<<

CENTER for Bibliography VICTIM RESEARCH

IDENTITY AND VICTIMIZATION: What We Know about and Fraud Victims Bibliography of Research and Practice

August 2019 RESEARCH EVIDENCE ON IDENTITY THEFT AND FRAUD

AARP Foundation. (2003).Off the Hook: Reducing Participation in Beals, M., DeLiema, M., & Deevy, M. (2015). Framework for . Retrieved Jun 2019 from https://assets. a taxonomy of fraud. Financial Fraud Research Center at aarp.org/rgcenter/consume/d17812_fraud.pdf Stanford Center on Longevity and FINRA Investor Education Alseadoon, I.M., Othman, M.F.I., Foo, E., & Chan, T. (2013). Foundation. Retrieved Jun 2019 from http://longevity3. Typology of Victims Based on Their Behavioural stanford.edu/framework-for-a-taxonomy-of-fraud/ Response: Proceedings of the Americas Conference on Benibo, B.R, Chambers, V., & Thorne, B. (2016). Breaking bad Information Systems Annual Meeting. Red Hook, NY: Curran news to victims of identity theft: Lessons from medical Associates Inc. doctors. Journal of Accountancy, 222(2), 30. Anderson, K.B. (2004). Consumer Fraud in the : An Berg, S.E. (2006). Recommendations for a Comprehensive Identity FTC Survey. Retrieved Jun 2019 from https://www.ftc.gov/ Theft Victimization Survey Framework and Information sites/default/files/documents/reports/consumer-fraud- Technology Prevention Strategies (Thesis). Retrieved Jun united-states-ftc-survey/040805confraudrpt.pdf 2019 from https://scholarworks.rit.edu/theses/526/ Anderson, K.B. (2006). Who are the victims of identity theft? The Berg, S. (2007). The Impact of Demographic and Incident effect of demographics. Journal of Public Policy & Marketing, Characteristics on the Reporting Behaviors of Identity Theft 25(2), 160-171. Victims. Paper presented at the Annual American Society of Anderson, K.B. (2007). Consumer Fraud in the United States: The conference, 1. Atlanta, GA. Second FTC Survey. Retrieved Jun 2019 from https://www. Berg, S. (2009). Rates and Traits of Identity Theft Victimization of ftc.gov/sites/default/files/documents/reports/consumer- College Students at a Technology Institute. Paper presented fraud-united-states-second-federal-trade-commission- at the Annual American Society of Criminology conference, survey-staff-report-federal-trade/fraud.pdf Philadelphia, PA. Anderson, K.B. (2013). Consumer Fraud in the United States, Betz, A.E. (2012). The Experiences of Adult/Child Identity Theft 2011: The Third FTC Survey. Retrieved Jun 2019 from Victims (Thesis). Retrieved from MLA International https://www.ftc.gov/sites/default/files/documents/ Bibliography Database. (Accession No. 3539341) reports/consumer-fraud-united-states-2011-third-ftc- Burgard, A. & Schlembach, C. (2013). Frames of fraud: A survey/130419fraudsurvey_0.pdf qualitative analysis of the structure and process of Anderson, K.B. (2016). Mass-Market Consumer Fraud: Who Is Most victimization on the . International Journal of Cyber Susceptible to Becoming a Victim? Retrieved Jun 2019 from Criminology, 7(2), 112. https://www.ftc.gov/system/files/documents/reports/ Burns, S. & Roberts, L. (2013). Applying the theory of planned mass-market-consumer-fraud-who-most-susceptible- behaviour to predicting online safety behaviour. becoming-victim/working_paper_332.pdf Prevention and Community Safety, 15(1), 48-64. Applied Research and Consulting. (2015). Non-traditional Costs Burton, C. (1998). Consumer Fraud: A 2008 Survey of AARP of Financial Fraud: Report of Survey Findings. Retrieved Jun Colorado Members’ Experiences and Opinions. Washington, 2019 from https://www.saveandinvest.org/sites/default/ DC: AARP Foundation. files/Non-Traditional-Costs-Of-Financial-Fraud-Survey- Findings.pdf Button, M., Lewis, C., & Tapley, J. (2009). A Better Deal for Fraud Victims: Research into Victims’ Needs and Experiences. Arachchilage N.A.G., & Love, S. (2014). Security awareness of National Fraud Authority. users: A phishing threat avoidance perspective. in Human Behavior, 38, 304-312. Button, M., Lewis, C., & Tapley, J. (2009). Fraud typologies and the victims of fraud: Literature review. National Fraud Arachchilage N.A.G., Love, S., & Beznosov, K. (2016). Phishing Authority. threat avoidance behaviour: An empirical investigation. Computers in Human Behavior, 60, 185-197. Button, M., Lewis, C., & Tapley, J. (2014). Not a : The impact of fraud on individual victims and their families. Bandi, S. (2016). An Empirical Assessment of User Online Security Security Journal, 27(1), 36-54. Behavior: Evidence from a University (Thesis). Retrieved from MLA International Bibliography Database. (Accession No. Button, M., McNaughton, N., Carol, K.J., & Owen, R. (2015). 10161071) Online fraud victims in England and Wales: Victims’ views on sentencing and the opportunity for . Baum, K. (2007). Identity theft, 2004. FBI Law Enforcement The Howard Journal of Crime and Justice, 54(2), 193-211. Bulletin, 75(9), 23-23. Button, M., Nicholls, C.M., Kerr, J., & Owen, R. (2014). Online Baum, K. (2008). Identity theft. The FBI Law Enforcement Bulletin, : Learning from victims why they fall for these scams. (12), 11. Australian & New Zealand Journal of Criminology, 47(3), 391- 408.

