Understanding The Phenomenon and Risks of Identity Theft and Fraud on Social Media
DOI:
https://doi.org/10.61973/apjisdt.v101.3Keywords:
Privacy, Identity theft, Fraud, Social media, InternetAbstract
The use of social media platforms has created new opportunities for people to connect and share information with one another. However, this has also increased the risk of identity theft and fraud. The purpose of this paper is to provide an overview of the phenomenon of identity theft and fraud on social media by exploring the various methods used by perpetrators to gain access to personal information, the ways in which they utilize this information to commit fraud, and the impact that these crimes can have on the victim’s privacy. This paper will also examine the various strategies that individuals and organizations can use to protect their privacy on the internet from identity theft and fraud on social media. Ultimately, this paper aims to increase understanding of the risks of social media use and to provide practical recommendations for minimizing these risks.
References
1. ACFE Indonesia Chapter #111. (2016). Survai Fraud Indonesia. https://acfeindonesia.or.id/wp-content/uploads/2017/07/SURVAI-FRAUD-INDONESIA-2016.pdf
2. Ahlqvist, T. (2008). Social media roadmaps : exploring the futures triggered by social
media. 78.
3. Altman, I. (1975). The Environment and Social Behavior. Environment And Behavior,
20(4), 34–61.
https://books.google.com/books/about/The_Environment_and_Social_Behavior.html?hl=i
d&id=GLBPAAAAMAAJ
4. Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information
privacy research in information systems. MIS Quarterly: Management Information Systems,
35(4), 1017–1041. https://doi.org/10.2307/41409971
5. Brindha, S., Swetha, K., Professor, A., & Kavitha, : R. (2018). Identity Theft (Emerging
Trends in Security Issues in Information Security). International Journal of Engineering
Research & Technology. https://doi.org/10.17577/IJERTCONV6IS14060
6. Copes, H., & Vieraitis, L. M. (2009). Understanding identity theft: Offenders’ accounts of
their lives and crimes. Criminal Justice Review, 34(3), 329–349.
https://doi.org/10.1177/0734016808330589
7. Crossler, R. E. (2010). Protection motivation theory: Understanding determinants to
backing up personal data. Proceedings of the Annual Hawaii International Conference on
System Sciences. https://doi.org/10.1109/HICSS.2010.311
8. DeLiema, M., Burnes, D., & Langton, L. (2021). The Financial and Psychological Impact
of Identity Theft Among Older Adults. Innovation in Aging, 5(4), 1–11.
https://doi.org/10.1093/GERONI/IGAB043
9. Harrell, E. (2019). Victims of Identity Theft, 2016. Bureau of Justice Statistics.
https://bjs.ojp.gov/library/publications/victims-identity-theft-2016
10. Hong, W., & Thong, J. Y. L. (2013). Internet privacy concerns: An integrated
conceptualization and four empirical studies. MIS Quarterly: Management Information
Systems, 37(1), 275–298. https://doi.org/10.25300/MISQ/2013/37.1.12
11. Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and
opportunities of Social Media. Business Horizons, 53(1), 59–68.
https://doi.org/10.1016/J.BUSHOR.2009.09.003
12. Kemp, S. (2023, April 27). Digital 2023 April Global Statshot Report — DataReportal –
Global Digital Insights. https://datareportal.com/reports/digital-2023-april-global-statshot
13. Literature review | The University of Edinburgh. (n.d.). Retrieved June 5, 2023, from
https://www.ed.ac.uk/institute-academic-development/study-hub/learningresources/literature-review#
14. Number of identity theft complaints, by age of victims U.S. 2022 | Statista. (n.d.). Retrieved
June 9, 2023, from https://www.statista.com/statistics/587677/identity-theft-complaintsvictims-age-in-the-us/
15. Nurdiani, I. P. (2020). Pencurian Identitas Digital Sebagai Bentuk Cyber Related Crime.
Jurnal Kriminologi Indonesia, 16(2), 1–10.
http://www.jurnalkesos.ui.ac.id/index.php/jki/article/viewFile/12571/67546786
16. Rahim Soomro, T., & Irshad, S. (2018). Identity Theft and Social Media. IJCSNS
International Journal of Computer Science and Network Security, 18(1), 43.
https://www.researchgate.net/publication/323185128
17. Raschke, R. L., Krishen, A. S., & Kachroo, P. (2014). Understanding the Components of
Information Privacy Threats for Location-Based Services. JOURNAL OF INFORMATION
SYSTEMS American Accounting Association, 28(1). https://doi.org/10.2308/isys-50696
18. Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the
Psychological and Somatic Impact of Identity Theft. Journal of Forensic Sciences, 49(1).
https://doi.org/10.1520/JFS2003178
19. Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., & Ijsselsteijn, W.
(2008). Investigating privacy attitudes and behavior in relation to personalization. Social
Science Computer Review, 26(1), 20–43. https://doi.org/10.1177/0894439307307682
20. Vitria, N. (2021). PENGARUH INTERNET BAGI SISWA-SISWI SMA NEGERI 3
PADANG. Science, Engineering, Education, and Development Studies (SEEDS):
Conference Series, 4(2). https://doi.org/10.20961/SEEDS.V4I2.56700
21. Xu, H., Dinev, T., Jeff Smith, H., Hart, P., & Jeff, H. (2008). Association for Information
Systems AIS Electronic Library (AISeL) Examining the Formation of Individual’ s Privacy
Concerns: Toward an Integrative View Recommended Citation.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 ASIA PACIFIC JOURNAL OF INFORMATION SYSTEM AND DIGITAL TRANSFORMATION

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.