Abstract
In the Internet age, identity fraud has become quite a popular way to steal money—resulting in substantial numbers of victims as evidenced by victimization surveys. This article focuses on people who have been illegally debited from their bank account, one of the most common forms of identity fraud. For this group, we examine their patterns of action to report the incident to banks and police, and their success in achieving reimbursement of the money they lost. Following the argument of the Netherlands Council for Government Policy, it is assumed here that the “capacity to act” varies between people. In this context, it may lead to differential outcomes for victims after ID fraud. More specifically, we expect that groups in a socially disadvantaged position (low-educated) as well as impulsive people will more often refrain from contacting formal agencies (bank, police), and therefore more frequently lack reimbursement and remain with larger financial losses. Gottfredson and Hirschi’s self-control theory and Black’s theory on the behavior of law offer additional insight in support of this argument. We use data from 636 victims that were surveyed in the LISS panel, which is based on a Dutch representative population sample. Most of our hypotheses are confirmed by the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Considering the relative rarity of high eventual losses, we performed robustness checks on these results by using a three-category dependent variable (with 50 euros or more as the highest loss category) and four-category dependent variable (with 100 euros or more as the highest loss category). This yielded very similar results, with the exception of the relation for “initial loss between 50 and 99 euros.” In these alternative estimations, this category had higher eventual losses.
References
Avakame, E. F., Fyfe, J. J., & McCoy, C. (1999). ‘Did you call the police? What did they do?’ An empirical assessment of Black’s theory of mobilization of law. Justice Quarterly, 16, 765–792.
Benson, M. L. (2009). Editorial introduction. Offenders or opportunities: approaches to controlling identity theft. Criminology & Public Policy, 8, 231–236.
Black, D. J. (1976). The behavior of law. New York, NY: Academic.
Brands, J., & Van Wilsem, J. (2019). Connected and fearful? Exploring fear of online financial crime, Internet behaviour and their relationship. European Journal of Criminology, 2019, 1477370819839619.
Button, M., Lewis, C., & Tapley, J. (2014). Not a victimless crime: The impact of fraud on individual victims and their families. Security Journal, 27(1), 36–54.
Cole, S. A., & Pontell, H. (2006). “Don’t be low hanging fruit”: Identity theft as moral panic. In T. Monahan (Ed.), Surveillance and security (pp. 137–160). London: Routledge.
Copes, H., Kerley, K. R., Mason, K. A., & van Wyk, J. (2001). Reporting behavior of fraud victims and Black’s theory of law: An empirical assessment. Justice Quarterly, 18, 343–363.
Eurobarometer. (2018). Europeans’ attitudes towards Internet security. Brussels: Eurobarometer.
Felson, R. B., Messner, S. F., & Hoskin, A. (1999). The victim-offender relationship and calling the police in assaults. Criminology, 37(4), 931–948.
Gartner, R., & Macmillan, R. (1995). The effect of victim-offender relationship on reporting crimes of violence against women. Canadian Journal of Criminology, 37, 393–429.
Golladay, K., & Holtfreter, K. (2017). The consequences of identity theft victimization: An examination of emotional and physical health outcomes. Victims & Offenders, 12(5), 741–760.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford University Press.
Holt, T. J., & Lampke, E. (2010). Exploring stolen data markets online: products and market forces. Criminal Justice Studies, 23(1), 33–50.
Holt, T. J., Van Wilsem, J., Van de Weijer, S., & Leukfeldt, R. (2018). Testing an integrated self-control and routine activities framework to examine malware infection victimization. Social Science Computer Review, 2018, 0894439318805067.
Keizer, A. G., Tiemeijer, W., & Bovens, M. (2019). Why knowing what to do is not enough. New York, NY: Springer. https://doi.org/10.1007/978-94-024-1725-8
Langton, L. (2019). Victims of identity theft 2016. Washington, DC: Bureau of Justice Statistics.
Leukfeldt, R., Notté, R., & Malsch, M. (2018). Slachtofferschap van online criminaliteit. The Hague: WODC.
Paulissen, L., & Van Wilsem, J. (2015). Dat heeft iemand anders gedaan! Een studie naar slachtofferschap en modus operandi van identiteitsfraude in Nederland. Surrey: Reed Business Information.
Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964.
Pratt, T. C., Holtfreter, K., & Reisig, M. D. (2010). Routine online activity and Internet fraud targeting: ending the generality of routine activity theory. Journal of Research in Crime and Delinquency, 47, 267–296.
Pratt, T. C., Turanovic, J. J., Fox, K. A., & Wright, K. A. (2014). Self-control and victimization: A meta-analysis. Criminology, 52(1), 87–116.
Randa, R., & Reyns, B. W. (2019). The physical and emotional toll of identity theft victimization: A situational and demographic analysis of the National Crime Victimization Survey. Deviant Behavior, 2019, 1–15.
Reyns, B. W. (2013). Online routines and identity theft victimization. Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, 50, 216–238.
Schoepfer, A., & Piquero, N. L. (2009). Studying the correlates of fraud victimization and reporting. Journal of Criminal Justice, 37(2), 209–215.
Schreck, C. J. (1999). Criminal victimization and low self-control: An extension and test of a general theory of crime. Justice Quarterly, 16(3), 633–654.
Sipma, T., & Van Leijsen, E. (2019). Slachtofferschap van cyber- en gedigitaliseerde criminaliteit onder burgers. The Hague: WODC.
Turanovic, J. J., & Pratt, T. C. (2014). “Can’t stop, won’t stop”: Self-control, risky lifestyles, and repeat victimization. Journal of Quantitative Criminology, 30(1), 29–56.
Van der Meulen, N. (2011). Financial identity theft: context, challenges and countermeasures. The Hague: TMC Asser.
Van Wilsem, J. (2011). Worlds tied together? Online and non-domestic routine activities and their impact on digital and traditional threat victimization. European Journal of Criminology, 8(2), 115–127.
Van Wilsem, J. (2013a). ‘Bought it, but never got it’ Assessing risk factors for online consumer fraud victimization. European Sociological Review, 29(2), 168–178.
Van Wilsem, J. (2013b). Hacking and harassment—Do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice, 29(4), 437–453.
Xie, M., & Baumer, E. P. (2019). Crime victims’ decisions to call the police: Past research and new directions. Annual Review of Criminology, 2, 217–240.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
van Wilsem, J., Sipma, T., Leijsen, E.Mv. (2021). Show Me the Money! Identity Fraud Losses, Capacity to Act, and Victims’ Efforts for Reimbursement. In: Weulen Kranenbarg, M., Leukfeldt, R. (eds) Cybercrime in Context. Crime and Justice in Digital Society, vol I. Springer, Cham. https://doi.org/10.1007/978-3-030-60527-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-60527-8_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60526-1
Online ISBN: 978-3-030-60527-8
eBook Packages: Law and CriminologyLaw and Criminology (R0)