Center for Victim Research: Identity Theft and Fraud Victimization | 1 Chang, J.S., & Chong, M.D. (2010). Psychological influences in Davila, M., Marquart, J.W., & Mullings, J.L. (2005). Beyond e-mail fraud. Journal of , 17(3), 337-350. mother nature: Contractor fraud in the wake of natural Chen, H., Beaudoin, C.E., & Hong, T. (2017). Securing online disasters. Deviant Behavior, 26(3), 271-293. privacy: An empirical test on Internet scam victimization, Davinson, N., & Sillence, E. (2010). It won’t happen to me: online privacy concerns, and privacy protection behaviors. Promoting secure behaviour among internet users. Computers in Human Behavior, 70, 291-302. Computers in Human Behavior, 26(6), 1747. Chen, H., Beaudoin, C.E., Hong, T., Khader, M., & Yun, P.S. (2017). Dhabhai, H. (2012). Identity Theft Data Analysis Based on the 2012 Chapter 18: A multidisciplinary approach to understanding National Crime Victimization Survey. internet love scams. Implications for law enforcement. Dinger, E.L., & Sauer, J.H. (2006). Protecting your name: A Computers in Human Behavior, 523-291. survey of Montanans on identity theft. AARP Knowledge Chen, Y., Chen, P.S., Jing-Jang, H., Korba, L., et al. (2005). An Management, AARP Research. Retrieved Jun 2019 from analysis of online gaming crime characteristics. Internet https://www.aarp.org/money/scams-fraud/info-2006/ Research, 15(3), 246-261. mt_id.html Cheney, J.S., Hunt, R.M., Mikhed, V., Ritter, D., & Dixon, P. (2017). The geography of medical identity theft. World Vogan, M. (2014). Consumer use of fraud alerts Privacy Forum. Retrieved Jun 2019 from http://www. and credit freezes: An empirical analysis. Federal worldprivacyforum.org/wp-content/uploads/2017/12/ Reserve of Philadelphia. Retrieved Jun 2019 WPF_Geography_of_Medical_Identity_Theft_fs.pdf from http://citeseerx.ist.psu.edu/viewdoc/ Dolan, K.M. (2004). Internet auction fraud: The silent victims. download?doi=10.1.1.656.9363&rep=rep1&type=pdf Journal of Economic Crime Management, 2(1), 1-22. Chung, T.R., & Galletta, D. (2013).Nature vs. Nurture: The Genetic Downs, D.M., Ademaj, I., & Schuck, A.M. (2009). Internet Basis of Fraud Victimization.Retrieved Jun 2019 from security: Who is leaving the ‘virtual door’ open and why? https://canvas.harvard.edu/courses/8277/files/1799290/ First Monday, 14(1). download? verifier=WeZZJkj5ry0skk4Qb7ZvZ9z9CxyHTv 6lNu6PHDre&wrap=1 Elbogen, E.B., Sullivan, C.P., Wolfe, J., Wagner, H.R., & Beckham, J.C. (2013). Homelessness and money mismanagement in Copes, H., Kerley, K.R., Huff, R., & Kane, J. (2010). Differentiating Iraq and Afghanistan veterans. American Journal of Public identity theft: An exploratory study of victims using a Health, 103(2), S248-S254. national victimization survey. Journal of , (5), 1045. Fell, B.D. (2006). Identity Theft and Routine Activities: A Test of Victimization Using College Students (Thesis). Retrieved from Copes, H., Kerley, K.R., Mason, K.A., & Van Wyk, J . (2001). MLA International Bibliography Database. (Accession No. Reporting behavior of fraud victims and Black’s theory of 1437344) law: An empirical assessment. Justice Quarterly, 18(2), 343- 363. Fischer, P., Lea, S.E.G., & Evans, K.M. (2013). Why do individuals respond to fraudulent scam communications and Cornelius, D.R. (2016). Online Identity Theft Victimization: An lose money? The psychological determinants of scam Assessment of Victims and Non-Victims Level of Cyber Security compliance. Journal of Applied Social Psychology, 43(10), Knowledge (Thesis). Retrieved from MLA International 2060-2072. Bibliography Database. (Accession No. 10253894) Flores, W.R., Holm, H., Svensson, G., & Ericsson, G. (2014). Cross, C. (2016). ‘I’m , I’ma voice at the end of Using phishing experiments and scenario-based surveys the phone’: A Canadian case study into the benefits of to understand security behaviours in practice. Information providing telephone support to fraud victims. Crime Management & , 22(4), 393-406. Prevention & Community Safety, 18(3), 228-243. Freshman, A. (2012). Financial disaster as a risk factor for Cross, C., & Richards, K. (2016). The victims’ verdict: posttraumatic stress disorder: Internet survey of trauma in What happens when they try to report online fraud. victims of the Madoff . Health & Social Work, The Conversation. Retrieved Jun 2019 from http:// 37(1), 39-48. theconversation.com/the-victims-verdict-what-happens- when-they-try-to-report-online-fraud-64109 Garrett, E.V. (2015).Exploring Internet Users’ Vulnerability to Online Dating Fraud: Analysis of Routine Activities Theory Factors Cross, C., Richards, K., & Smith, R.G. (2016). Improving Responses (Thesis). University of Texas at Dallas. to Online Fraud Victims: An Examination of Reporting and Support. Retrieved Jun 2019 from http://crg.aic.gov.au/ Glassey-Tranguyen, T. (2012). Identity Theft. In W. Miller (ed.) reports/1617/29-1314-FinalReport.pdf The Social History of Crime and Punishment in America: An Encyclopedia. Sage Publications, Inc. Datar, T.D, Cole, K.A., & Rogers, M.K. (2014). Awareness of Scam E-Mails: An Exploratory Research Study. Proceedings of the Glodstein, D., Glodstein, S.L., & Fornaro, J. (2010). Fraud trauma Annual Conference on , and Security and syndrome: The victims of the Bernard Madoff scandal. Law,11-34. Richmond, VA. Journal of Forensic Studies in Accounting and Business, 6, 1-9.

