Skip to main content

Show Me the Money! Identity Fraud Losses, Capacity to Act, and Victims’ Efforts for Reimbursement

  • Chapter
  • First Online:
Cybercrime in Context

Part of the book series: Crime and Justice in Digital Society ((CJDS,volume I))

Abstract

In the Internet age, identity fraud has become quite a popular way to steal money—resulting in substantial numbers of victims as evidenced by victimization surveys. This article focuses on people who have been illegally debited from their bank account, one of the most common forms of identity fraud. For this group, we examine their patterns of action to report the incident to banks and police, and their success in achieving reimbursement of the money they lost. Following the argument of the Netherlands Council for Government Policy, it is assumed here that the “capacity to act” varies between people. In this context, it may lead to differential outcomes for victims after ID fraud. More specifically, we expect that groups in a socially disadvantaged position (low-educated) as well as impulsive people will more often refrain from contacting formal agencies (bank, police), and therefore more frequently lack reimbursement and remain with larger financial losses. Gottfredson and Hirschi’s self-control theory and Black’s theory on the behavior of law offer additional insight in support of this argument. We use data from 636 victims that were surveyed in the LISS panel, which is based on a Dutch representative population sample. Most of our hypotheses are confirmed by the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Considering the relative rarity of high eventual losses, we performed robustness checks on these results by using a three-category dependent variable (with 50 euros or more as the highest loss category) and four-category dependent variable (with 100 euros or more as the highest loss category). This yielded very similar results, with the exception of the relation for “initial loss between 50 and 99 euros.” In these alternative estimations, this category had higher eventual losses.

References

  • Avakame, E. F., Fyfe, J. J., & McCoy, C. (1999). ‘Did you call the police? What did they do?’ An empirical assessment of Black’s theory of mobilization of law. Justice Quarterly, 16, 765–792.

    Article  Google Scholar 

  • Benson, M. L. (2009). Editorial introduction. Offenders or opportunities: approaches to controlling identity theft. Criminology & Public Policy, 8, 231–236.

    Article  Google Scholar 

  • Black, D. J. (1976). The behavior of law. New York, NY: Academic.

    Google Scholar 

  • Brands, J., & Van Wilsem, J. (2019). Connected and fearful? Exploring fear of online financial crime, Internet behaviour and their relationship. European Journal of Criminology, 2019, 1477370819839619.

    Google Scholar 

  • Button, M., Lewis, C., & Tapley, J. (2014). Not a victimless crime: The impact of fraud on individual victims and their families. Security Journal, 27(1), 36–54.

    Article  Google Scholar 

  • Cole, S. A., & Pontell, H. (2006). “Don’t be low hanging fruit”: Identity theft as moral panic. In T. Monahan (Ed.), Surveillance and security (pp. 137–160). London: Routledge.

    Google Scholar 

  • Copes, H., Kerley, K. R., Mason, K. A., & van Wyk, J. (2001). Reporting behavior of fraud victims and Black’s theory of law: An empirical assessment. Justice Quarterly, 18, 343–363.

    Article  Google Scholar 

  • Eurobarometer. (2018). Europeans’ attitudes towards Internet security. Brussels: Eurobarometer.

    Google Scholar 

  • Felson, R. B., Messner, S. F., & Hoskin, A. (1999). The victim-offender relationship and calling the police in assaults. Criminology, 37(4), 931–948.

    Article  Google Scholar 

  • Gartner, R., & Macmillan, R. (1995). The effect of victim-offender relationship on reporting crimes of violence against women. Canadian Journal of Criminology, 37, 393–429.

    Article  Google Scholar 

  • Golladay, K., & Holtfreter, K. (2017). The consequences of identity theft victimization: An examination of emotional and physical health outcomes. Victims & Offenders, 12(5), 741–760.

    Article  Google Scholar 

  • Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.

