrated Theory: An Empirical Assessment International Journal of Cyber Criminology. ,vol. 2, pp. 308- ,(2008)
Russell Dean Vines, Rachael Lininger, Phishing: Cutting the Identity Theft Line ,(2005)
Heith Copes, Lynne M. Vieraitis, Identity Thieves: Motives and Methods ,(2012)
Charis Elizabeth Kubrin, Thomas Dain Stucky, Marvin D. Krohn, Researching Theories of Crime and Deviance ,(2008)
Ping An Wang, Assessment of Cybersecurity Knowledge and Behavior: An Anti-phishing Scenario international conference on internet monitoring and protection. pp. 1- 7 ,(2013)
William R. Shadish, Donald Thomas Campbell, Thomas D. Cook, Experimental and Quasi-Experimental Designs for Generalized Causal Inference ,(2001)
Zulfikar Ramzan, Phishing Attacks and Countermeasures Handbook of Information and Communication Security. pp. 433- 448 ,(2010) , 10.1007/978-3-642-04117-4_23
Thomas J. Holt, Adam M. Bossler, Examining the Relationship Between Routine Activities and Malware Infection Indicators Journal of Contemporary Criminal Justice. ,vol. 29, pp. 420- 436 ,(2013) , 10.1177/1043986213507401
Nalin Asanka Gamagedara Arachchilage, Steve Love, Security awareness of computer users: A phishing threat avoidance perspective Computers in Human Behavior. ,vol. 38, pp. 304- 312 ,(2014) , 10.1016/J.CHB.2014.05.046
GEORGE R. MILNE, ANDREW J. ROHM, SHALINI BAHL, Consumers’ Protection of Online Privacy and Identity Journal of Consumer Affairs. ,vol. 38, pp. 217- 232 ,(2004) , 10.1111/J.1745-6606.2004.TB00865.X