Center for Victim Research: Identity Theft and Fraud Victimization | 2 Goel, S., Williams, K., & Dincelli, E. (2017). Got phished? Internet Holtfreter, K., Reisig, M.D., & Pratt, T.C. (2008). Low self‐control, security and human vulnerability. Journal of the Association routine activities, and fraud victimization.Criminology, for Information Systems, 18(1), 22-44. 46(1), 189-220. Goldberg, D. (1978). Manual of the general health questionnaire. Holtfreter, K., Reisig, M. D., Mears, D. P., & Wolfe, S. E. NFER Nelson. (2014). Financial Exploitation of the Elderl IIn A Consumer Golladay, K.A. (2017). Reporting behaviors of identity theft Context. Washington, DC: US Department of Justice, Office victims: An empirical test of Black’s theory of law.Journal of of Justice Programs, National Institute of Justice. Financial Crime, 24(1), 101-117. Holtfreter, K., Reisig, M. D., Pratt, T. C., & Holtfreter, R. E. (2015). Golladay, K.A., & Holtfreter, K. (2017). The consequences of Risky remote purchasing and identity theft victimization identity theft victimization: An examination of emotional among older Internet users. Psychology, Crime & Law, 21(7), and physical health outcomes. Victims & Offenders, 12(5), 681-698. 741-760. Huff, R., & Kane, J. (2010). Differentiating identity theft: An Goodrich, G.L. (2003). Identity Theft Awareness in North Central exploratory study of victims using a national victimization West Virginia (Thesis). Retrieved from MLA International survey. Journal of Criminal Justice, (5), 1045. Bibliography Database. (Accession No. 1415572) Hughes, K. (2004). Final report of cognitive research on the Gosling, S.D., Rentfrow, P.J., & Swann, W.B. (2003). A very brief new identity theft questions for the 2004 National Crime measure of the big five personality domains. Journal of Victimization Survey. Survey Methodology, 2. Research in Personality, 37, 504-528. Hutchings, A., & Hayes, H. (2009). Routine activity theory and Graham, R., & Triplett, R. (2017). Capable guardians in the phishing victimization: Who gets caught in the ‘net’? digital environment: The role of digital literacy in reducing Current Issues in Criminal Justice, (3), 433. phishing victimization.Deviant Behavior, 38(12), 1371- Identity Theft Resource Center (ITRC). (2009).Identity Theft: The 1382. Aftermath 2008. Retrieved Jun 2019 from https://www. Gray, K. (2010). Internet Identity Theft: An Insight into idtheftcenter.org/images/surveys_studies/Aftermath2008. and Law Enforcement Response (Thesis). Retrieved from pdf MLA International Bibliography Database. (Accession No. Identity Theft Resource Center. (2012).Facebook 3391484) Survey. Retrieved Jun 2019 from https://www.idtheftcenter. Harrell, E. (2017). Victims of Identity Theft, 2014. Washington, org/images/surveys_studies/FacebookSurveyFinding.pdf DC: US Department of Justice, Office of Justice Programs, Identity Theft Resource Center (ITRC). (2017). The Aftermath: Bureau of Justice Statistics. Retrieved Jun 2019 from The Non-Economic Impacts of Identity Theft. Retrieved Jun https://www.bjs.gov/content/pub/pdf/vit14.pdf 2019 from: https://www.idtheftcenter.org/wp-content/ Harrell, E. (2019). Victims of Identity Theft, 2016. Washington, uploads/2018/09/ITRC_Aftermath-2018_Web_FINAL.pdf DC: US Department of Justice, Office of Justice Programs, Identity Theft Resource Center (ITRC). (2018a).The Aftermath: Bureau of Justice Statistics. Retrieved April 2019 from: The Non-Economic Impacts of Identity Theft. San Diego, CA: https://www.bjs.gov/content/pub/pdf/vit16.pdf Identity Theft Resource Center. Retrieved from: https:// Harrell, E., & Langton, L. (2013). Victims of identity theft, 2012. www.idtheftcenter.org/wp-content/uploads/2018/09/ Retrieved Jun 2019 from https://www.bjs.gov/content/ ITRC_Aftermath-2018_Web_FINAL.pdf pub/pdf/vit12.pdf Internet Crime Complaint Center. (2018). 2017 Internet Crime Report. Retrieved Jun 2019 from https://pdf.ic3.gov/2017_ Harris, C., & Cares, A. (2010). Perceptions of Campus Safety and Actual Victimizations: Results from UMass Lowell’s Campus IC3Report.pdf Safety Survey. Paper presented at the Annual Conference of Jamieson, R., Land, L., Stephens, G., & Winchester, D. (2008). the American Society of Criminology, San Francisco, CA. Identity crime: The need for an appropriate government Harrison, B., Svetieva, E., & Vishwanath, A. (2016). Individual strategy. Forum on Public Policy: A Journal of the Oxford processing of phishing . Online Information Review, Round Table. 40(2), 265-281. Jansen, J., & Leukfeldt, R. (2016). Phishing and attacks Harrison, B., Vishwanath, A., Ng, Y.J., & Rao, R. (2015). Examining on customers in the Netherlands: A the Impact of Presence on Individual Phishing Victimization. qualitative analysis of factors leading to victimization. Paper presented at Annual Hawaii International Conference International Journal of Cyber Criminology, 10(1), 79-91. on System Sciences, Grand Wailea, Maui. Jefferson, J. (2004). and identity theft victims: Preventing Holt, T.J., & Turner, M.G. (2012). Examining risks and protective further victimization. Australasian Centre for Policing factors of on-line identity theft. Deviant Behavior, 33(4), Research. 308-323. Jefson, C.A. (2007). Identity theft and consumer health Holtfreter, K., Reisig, M.D., & Blomberg, T.G. (2005). Consumer education: A case study teaching the skill of decision fraud victimization in Florida: An empirical study.Thomas L. making. The Journal of School Health, 77(7), 373-378. Rev., 18, 761.

Center for Victim Research: Identity Theft and Fraud Victimization | 3 Kapardis, M.K., & Papastergiou, K. (2016). Fraud victimization Lastdrager, E., Gallardo, I.C., Hartel, P., & Junger, M. (2017). in Greece: Room for improvement in prevention and How Effective is Anti-Phishing Training for Children? Paper detection. Journal of Financial Crime, 23(2), 481-500. presented at Thirteenth Symposium on Usable Privacy and Kerley, K.R., & Copes, H. (2002). Personal fraud victims and their Security (SOUPS 2017), Santa Clara, CA. official responses to victimization.Journal of Police and Lea, S.E.G., Fischer, P., & Evans, K.M. (2009). Psychology of Criminal Psychology, 17(1), 19-35. scams: Provoking and committing errors of judgement. Kerstens, J., & Jansen, J. (2016). The victim-perpetrator overlap Psychologist, 22(7), 570-570. in financial : Evidence and reflection on the Lehrfeld, M.R. (2014). Phishing E-mails--Six Month Investigation overlap of youth’s on-line victimization and perpetration. into What People Click. Paper presented at the Annual Deviant Behavior, (5), 585. Meeting of the Association Supporting Computer Users in Kim, C. (2015). Credit cards: Weapons for domestic violence. Education (ASCUE), Myrtle Beach, SC. Duke Journal of Gender Law & Policy, 22(2), 281-309. Leukfeldt, E.R. (2014). Phishing for suitable targets in the Kirwan, G., Fullwood, C., & Rooney, B. (2017). Risk factors Netherlands: Routine activity theory and phishing for social networking site scam victimization amongst victimization.Cyberpsychology, and Behavior & Social Malaysian students. Cyberpsychology, Behavior and Social Networking, 17(8), 551-555. Networking, 2(21). Lewis, L. (2011). How Madoff did it: Victims’ accounts. Society, Kpaduwa, F.I. (2010). Evaluation of Residential Consumers 48(1), 70-76. Knowledge of Wireless and its Correlation Litan, A. (2004). Phishing victims likely will suffer identity theft with Identity Theft (Thesis). Retrieved from MLA fraud. Gartner Research. International Bibliography Database. (Accession No. Lokanan, M.E. (2014). The demographic profile of victims of 3414560) investment fraud: A Canadian perspective.Journal of Kreuter, E.A. (2003). The impact of identity theft through Financial Crime, 21(2), 226-242. . The Forensic Examiner, 12(5-6), 30. Luo, X., Zhang, W., Burd, S.D., & Seazzu, A.F. (2013). Investigating Kreuter, E.A. (2006). Victim Vulnerability: An Existential phishing victimization with the Heuristic–Systematic -Humanistic Interpretation of a Single-Case Study (Thesis). model: A theoretical framework and an exploration. Retrieved from MLA International Bibliography Database. Computers & Security, 38(Cybercrime in the Digital (Accession No. 3212935) Economy), 28-38. Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Mackinnon, A., Marcum, C.D., & Higgins, G.E. (2016). Identity Hong, J., & Nunge, E. (2007). Protecting People theft reports of adolescents. Journal of Financial Crime, from Phishing: The Design and Evaluation of an 23(4), 965-973. Embedded Training Email System. Retrieved Jun Madzima, K., Moyo, M., Dzawo, G., & Mbodila, M. (2015). Mobile 2019 from http://citeseerx.ist.psu.edu/viewdoc/ Security Threats: A Survey of How Mobile Device Users are download?doi=10.1.1.461.1457&rep=rep1&type=pdf Protecting Themselves From New Forms of . Paper Kyriakakis, A. (2015). The missing victims of . presented at the Annual International Conference on Cyber Utah L. Rev., 605. Warfare and Security, 178-188. Kruger National Park, Lacey, D., Zaiss, J., & Barber, K.S. (2016). Understanding victim- South Africa. enabled identity theft. Paper presented at 14th Annual Miers, D. (2014). Compensating deserving victims of violent Conference on Privacy, Security and Trust (PST), Auckland, crime: The criminal injuries compensation scheme 2012. New Zealand. Legal Studies, 34(2), 242-278. Lane, G.W., & Sui, D.Z. (2010). Geographies of identity theft in Milne, G.R. (2003). How well do consumers protect themselves the U.S.: Understanding spatial and demographic patterns, from identity theft? The Journal of Consumer Affairs, 37(2), 2002-2006. GeoJournal, (1), 43. 