Professional Documents
Culture Documents
This Content Downloaded From 49.36.181.17 On Sun, 14 Jan 2024 13:10:16 +00:00
This Content Downloaded From 49.36.181.17 On Sun, 14 Jan 2024 13:10:16 +00:00
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Wiley is collaborating with JSTOR to digitize, preserve and extend access to The Journal of
Consumer Affairs
GEORGE R. MILNE
The Economist (2001) reports that identity theft, defined as the appro
priation of someone else's identity to commit fraud or theft, continues to
be one of the fastest growing white-collar crimes in the United States.
Identity theft can occur when another person, using a victim's personal in
formation (most often social security number, name and address), opens
up a credit card account (or other accounts such as a wireless phone) and
incurs expenses. The billing statement is often diverted to another billing
address so that the victim is not aware charges have been made and pay
ment is overdue, which results in a bad credit rating. Individuals' identities
can be obtained through theft of wallet, mail, trash, or online surveillance
(FTC 2001). Often the victim is not aware that his information was mis
appropriated, and when the crime is discovered, reclaiming one's identity
is a lengthy and costly experience.
The prevention of identity theft, as shown in Figure 1, depends upon the
collective actions of government, businesses, and consumers. The govern
ment has the ability to pass criminal and civil legislation to help directly
deter theft and influence business policy by requiring better information
George R. Milne is Associate Professor of Marketing in the Isenberg School of Management, Uni
versity of Massachusetts—Amherst.
FIGURE 1
Criminal Legislation
BACKGROUND
The literature addressing the issue of identity theft is sparse. Law revie
articles have provided a general overview of the problem (e.g., Hoar 2
while others have evaluated the effectiveness of the courts and exis
statutes to provide a remedy to the victims of identity theft (e.g., A
2002; Saunders and Zucker 1999). In the marketing and public policy
erature, identity theft is not directly addressed. However, related res
has focused on privacy/security issues (Milne 2001; Miyazaki and
nadez 2001) and fraud (Lee and Geistfield 1999; Norrgard and Norrg
1998). The popular press, following the recent emergence of the iden
theft crime, has begun to write stories that can inform consumers. A
tronic search of the Lexis-Nexis major newspaper database for the t
"identity theft" returned 1,892 articles, 768 (40.6%) of which were
lished in 2001 (see Figure 2). Given the nascent stage of this phenome
this review will focus on describing how identity theft generally occ
how consumers are harmed, and what behaviors are recommended to m
imize the occurrence of identity theft.
While the rise in the crime rate corresponds with the growth of th
ternet, Jodie Bernstein, director of the FTC's Bureau of Consumer p
tion noted that less than 1% of identity theft cases can be linked to t
ternet (Verton 2001). Surprisingly, most appropriation of pers
identifying information has occurred through non-Internet based the
wallet, mail, or garbage. Personal identifying information can inclu
name, address, driver's license, social security number, telephone num
place of employment, employee identification number, mother's ma
name, demand deposit account number, savings account number, or c
O
O
O
CM
cd
CD
CD
oo
CD
CD
8
CD
AJ
0
>
FIGURE 2
[
[
CO
NumberofIdentiyTheftAriclesPublishedbyYear* CD
CD
CM
CD
CD
O
CD
CD
OOOOOOOO
oooooooo
CDOOh-CDlOM"COCM
Consumers who fall victim to identity theft can be harmed by (1) hav
ing their privacy invaded, (2) suffering the psychological trauma of having
their reputation ruined, (3) incurring financial liabilities, and (4) undergo
ing tremendous transaction costs to restore their names.
METHOD
For this exploratory research, two small data samples were collecte
during fall 2001. The first sample was 61 junior and senior college stude
from across two sections of Internet Marketing at a large northeastern
versity. The students were asked to participate to help the school with
TABLE 1
Student Non-student
Sample Sample
I have ordered a copy of my credit report within
the last year. Decrease
When I order new checks I have the bank mail
them to me. Increase
RESULTS
Student Results
TABLE 2
Response
ResponsePracticing
Practicing
to Theft
Questionnaire
Questionnaire Items Question Prevention
Items Question Prevention
I always shred or tear up the credit card offers I receive in the mail 71% 71%
I always check each item in my billing statements for mistakes and 70% 70%
more credit
I carry more credit cards
cards than
than II need
need in
in my
my wallet1.
wallet'. 33% 67%
I always deposit my outgoing mail in post office collection boxes or at 59% 59%
I sometimes leave my mail in my mailbox (at home) for a day or two 44% 56%
When I order new checks I have the bank mail them to me. 77% 23%
have ordered
I have ordered aa copy
copyof
ofmy
mycredit
creditreport
reportwithin
within the
the last
last year'.
year1. 22% 22%
Before I reveal any personal identifying information I always find out 18% 18%
how
how marketers
marketers are
aregoing
goingtotouse
useit.it.
ordering credit reports annually (22%), and finding out how personal in
formation will be used before providing it to marketers (18%).
Non-Student Results
TABLE 3
Response Practicing
Response Practicing
To
To Theft
Theft
Questionnaire
Questionnaire Items Items Question Prevention
Question Prevention
I have ordered a copy of my credit report within the last year1. 23% 23%
picking mail from their mailbox the day it arrives (75%), and not writing so
cial security number on checks if asked by a merchant (68%). The second
grouping represents behaviors that less than two-thirds of non-students but
more than one-half practiced. These include checking credit card bills for
mistakes (66%), shredding credit card receipts (64%), not carrying extra
credit cards in wallet (62%), finding out how personal information will be
used before providing it to marketers (57%), depositing outgoing mail in
post office collection mailboxes (52%), and using non-obvious passwords
(51%). The third grouping represents preventative behaviors that less than
DISCUSSION
First, for both the non-student and student groups, less than 25% of
those surveyed ordered a copy of their credit report once a year. (Note that
this behavior was not significantly correlated with socially desirable be
havior.) It is likely these low numbers reflect that individuals do not con
sider tracking the credit report as a preventative measure, in part, because
they are not aware. Research is needed to measure consumer awareness of
this strategy to thwart identity theft. If awareness is low, a communications
program is needed to alert consumers to be watchful of their credit records.
The price of the report might be another reason for the low percentage of
consumers who ordered credit reports. At the time this research was con
ducted, the top price of ordering a credit report from the three major credit
bureaus was $8.50 per report. To remove the barrier of high costs, some
states have lower prices. Moreover, in six states, including the state where
the student sample was collected, individuals by law can get a free copy
CONCLUSIONS
REFERENCES
Alwin, Janice A. 2002. Privacy Planning: Putting the Privacy Statutes to Work for You. DePa
ness Law Journal. 14 (Spring): 353-80.
Bruner, Gordon C., II, and Paul Hensel. 1992. Marketing Scales Handbook: A Compilation
Item Measures. Chicago: American Marketing Association.
Crowne, Douglas P. and David Marlowe. 1960. A New Scale of Social Desirability Independ
Psychopathology. Journal of Consulting Psychology, 24 (August): 349-354.
Davis, Lance. 2002. With or Without Authorization, It's Still Identity Theft. McGeorge Law R
33 (Winter): 231-238.
Hoar, Sean. 2001. Current Development: Identity Theft—The Crime of the New Millennium. Oregon
Law Review, 80 (Spring): 1423-1447.
Hunt, Shelby D., Richard D. Sparkman, and James B. Wilcox. 1982. The Pretest in Survey Research:
Issues and Preliminary Findings. Journal of Marketing Research, 19 (May): 269-273.
Identity Theft and Assumption Deterrence Act. 1998. 18 U.S.C. S1028(a).
Lee, Jinkook and Loren V. Geistfield. 1999. Elderly Consumers' Receptiveness to Telemarketing
Fraud. Journal of Public Policy & Marketing, 18 (2): 208-18.
Milne, George R. 2001. The Effectiveness of Self-Regulated Privacy Protection: A Review and Frame
work for Future Research. In Handbook of Marketing and Society, edited by Paul N. Bloom and
Gregory T. Gundlach (pp. 462-485). Thousand Oaks, CA: Sage Publications.
Miyazaki, Anthony D. and Ana Fernandez. 2001. Consumer Perceptions of Privacy and Security Risks
for Online Shopping. Journal of Consumer Affairs, 35 (1): 27-44.
Norrgard, Lee E. and Julia M. Norrgard. 1998. Consumer Fraud: A Reference Handbook. Santa Bar
bara, CA: ABC-CLIO.
Saunders, Kurt M and Bruce Zucker. 1999. Counteracting Identity Fraud in the Information Age: The
Identity Theft and Assumption Deterrence Act. International Review of Law, Computers & Tech
nology, 13 (2): 183-192.
Verton, Dan. 2001. Identity Theft Skyrockets, but Less Than 1% Occur Online. Computer World.
35 (7): 7.
Wallich, Paul. 2002. Who's Who? Scientific American. 287 (July): 19-22.