    Google Scholar 

  • Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets online: products and market forces. Criminal Justice Studies, 23(1), 33–50.

    Article  Google Scholar 

  • Holt, T. J., Van Wilsem, J., Van de Weijer, S., & Leukfeldt, R. (2018). Testing an integrated self-control and routine activities framework to examine malware infection victimization. Social Science Computer Review, 2018, 0894439318805067.

    Google Scholar 

  • Keizer, A. G., Tiemeijer, W., & Bovens, M. (2019). Why knowing what to do is not enough. New York, NY: Springer. https://doi.org/10.1007/978-94-024-1725-8

    Book  Google Scholar 

  • Langton, L. (2019). Victims of identity theft 2016. Washington, DC: Bureau of Justice Statistics.

    Google Scholar 

  • Leukfeldt, R., Notté, R., & Malsch, M. (2018). Slachtofferschap van online criminaliteit. The Hague: WODC.

    Google Scholar 

  • Paulissen, L., & Van Wilsem, J. (2015). Dat heeft iemand anders gedaan! Een studie naar slachtofferschap en modus operandi van identiteitsfraude in Nederland. Surrey: Reed Business Information.

    Google Scholar 

  • Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964.

    Article  Google Scholar 

  • Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and Internet fraud targeting: ending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47, 267–296.

    Article  Google Scholar 

  • Pratt, T. C., Turanovic, J. J., Fox, K. A., & Wright, K. A. (2014). Self-control and victimization: A meta-analysis. Criminology, 52(1), 87–116.

    Article  Google Scholar 

  • Randa, R., & Reyns, B. W. (2019). The physical and emotional toll of identity theft victimization: A situational and demographic analysis of the National Crime Victimization Survey. Deviant Behavior, 2019, 1–15.

    Google Scholar 

  • Reyns, B. W. (2013). Online routines and identity theft victimization. Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50, 216–238.

    Article  Google Scholar 

  • Schoepfer, A., & Piquero, N. L. (2009). Studying the correlates of fraud victimization and reporting. Journal of Criminal Justice, 37(2), 209–215.

    Article  Google Scholar 

  • Schreck, C. J. (1999). Criminal victimization and low self-control: An extension and test of a general theory of crime. Justice Quarterly, 16(3), 633–654.

    Article  Google Scholar 

  • Sipma, T., & Van Leijsen, E. (2019). Slachtofferschap van cyber- en gedigitaliseerde criminaliteit onder burgers. The Hague: WODC.

    Google Scholar 

  • Turanovic, J. J., & Pratt, T. C. (2014). “Can’t stop, won’t stop”: Self-control, risky lifestyles, and repeat victimization. Journal of Quantitative Criminology, 30(1), 29–56.

    Article  Google Scholar 

  • Van der Meulen, N. (2011). Financial identity theft: context, challenges and countermeasures. The Hague: TMC Asser.

    Book  Google Scholar 

  • Van Wilsem, J. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8(2), 115–127.

    Article  Google Scholar 

  • Van Wilsem, J. (2013a). ‘Bought it, but never got it’ Assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168–178.

    Article  Google Scholar 

  • Van Wilsem, J. (2013b). Hacking and harassment—Do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice, 29(4), 437–453.

    Article  Google Scholar 

  • Xie, M., & Baumer, E. P. (2019). Crime victims’ decisions to call the police: Past research and new directions. Annual Review of Criminology, 2, 217–240.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Johan van Wilsem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

van Wilsem, J., Sipma, T., Leijsen, E.Mv. (2021). Show Me the Money! Identity Fraud Losses, Capacity to Act, and Victims’ Efforts for Reimbursement. In: Weulen Kranenbarg, M., Leukfeldt, R. (eds) Cybercrime in Context. Crime and Justice in Digital Society, vol I. Springer, Cham. https://doi.org/10.1007/978-3-030-60527-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60527-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60526-1

  • Online ISBN: 978-3-030-60527-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics