Understanding The Phenomenon and Risks of Identity Theft and Fraud on Social Media
DOI:
https://doi.org/10.61973/apjisdt.v101.3Schlagwörter:
Privacy, Identity theft, Fraud, Social media, Internet.Abstract
The use of social media platforms has created new opportunities for people to connect and share information with one another. However, this has also increased the risk of identity theft and fraud. The purpose of this paper is to provide an overview of the phenomenon of identity theft and fraud on social media by exploring the various methods used by perpetrators to gain access to personal information, the ways in which they utilize this information to commit fraud, and the impact that these crimes can have on the victim’s privacy. This paper will also examine the various strategies that individuals and organizations can use to protect their privacy on the internet from identity theft and fraud on social media. Ultimately, this paper aims to increase understanding of the risks of social media use and to provide practical recommendations for minimizing these risks.
Literaturhinweise
ACFE Indonesia Chapter #111. (2016). Survai Fraud Indonesia. https://acfe-indonesia.or.id/wp-content/uploads/2017/07/SURVAI-FRAUD-INDONESIA-2016.pdf
Ahlqvist, T. (2008). Social media roadmaps : exploring the futures triggered by social media. 78.
Altman, I. (1975). The Environment and Social Behavior. Environment And Behavior, 20(4), 34–61. https://books.google.com/books/about/The_Environment_and_Social_Behavior.html?hl=id&id=GLBPAAAAMAAJ
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly: Management Information Systems, 35(4), 1017–1041. https://doi.org/10.2307/41409971
Brindha, S., Swetha, K., Professor, A., & Kavitha, : R. (2018). Identity Theft (Emerging Trends in Security Issues in Information Security). International Journal of Engineering Research & Technology. https://doi.org/10.17577/IJERTCONV6IS14060
Copes, H., & Vieraitis, L. M. (2009). Understanding identity theft: Offenders’ accounts of their lives and crimes. Criminal Justice Review, 34(3), 329–349. https://doi.org/10.1177/0734016808330589
Crossler, R. E. (2010). Protection motivation theory: Understanding determinants to backing up personal data. Proceedings of the Annual Hawaii International Conference on System Sciences. https://doi.org/10.1109/HICSS.2010.311
DeLiema, M., Burnes, D., & Langton, L. (2021). The Financial and Psychological Impact of Identity Theft Among Older Adults. Innovation in Aging, 5(4), 1–11. https://doi.org/10.1093/GERONI/IGAB043
Harrell, E. (2019). Victims of Identity Theft, 2016. Bureau of Justice Statistics. https://bjs.ojp.gov/library/publications/victims-identity-theft-2016
Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly: Management Information Systems, 37(1), 275–298. https://doi.org/10.25300/MISQ/2013/37.1.12
Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1), 59–68. https://doi.org/10.1016/J.BUSHOR.2009.09.003
Kemp, S. (2023, April 27). Digital 2023 April Global Statshot Report — DataReportal – Global Digital Insights. https://datareportal.com/reports/digital-2023-april-global-statshot
Literature review | The University of Edinburgh. (n.d.). Retrieved June 5, 2023, from https://www.ed.ac.uk/institute-academic-development/study-hub/learning-resources/literature-review#
Number of identity theft complaints, by age of victims U.S. 2022 | Statista. (n.d.). Retrieved June 9, 2023, from https://www.statista.com/statistics/587677/identity-theft-complaints-victims-age-in-the-us/
Nurdiani, I. P. (2020). Pencurian Identitas Digital Sebagai Bentuk Cyber Related Crime. Jurnal Kriminologi Indonesia, 16(2), 1–10. http://www.jurnalkesos.ui.ac.id/index.php/jki/article/viewFile/12571/67546786
Rahim Soomro, T., & Irshad, S. (2018). Identity Theft and Social Media. IJCSNS International Journal of Computer Science and Network Security, 18(1), 43. https://www.researchgate.net/publication/323185128
Raschke, R. L., Krishen, A. S., & Kachroo, P. (2014). Understanding the Components of Information Privacy Threats for Location-Based Services. JOURNAL OF INFORMATION SYSTEMS American Accounting Association, 28(1). https://doi.org/10.2308/isys-50696
Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the Psychological and Somatic Impact of Identity Theft. Journal of Forensic Sciences, 49(1). https://doi.org/10.1520/JFS2003178
Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., & Ijsselsteijn, W. (2008). Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review, 26(1), 20–43. https://doi.org/10.1177/0894439307307682
Vitria, N. (2021). PENGARUH INTERNET BAGI SISWA-SISWI SMA NEGERI 3 PADANG. Science, Engineering, Education, and Development Studies (SEEDS): Conference Series, 4(2). https://doi.org/10.20961/SEEDS.V4I2.56700
Xu, H., Dinev, T., Jeff Smith, H., Hart, P., & Jeff, H. (2008). Association for Information Systems AIS Electronic Library (AISeL) Examining the Formation of Individual’ s Privacy Concerns: Toward an Integrative View Recommended Citation. http://aisel.aisnet.org/icis2008/6
Downloads
Veröffentlicht
Ausgabe
Rubrik
Lizenz
Copyright (c) 2023 Asia Pacific Journal of Information System and Digital Transformation
![Creative Commons License](http://i.creativecommons.org/l/by-nc-sa/4.0/88x31.png)
Dieses Werk steht unter der Lizenz Creative Commons Namensnennung - Nicht-kommerziell - Weitergabe unter gleichen Bedingungen 4.0 International.