Holtfreter, K., Reisig, M. D., Pratt, T. C., & Holtfreter, R. E. (2015). Risky remote purchasing and identity theft victimization among older Internet users. Psychology, Crime & Law, 21(7), 681-698.
This article establishes that identity theft and victimization is more prevalent among older users of the internet in comparison to young users. This article is based on data from research that was conducted on individuals aged 60 years and above from the states of Arizona and Florida using interviews administered via telephone. The article also concludes that people that suffer from low levels of self-control are targets of theft of identity. People with low levels of self-control are weak and can make a purchase from sellers they have never met, just by receiving an email from people they do not even know. The article suggests that these vulnerable groups can protect themselves from being targets through the exercise of precautions.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press.
In this article, the authors describe the different atrocities that are committed using computers and social networks such as hacking, digital crime and modern terrorism and the legal structures that exist to deal with such crimes. The description of the different crimes provokes the reader into reading in depth and interacting with the book. The description also creates awareness for the reader.
Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216-238.
This article focuses on the modes used by the perpetrators to reach their targets. The research conducted shows that most victims of identity theft do not meet with the offenders. The people that rely on online shopping were a major target since they are tricked with the delivery of goods hence ends up ordering stuff from people who are not selling stuff, which leads to identity theft. This article is necessary as it warns people that shop online from people that they do not know.
Vidalis, S., and Angelopoulou, (2014). Assessing identity theft in the Internet of Things. IT CoNvergence PRActice (INPRA), 2(1), 15-21.
The authors are concerned with the issue of cyber-attacks in the internet of things. They describe how man is responsible for creating computers that later tend to harm him. They describe how the internet of things leads to cyber-attacks due to lack of security. This article is important as it assists the reader to understand the concept of the internet of things and how it has contributed to cybercrimes.
References
Holtfreter, K., Reisig, M. D., Pratt, T. C., & Holtfreter, R. E. (2015). Risky remote purchasing and identity theft victimization among older Internet users. Psychology, Crime & Law, 21(7), 681-698.
Reyns, B. W. (2013). Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50(2), 216-238.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press.
Vidalis, S., & Angelopoulou, O. (2014). Assessing identity theft in the Internet of Things. IT CoNvergence PRActice (INPRA), 2(1), 15-21.
Request Removal
If you are the original author of this essay and no longer wish to have it published on the thesishelpers.org website, please click below to request its removal:
- Essay Example: Seminars Review on Family Legislation in Australia
- Chesapeake IT Consulting - Case Study Example
- Texas Government Policy Regarding DACA - Term Paper Example
- Summary of Chapter 14 of the Think Java Book
- Annotated Bibliography Example: Mental Illness and the Criminal Justice System
- Law School Application Essays
- Property Crimes - Literature Review