The identity theft response system

Abstract

Identity theft continues to grow in prevalence and complexity. Despite this growth, little is known about the identity theft response system and how it assists victims to recover. This study examines the response system by analysing 211 identity theft cases reported to IDCARE, a national identity and cybercrime victim support service.The study applies a sociotechnical systems methodology to establish the social, task and information processes of the Australian identity theft response system. The study also examines identity theft victims’ response activities and needs over a 12-month period.The identity theft response system is almost entirely dependent on the victim to respond to and limit the harm caused by identity theft. Overall, the response system is disjointed and lacking in coordination.

References

URLs correct as at February 2024

Attorney-General’s Department (AGD) 2016. Identity crime and misuse in Australia 2016. Canberra: AGD

Button M, Lewis C & Tapley J 2014. Not a victimless crime: The impact of fraud on individual victims and their families. Security Journal 27(1): 36–54

Button M, Tapley J & Lewis C 2013. The ‘fraud justice network’ and the infra-structure of support for individual fraud victims in England and Wales. Criminology & Criminal Justice 13(1): 37–61

Cross C, Richards K & Smith RG 2016. Improving responses to online fraud victims: An examination of reporting and support. Report to the Criminology Research Advisory Council. Canberra: Australian Institute of Criminology. https://www.aic.gov.au/crg/reports/crg-2913-14

Cross C, Smith RG & Richards K 2014. Challenges of responding to online fraud victimisation in Australia. Trends & issues in crime and criminal justice no. 474. Canberra: Australian Institute of Criminology. https://www.aic.gov.au/publications/tandi/tandi474

Ganzini L, McFarland B & Bloom J 1990. Victims of fraud: Comparing victims of white collar and violent crime. Bulletin of the American Academy of Psychiatry and the Law 18(1): 55–64

Goldsmid S, Gannoni A & Smith RG 2018. Identity crime and misuse in Australia: Results of the 2017 online survey. Statistical Report no. 11. Canberra: Australian Institute of Criminology. https://www.aic.gov.au/publications/sr/sr11

Golladay K & Holtfreter K 2017. The consequences of identity theft victimization: An examination of emotional and physical health outcomes. Victims & Offenders 12(5): 741–60

Hulme A, Thompson J, Plant KL, Read GJ, Mclean S, Clacy A & Salmon PM 2019. Applying systems ergonomics methods in sport: A systematic review. Applied Ergonomics 80: 214–25

Jamieson R, Land L, Sarre R, Steel A, Stephens G & Winchester D 2008. Defining identity crimes. Australasian Conference on Information Systems 2008 Proceedings, 107, 442–51. https://aisel.aisnet.org/acis2008/107/

Jorna P & Smith RG 2018. Identity crime and misuse in Australia 2017. Statistical Report no. 10. Canberra: Australian Institute of Criminology. https://www.aic.gov.au/publications/sr/sr10

Koops BJ & Leenes R 2006. Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit 30(9): 553–56

Kraemer-Mbula E, Tang P & Rush H 2013. The cybercrime ecosystem: Online innovation in the shadows? Technological Forecasting and Social Change 80(3): 541–55

Lacey D & Cuganesan S 2004. The role of organizations in identity theft response: The organization–individual victim dynamic. Journal of Consumer Affairs 38(2) 244–61

Lacey D & Salmon P 2015. It’s dark in there: Using systems analysis to investigate trust and engagement in dark web forums. Engineering Psychology and Cognitive Ergonomics 117–28

Marsh I, Cochrane J & Melville G 2004. Criminal justice: An introduction to philosophies, theories and practice. London: Routledge

Plant KL & Stanton NA 2016. Distributed cognition in Search and Rescue: loosely coupled tasks and tightly coupled roles. Ergonomics 59(10): 1353–76

Reyns BW & Randa R 2017. Victim reporting behaviours following identity theft victimization: Results from the National Crime Victimization Survey. Crime & Delinquency 63(7): 814–38

Salmon P, Lenne MG, Walker GH, Stanton NA & Filtness A 2014. Using the Event Analysis of Systemic Teamwork (EAST) to explore conflicts between different road user groups when making right hand turns at urban intersections. Ergonomics 57(11): 1628–42

Saunders KM & Zucker B 1999. Counteracting identity fraud in the information age: The Identity Theft and Assumption Deterrence Act. International Review of Law, Computers & Technology 13(2): 183–92

Smith RG, Brown R, Harris-Hogan S 2015. Identity crime and misuse in Australia: Results of the 2014 online survey. Research and public policy series no. 130. Canberra: Australian Institute of Criminology. https://www.aic.gov.au/publications/rpp/rpp130

Smith RG & Jorna P 2018a. Counting the costs of identity crime and misuse in Australia, 2015–16. Statistical Bulletin no. 15. Canberra: Australian Institute of Criminology. https://www.aic.gov.au/publications/sb/sb15

Smith RG & Jorna P 2018b. Identity crime and misuse in Australia: Results of the 2016 online survey. Statistical Report no. 6. Canberra: Australian Institute of Criminology. https://www.aic.gov.au/publications/sr/sr6

Song H, Lynch MJ & Cochran JK 2016. A macro-social exploratory analysis of the rate of interstate cyber-victimization. American Journal of Criminal Justice 41(3): 583–601

Spalek B 1999. Exploring the impact of financial crime: A study looking into the effects of the Maxwell scandal upon the Maxwell pensioners. International Review of Victimology 6(3): 213–30

Stanton N, Baber C & Harris D 2008. Modelling command and control: Event analysis of systemic teamwork. Aldershot: CRC Press

Stanton N & Harvey C 2017. Beyond human error taxonomies in assessment of risk in sociotechnical systems: A new paradigm with the EAST ‘broken-links’ approach. Ergonomics 60(2): 221–33

Stanton N, Rafferty L & Blane A 2012. Human factors analysis of accidents in system of systems. Journal of Battlefield Technology 15(2): 23–30

Stanton N, Roberts A & Fay D 2017. Up periscope: understanding submarine command and control teamwork during a simulated return to periscope depth. Cognition, Technology & Work 19(2–3): 399–417

Stanton N, Salmon P, Rafferty L, Walker G, Baber C & Jenkins D 2013. Human factors methods: A practical guide for engineering and design, 2nd ed. Aldershot: Ashgate

Walker G, Stanton N, Baber C, Wells L, Gibson H, Salmon P & Jenkins D 2010. From ethnography to the EAST method: A tractable approach for representing distributed cognition in Air Traffic Control. Ergonomics 53(2), 184–97

Wall DS 2013. Policing identity crimes. Policing and Society 23(4): 437–60

Wright K 2005. Researching internet-based populations: Advantages and disadvantages of online survey research, online questionnaire authoring software packages, and web survey services. Journal of Computer-Mediated Communication 10(3): JCMC1034