Skip to main content
Log in

‘But I’ve never sent them any personal details apart from my driver’s licence number …’: Exploring seniors’ attitudes towards identity crime

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Identity crime is argued to be one of the most significant crime problems of today. This article examines identity crime, through the attitudes and practices of a group of seniors in Queensland, Australia. It examines their own actions towards the protection of their personal data in response to a fraudulent email request. Applying the concept of a prudential citizen (as one who is responsible for self-regulating their behaviour to maintain the integrity of one’s identity) it will be argued that seniors often expose identity information through their actions. However, this is demonstrated to be the result of flawed assumptions and misguided beliefs over the perceived risk and likelihood of identity crime, rather than a deliberate act. This article concludes that to protect seniors from identity crime, greater awareness of appropriate risk-management strategies towards disclosure of their personal details is required to reduce their inadvertent exposure to identity crime.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. For a more in depth understanding of identity crime including how it is perpetrated, victimisation rates, the consequences of identity crime and legislative responses see Wall, 2013; Anderson, 2006; Bert-Jap Koops et al, 2009; Roberts et al, 2013; Farrar, 2011.

References

  • Allison, S., Schuck, A. and Lersch, K. (2005) Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice 33(1): 19–29.

    Article  Google Scholar 

  • Anderson, K. (2006) Who are the victims of identity theft? The effect of demographics. Journal of Public Policy and Marketing 25(2): 106–171.

    Article  Google Scholar 

  • Anonymous. (2015) Ashley Madison hack has exposed an enormous security breach, Sydney Morning Herald, August, http://www.smh.com.au/digital-life/digital-life-news/ashley-madison-hack-has-exposed-an-enormous-security-breach-20150820-gj42ph.html, accessed 24 August 2015.

  • Australasian Centre for Policing Research. (2006) Standardisation of definitions of identity crime terms: A step towards consistency. Report Series 145.3, http://www.aic.gov.au/crime_types/economic/idfraud.html, accessed 9 April 2015.

  • Australian Government. (2013) National identity security strategy. Report, http://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/National%20Identity%20Security%20Strategy%202012.PDF, accessed 9 April 2015.

  • Choo, K. (2011) Cyber threat landscape face by financial and insurance industry. Trends and Issues in Crime and Criminal Justice 408: 1–6.

    Google Scholar 

  • Copes, H., Kerley, K., Huff, R. and Kane, J. (2010) Differentiating identity theft: An exploratory study of victims using a national victimisation survey. Journal of Criminal Justice 38(5): 1045–1052.

    Article  Google Scholar 

  • Farrar, J. (2011) Fighting identity crime. Bond Law Review 23(1): 88–101.

    Google Scholar 

  • Hoar, S. (2001) Identity theft: The crime of the new millennium. Oregon Law Review 80(4): 1423–1447.

    Google Scholar 

  • Holt, T. and Turner, M. (2012) Examining risks and protective factors of on-line identity theft. Deviant Behaviour 33(4): 308–323.

    Article  Google Scholar 

  • Holtfreter, K., Reisig, M. and Blomberg, T. (2006) Consumer fraud victimisation in Florida: An empirical study. St Thomas Law Review 18(3): 761–789.

    Google Scholar 

  • Jaishankar, K. (2008) Identity related crime in the cyberspace: Examining phishing and its impact. International Journal or Cyber Criminology 2(1): 10–15.

    Google Scholar 

  • Kemshall, H. (2002) Effective practice in probation: An example of ‘advanced liberal’ responsibilisation? The Howard Journal 41(1): 41–58.

    Article  Google Scholar 

  • Kemshall, H. (2006) Social policy and risk. In: G. Mythen and S. Walklate (eds.) Beyond the Risk Society: Critical Reflections on Risk and Human Society. Berkshire, UK: McGraw-Hill Education, pp. 60–76.

    Google Scholar 

  • Kemshall, H. (2011) Crime and risk: Contested territory for risk theorising. International Journal of Law, Crime and Justice 39(4): 218–229.

    Article  Google Scholar 

  • Koops, B., Leenes, R., Meints, M., van der Meulen, N. and Jaquet-Chiffelle, D. (2009) A typology of identity related crime: Conceptual, technical and legal issues. Information Communication and Society 12(1): 1–24.

    Article  Google Scholar 

  • Lupton, D. (2006) Sociology and risk. In: G. Mythen and S. Walklate (eds.) Beyond the Risk Society: Critical Reflections on Risk and Human Society. Berkshire, UK: McGraw-Hill Education, pp. 11–24.

    Google Scholar 

  • McCarthy, K. (2015) 32 data breaches larger than Sony’s in the past year, Huffington Post 8 January, http://www.huffingtonpost.com/kyle-mccarthy/32-data-breaches-larger-t_b_6427010.html, accessed 9 April 2015.

  • Monahan, T. (2009) Identity theft vulnerability: Neoliberal governance through crime construction. Theoretical Criminology 13(2): 155–176.

    Article  Google Scholar 

  • Munson, L. (2014) Target data breach: Why UK business needs to pay attention, Computer Weekly March, http://www.computerweekly.com/feature/Target-data-breach-Why-UK-business-needs-to-pay-attention, accessed 9 April 2015.

  • Pontell, H. (2002) ‘Pleased to meet you Won’t you guess my name?’ Identity fraud, cyber-crime and white-collar delinquency. Adelaide Law Review 23(2): 305–328.

    Google Scholar 

  • Reiboldt, W. and Vogel, R. (2001) A critical analysis of telemarketing fraud in a gated senior community. Journal of Elder Abuse and Neglect 13(4): 21–38.

    Article  Google Scholar 

  • Roberts, L., Indermaur, D. and Spiranovic, C. (2013) Fear of cyber- identity theft and related fraudulent activity. Psychiatry, Psychology and the Law 20(3): 315–328.

    Article  Google Scholar 

  • Rose, N. (1999) Powers of Freedom: Reframing Political Thought. Cambridge, UK: Cambridge University Press.

    Book  Google Scholar 

  • Ross, M., Grossman, I. and Schryer, E. (2014) Contrary to psychological and popular opinion, there is no compelling evidence that older adults are disproportionately victimised by consumer fraud. Perspectives on Psychological Science 9(4): 427–442.

    Article  Google Scholar 

  • Ross, S. and Smith, RG. (2011) Risk factors for advance fee fraud victimisation. Trends and Issues in Crime and Criminal Justice 420: 1–6.

    Google Scholar 

  • Schiebe, S. et al (2014) Forewarning reduced fraud susceptibility in vulnerable consumers. Basic and Applied Social Psychology 36(3): 272–279.

    Article  Google Scholar 

  • Slosarik, K. (2002) Identity theft: An overview of the problem. The Justice Professional 15(4): 329–343.

    Article  Google Scholar 

  • Smith, R. (2011) International identity crime. In: C. Smith, S. Zhang and R. Barberet (eds.) Routledge Handbook of International Criminology. New York: Routledge, pp. 142–152.

    Google Scholar 

  • Smyth, S. (2014) The greening of Canadian cyber laws: What environmental law can teach and cyber law can learn. International Journal of Cyber Criminology 8(2): 111–155.

    Google Scholar 

  • Snyder, F. (2001) Sites of criminality and sites of governance. Social and Legal Studies 10(2): 251–256.

    Article  Google Scholar 

  • Steel, A. (2010) The true identity of Australian identity theft offences: A measured response or an unjustified status offence? University of New South Wales Law Journal Forum 16(1): 48–55.

    Google Scholar 

  • Sylvester, E. (2004) identity theft: Are the elderly targeted? Connecticut Public Interest Law Journal 3(2): 371–402.

    Google Scholar 

  • Walklate, S. and Mythen, G. (2010) Agency, reflexivity and risk: Cosmopolitan, neurotic or prudential citizen? The British Journal of Sociology 61(1): 45–62.

    Article  Google Scholar 

  • Wall, D. (2013) Policing identity crimes. Policing and Society 23(4): 437–460.

    Article  Google Scholar 

  • Whitson, J. and Haggerty, K. (2008) Identity theft and the care of the virtual self. Economy and Society 37(4): 572–594.

    Article  Google Scholar 

  • Yar, M. (2013) Cybercrime and Society. London: Sage.

    Google Scholar 

Download references

Acknowledgements

This research was conducted while the author was employed by the Queensland Police Service (QPS). The author gratefully acknowledges the support of QPS, however the views expressed in this article are solely those of the author and do not necessarily reflect the QPS. All errors and omissions are the responsibility of the author. Special thanks to Dr Matthew Ball for his insightful comments and feedback on earlier drafts of this article, as well as the two anonymous reviewers for their suggestions on clarifying the arguments throughout.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cassandra Cross.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cross, C. ‘But I’ve never sent them any personal details apart from my driver’s licence number …’: Exploring seniors’ attitudes towards identity crime. Secur J 30, 74–88 (2017). https://doi.org/10.1057/sj.2015.23

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2015.23

Keywords

Navigation