388-402. Langton, L. (2010). Identity Theft Reported by Households, 2007 - Misra G., Junger M., & Montoya L. (2017). A cross-national study Statistical Tables. Retrieved Jun 2019 from https://www.bjs. on cybercrime: Incident, suspect and victim characteristics gov/content/pub/pdf/itrh07st.pdf for digital and traditional fraud in the Netherlands and Langton, L. (2011). Identity Theft Reported by Households, 2005- Kolkata, India. Journal of Forensic Sciences & Criminal 2010. Retrieved Jun 2019 from https://www.bjs.gov/ Investigation, 2(4), 2-11. content/pub/pdf/itrh0510.pdf Moore, C.R. (2014). Identity Theft Risk Assessment of Middle Langton, L. & Planty, M. (2010). National Crime Victimization Tennessee (Thesis). Retrieved from MLA International Survey Supplement: Victims of Identity Theft, 2008. Retrieved Bibliography Database. (Accession No. 1556663) Jun 2019 from https://www.bjs.gov/content/pub/pdf/ Nash, R., Bouchard, M., & Malm, A. (2013). Investing in people: vit08.pdf The role of social networks in the diffusion of a large-scale fraud. Social Networks, 35, 686-698.

Center for Victim Research: Identity Theft and Fraud Victimization | 4 Newman, G.R., & McNally, M.M. (2005). Identity Theft Literature Rebovich, D.J. (2015). The new face of identity theft: An analysis Review. Retrieved Jun 2019 from https://www.ncjrs.gov/ of federal case data for the years 2008 through 2013. pdffiles1/nij/grants/210459.pdf Center for Identity Management and Information Protection. O’Neill, B., & Jing, J.X. (2005). Consumer practices to reduce Retrieved Jun 2019 from https://www.utica.edu/academic/ identity theft risk: An exploratory study.Journal of Family institutes/cimip/New_Face_of_Identity_Theft.pdf and Consumer Sciences, (1), 33. Reisig, K., Reisig, M., Piquero, N.L., Piquero A.R. (2010). Low Osentoski, A. (2016). Examining Identity Theft Victimization self-control and fraud: Offending, victimization, and their Using Routine Activities Theory(Thesis). Retrieved from overlap. Criminal Justice and Behavior, 37(2), 188-203. MLA International Bibliography Database. (Accession No. Reyns, B.W. (2013). Online routines and identity theft 10107897) victimization: Further expanding routine activity theory Paek, S.Y., & Nalla, M.K. (2015). The relationship between beyond direct-contact offenses. Journal of Research in Crime receiving phishing and identity theft victimization and Delinquency, 50(2), 216-238. in . International Journal of Law, and Crime and Reyns, B.W. (2015). A routine activity perspective on online Justice, 43(4), 626-642. victimization.Journal of Financial Crime, 22(4), 396-411. Pascual, A. (2014). The Consumer Data Insecurity Report. Javelin Reyns, B.W., & Henson, B. (2016). The thief with a thousand Strategy & Research. faces and the victim with none: Identifying determinants Pascual, A. (2015). 2015 Identity theft: Protecting vulnerable for online identity theft victimization with routine populations. Javelin Strategy & Research. activity theory. International Journal of Offender Therapy & Comparative Criminology, 60(10), 1119-1139. Pascual, A., Marchini, K., & Miller, S. (2017). 2017 Identity Theft: Securing the Connected Life. Javelin Strategy & Research. Reyns, B.W., & Randa, R. (2017). Victim reporting behaviors following identity theft victimization: Results from the Pascual, A., Marchini, K., & Miller, S. (2018). 2018 Identity Fraud: National Crime Victimization Survey.Crime & Delinquency, Fraud Enters a New Era of Complexity. Javelin Strategy & 63(7), 814-838. Research. Riek, M., Bohme, R., Ciere, M., Ganan, C., & Van Eeten, M. (2016). Pereira, S.A. (2014). The Impacts of Identity Theft to its Victims Estimating the costs of consumer-facing cybercrime: and How to Prevent Future Attacks (Thesis). Retrieved from A tailored instrument and representative data for six MLA International Bibliography Database. (Accession No. EU countries. Workshop on the Economics of Information 1564405) Security. Perri, F.S., & Brody, R.G. (2012). The optics of fraud: Affiliations Ross, S., & Smith, R.G. (2011). Risk factors for advance fee fraud that enhance offender credibility. Journal of Financial Crime, victimization.Trends & Issues in Crime & Criminal Justice, 19(4), 355-370. (420), 1-6. Piquero, N.L., Cohen, M.A., & Piquero, A.R. (2011). How much Sauer, J.H. (2005). Stealing your good name: A survey of is the public willing to pay to be protected from identity Washington state residents 18+ on identity theft incidence theft? Justice Quarterly, 28(3), 437-459. and prevention.AARP Knowledge Management, AARP Policastro, C., & Payne, B.K. (2015). Can you hear me now? Research. Retrieved Jun 2019 from https://assets.aarp.org/ Telemarketing fraud victimization and lifestyles. American rgcenter/post-import/wa_id.pdf Journal of Criminal Justice, 40(3), 620-638. Sauer, J.H. (2006a). Caught in the NET: A Survey of Los Angeles Ponemon Institute. (2013).2013 Survey on Medical Identity Theft. Area Residents 40+ About Online Use And Safety. AARP Retrieved Jun 2019 from https://www.ponemon.org/local/ Knowledge Management, AARP Research. Retrieved Jun upload/file/2013%20Medical%20Identity%20Theft%20 2019 from https://www.aarp.org/technology/privacy- Report%20FINAL%2011.pdf security/info-2006/ca_cyber_2006.html Pontell, H.N., Brown, G.C., & Tosouni, A. (2008). Stolen Identities: Sauer, J.H. (2006b). Caught in the NET: A Survey of Raleigh-Durham A Victim Survey. In M. McNally & G. Newman (eds.) Area Residents 40+ About Online Use And Safety. AARP Perspectives on Identity Theft, 57-85. Knowledge Management, AARP Research. Retrieved Jun Studies, (23). 2019 from https://assets.aarp.org/rgcenter/consume/ nc_rd_cyber_2006.pdf Pryor, W.J. (2009). When Your Identity Gets Hijacked: The Victim’s Experience of Identity Theft (Thesis). Retrieved from MLA Sauer, J.H. (2006c). Investor Protection: A Survey of AARP Wyoming International Bibliography Database. (Accession No. Members. AARP Knowledge Management, AARP Research. 3378141) Retrieved Jun 2019 from https://www.aarp.org/money/ investing/info-2006/wy_ipt_2006.html Ramirez, I.J. (2017). Identity Theft in Miami-Dade County, Florida: Victimization and Socioeconomic Status (Thesis). Sauer, J.H. (2010). Consumer Fraud Issues: Survey of AARP Retrieved from MLA International Bibliography Database. Members Age 50+ in West Virginia. AARP Knowledge (Accession No. 10599741) Management. Retrieved Jun 2019 from https://www.aarp. org/money/scams-fraud/info-03-2010/wva_fraud_10.html

Center for Victim Research: Identity Theft and Fraud Victimization | 5 Sauer, J.H., & Pak, K. (2007). Stolen futures: An AARP Sullivan, K.M. (2009). But doctor, I still have both feet! Remedial Washington survey of investors and victims of investment problems faced by victims of medical identity theft. fraud. AARP Knowledge Management, AARP Research. American Journal of Law and Medicine, 35(4), 647-681. Retrieved Jun 2019 from https://www.aarp.org/money/ Synovate. (2003). Federal Trade Commission – Identity Theft scams-fraud/info-2007/wa_fraud_07.html Survey Report. Retrieved Jun 2019 from https://www.ftc. Schoepfer, A., & Piquero, N.L. (2009). Studying the correlates of gov/sites/default/files/documents/reports/federal-trade- fraud victimization and reporting. Journal of Criminal Justice, commission-identity-theft-program/synovatereport.pdf 37(2), 209-215. Synovate. (2007). Federal Trade Commission – 2006 Identity Theft Schoolcraft, K. (2015). Cyber Victimization: An Examination of Survey Report. Retrieved Jun 2019 from https://www.ftc. Routine Activities and Self-Control Theory as Indicators gov/sites/default/files/documents/reports/federal-trade- of Online Victimization (Thesis). Retrieved from MLA commission-2006-identity-theft-survey-report-prepared- International Bibliography Database. (Accession No. commission-synovate/synovatereport.pdf 10019386) Tade, O., & Adeniyi, O. (2017a). Automated teller machine fraud Shadel, D., Pak, K., & Sauer, J.H. (2014). Caught in the scammer’s in south-west Nigeria: Victim typologies, victimisation net: Risk factors that may lead to becoming an internet strategies and fraud prevention.Journal of Payments fraud victim, AARP survey of American adults age 18 and Strategy & Systems, 86-92. older. AARP Research. Retrieved Jun 2019 from https:// Tade, O., & Adeniyi, O. (2017b). ‘They withdrew all I was worth:’ www.aarp.org/research/topics/economics/info-2014/ Automated teller machine fraud and victims’ life chances in internet-fraud-victimization-attitudes-behavior-national. Nigeria. International Review of Victimology, 23(3), 313-324. html Treasury Inspector General for Tax Administration. (2013). Shichor, D., Sechrest, D.K., & Doocy, J. (2001). Victims of Case Processing Delays and Tax Account Errors Increased Investment Fraud. In H. Pontell & D. Shichor (eds.) Hardship for Victims of Identity Theft. Retrieved Contemporary Issues in Crime and Criminal Justice: Essays in Jun 2019 from https://www.treasury.gov/tigta/ Honor of Gilbert Gies, 81-96. auditreports/2013reports/201340129fr.pdf Shoudt, E.M. (2002). Identity theft: Victims ‘cry out’ for reform. van der Meulen, N.S., & Koops E.J. (2011). The Challenge of American University Law Review, (1), 339. Identity Theft in Multi-Level Governance: Towards a Silberman, S.L. (2004). AARP Minnesota identity theft survey: Coordinated Action Plan for Protecting and Empowering A study of residents 18+. AARP Knowledge Management. Victims. In R. Letschert & J. van Dijk (eds.)The New Faces of Retrieved Jun 2019 from https://assets.aarp.org/rgcenter/ Victimhood, 159-190. consume/mn_identity_theft.pdf van Dijk, J., & Kunst, M.J.J. (2010). E-fraud: Exploring its Silberman, S.L. (2006). 2006 AARP Michigan investor protection prevalence and victim impact. International Journal of trust survey. AARP Knowledge Management, AARP Research. Victimology, 8(2), 8-16. Retrieved Jun 2019 from https://www.aarp.org/money/ van Raaij, W.F. (2016). Victims of financial fraud. Understanding scams-fraud/info-2006/mi_invest_2006.html Consumer Financial Behavior, 113-126. Smith, R.G, & Akman, T. (2008). Raising public awareness van Wilsem, J. (2011). ‘Bought it, but never got it:’ Assessing risk of consumer fraud in Australia. Australian Institute of factors for online consumer fraud victimization.European Criminology. Retrieved Jun 2019 from https://aic.gov.au/ Sociological Review, 29(2), 168-178. publications/tandi/tandi349 van Wilsem, J. (2016). Exploring the possibility of ‘moral hazard’ Smith, R.G., & Budd, C. (2009). Consumer fraud in Australia: among victims of identity theft: The relation between Costs, rates and awareness of the risks in 2008. Australian reimbursement for unauthorized cash withdrawals and Institute of Criminology. Retrieved Jun 2019 from https://aic. risky online behavior. Cybercrime Through an Interdisciplinary gov.au/publications/tandi/tandi382 Lens, 106-118. Stamatel, J.P., & Mastrocinque, J.M. (2011). Using national van Wyck, J., & Mason, K.A. (2001). Investigating vulnerability incident-based reporting system (NIBRS) data to and reporting behavior for consumer fraud victimization: understand financial exploitation of the elderly: A research Opportunity as a social aspect of age. Journal of note. Victims and Offenders, 6(2), 117-136. Contemporary Criminal Justice, 17(4), 328-345. Stanley, J. (2000). Identity theft: Supporting victims in recovering Vishwanath, A. (2015a). Examining the distinct antecedents from the crime of the .McGeorge L. Rev., 32, of e-mail habits and its influence on the outcomes 566. of a phishing attack. Journal of Computer-Mediated Stuart, A.F.H., Schuck, A.M, & Lersch, K.M. (2005). Exploring the Communication, (5), 570. crime of identity theft: Prevalence, clearance rates, and Vishwanath, A. (2015b). Habitual Facebook use and its impact victim/offender characteristics. Journal of Criminal Justice, on getting deceived on social media. Journal of Computer- 33(1), 19-29. Mediated Communication, (1), 83.

Center for Victim Research: Identity Theft and Fraud Victimization | 6 Vishwanath, A. (2016). Mobile device affordance: Explicating & Yee, G. (2005). An analysis of online gaming crime how smartphones influence the outcome of phishing characteristics. Internet Research, 15(3), 246-261. attacks. Computers in Human Behavior, 63, 198-207. Yip, M. (2011). Legislation and Case Comments: Restitution for Vishwanath, A. (2017). Getting phished on social media. Decision Victims of Fraud. Support Systems, 103, 70-81. Zaslawski, Z. (2017). Not Everyone Is a Target: An Analysis of Online Vishwanath, A., Herath, T., Chen, R., Wang, J., & Rao, H.R. (2010). Identity Crime Victimization Using Routine Activities Theory Why do people get phished? Testing individual differences (Thesis). Retrieved from MLA International Bibliography in phishing vulnerability within an integrated, information Database. (Accession No. 10611043) processing model. Decision Support Systems, 51, 576-586. Zimmerman, A.S., & Jaros, D.M. (2011). The criminal class action. Welborn, A. (2003). Remedies available to victims of identity University of Pennsylvania Law Review, 159(5), 1385-1455. theft. Congressional Research Service, Library of Congress. Zunzunegui, M., Belanger, E., Benmarhnia, T., Gobbo, M., Otero, Werner, L.A., & Courte, J. (2010). Analysis of an anti-phishing lab A., Beland, F., Zunzunegui, F., & Ribera-Casado, J.M. (2017). activity.Information Systems Education Journal, 8(11). Financial fraud and health: The case of Spain. Gaceta White, C.M., Gummerum, M., Wood, S., & Hanoch, Y. (2017). Santitaria, 31(4), 313-319 and the silver surfer: The relationship between gist reasoning and adults’ risky online behavior. Journal of Behavioral Decision Making, (4), 819. Whiteman, J.R. (2017). Social Engneering: Humans are the Prominent Reason for the Continuance of These Types of Attacks (Thesis). Retrieved from MLA International Bibliography Database. (Accession No. 10684196) Whitty, M.T. (2013). The scammers persuasive techniques model. British Journal of Criminology, 53(4), 665-684. Whitty, M.T. (2015). Anatomy of the online dating . Security Journal, 28(4), 443-455. Whitty, M.T. (2017). Do you love me: Psychological characteristics of romance scam victims. Cyberpsychology, Behavior, and Social Networking, 21(2), 105-109. Whitty, M.T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. Cyberpsychology, and Behavior and Social Networking, 15(3), 181-183. Whitty, M.T., & Buchanan, T. (2016). The online dating romance scam: The psychological impact on victims–both financial and non-financial. Criminology & Criminal Justice, 16(2), 176- 194. Wilkins, A., Acuff, W., & Hermanson, D. (2012). Understanding a Ponzi scheme: Victims’ perspectives.Journal of Forensic and Investigative Accounting, 4(1), 1-18. Williams, M.L. (2016). Guardians upon high: An application of routine activities theory to online identity theft in Europe at the country and individual level. British Journal of Criminology, 56(1), 21-48. Winterdyk, J., & Filipuzzi, N. (2009). Identity theft: Comparing Canadian and Mexican students’ perceptions and awareness and risk of victimization. International Review of Victimology, 16(3), 309-337. Winterdyk, J., & Thompson, N. (2008). Student and non-student perceptions and awareness of identity theft. Canadian Journal of Criminology & Criminal Justice, 50(2), 153-186. Yates, J.C. (2008). Identity Theft and Conditions of Victimization (Thesis). Retrieved from MLA International Bibliography Database. (Accession No. 3301957) Ying-Chieh, C., Chen, P.S., Jing-Jang, H., Korba, L., Song, R.,

Center for Victim Research: Identity Theft and Fraud Victimization | 7 PRACTICE EVIDENCE ON IDENTITY THEFT AND FRAUD

Allstate Foundation and National Network to End Domestic Bureau of Justice Statistics (BJS). (2018). Identity Theft. Retrieved Violence (NNEDV). (2016). Module One: Understanding from: BJS 2018. Identity Theft. Retrieved from: https:// Financial . Retrieved from https://nnedv.org/mdocs- www.bjs.gov/index.cfm?ty=tp&tid=42 posts/module-one-understanding-financial-abuse/ California Department of Justice. (2018).First Aid for Medical Andres, M. N. (2015). Making elder financial exploitation cases Identity Theft: Tips for Consumers. Retrieved from https:// part of a sustainable practice: Tips from the experiences oag.ca.gov/privacy/facts/medical-privacy/med-id-theft of the University of Illinois College of Law’s Elder Financial Campbell, J. (2013). Fraud on The Elderly: A Growing Concern for Justice Clinic. Elder Law Journal, 23, 297. A Growing Population. Washington, DC: US Department Americans for Financial Reform. (2014). Support Operation Choke of Justice, Federal Bureau of Investigation, Criminal Point and Other Efforts to Fight Payment Fraud; Oppose Investigation Division. Retrieved from https://www. Amendments to Justice Department Appropriations to Curtail justice.gov/iso/opa/ola/witness/05-16-13-fbi-campbell- Payment Fraud Work. Retrieved from http://www.nclc. testimony-re-fraud-on-the-elderly--a-growing-concern- org/images/pdf/banking_and_payment_systems/letter- for-a.201385141.pdf operation-choke-point.pdf Canan, S. & Hume, C. (2016). Older Consumers Targeted by Americans for Financial Reform. (2016). Oppose H.R. 766 Fraudsters Not Once, But Twice!. Consumer Financial (Luetkemeyer) Which Will Restrict Efforts to Protect Protection Bureau. Retrieved from https://www. Consumers and from Fraud, Money-Laundering consumerfinance.gov/about-us/blog/older-consumers- and Other Illegal Activities. Retrieved from https://www. targeted-by-fraudsters-not-once-but-twice/ consumer-action.org//downloads/coalition/160203_ Clevenger, S. & Langheim-Frooman, K. (2019). Cybervictimization HR766_house_oppose.pdf Experiences of Sexual and Interpersonal Violence Survivors Benner, J., Givens, B., & Mierzwinski, E. (2000). Nowhere to Turn: [Webinar]. Center for Victim Research. Retrieved from Victims Speak Out on Identity Theft, A Survey of Identity https://www.youtube.com/watch?v=B9YFoErhKWo Theft Victims and Recommendations for Reform.California Consumer Federation of America (CFA). (2009).To Catch a Thief: Public Interest Research Group and the Privacy Rights Are Identity Theft Services Worth the Cost?. Retrieved from Clearinghouse. Retrieved from https://www.privacyrights. https://consumerfed.org/wp-content/uploads/2016/09/3- org/blog/nowhere-turn-victims-speak-out-identity-theft- 1-09-To-Catch-A-Thief_Report.pdf survey-identity-theft-victims-and-recommendations Consumer Federation of America (CFA). (2012). Best Benway, K. (2009). Who’s Calling? Telemarketing Fraud and Practices for Identity Theft Services: How Are Services The Elderly. Federal Trade Commission and the National Measuring Up?. