Issues and opinion on structural equation modeling
MIS Quarterly
Identity theft, social security numbers, and the Web
Communications of the ACM
Factors influencing the adoption of Internet banking
Journal of the AIS
The development of initial trust in an online company by new customers
Information and Management
Is spyware an Internet nuisance or public menace?
Communications of the ACM - Spyware
Spyware: a view from the (online) street
Communications of the ACM - Spyware
Usable privacy and security for personal information management
Communications of the ACM - Personal information management
Communications of the ACM - Supporting exploratory search
Communications of the ACM - Two decades of the language-action perspective
Why spoofing is serious internet fraud
Communications of the ACM
Promoting personal responsibility for internet safety
Communications of the ACM - Urban sensing: out of the woods
Keeping our network safe: a model of online protection behaviour
Behaviour & Information Technology
Information Security Journal: A Global Perspective
Studying users' computer security behavior: A health belief perspective
Decision Support Systems
Technical opinion: What drives the adoption of antiphishing measures by Hong Kong banks?
Communications of the ACM - A Blind Person's Interaction with Technology
Understanding compliance with internet use policy from the perspective of rational choice theory
Decision Support Systems
Your age is showing: an analysis of identity fraud in online game classification systems
Proceedings of the 14th Annual International Conference on Electronic Commerce
Expenditures on consumer protection and business competition
International Journal of Mobile Communications
Hi-index | 0.00 |
The proliferation of the online business transaction has led to a large number of incidents of identity theft, which have incurred expensive costs to consumers and e-commerce industries. Fighting identity theft is important for both online business and consumers. Although the practical significance of fighting identity theft has been of great interest, empirical studies on identity theft are very limited. Drawing upon coping behavior theories, this study examines two types of coping behaviors to fight identity theft (i.e., conventional coping and technological coping). Following structural equation modeling approach, we test the model using data collected from 117 subjects through a survey. The results reveal that both conventional coping and technological coping are effective to defend against identity theft. Technological coping is determined by an individual's conventional coping, self-efficacy, perceived effectiveness of coping, and social influence. This study presents a timely empirical study on identity theft, and provides valuable insights for consumers, government agencies, and e-commerce industries.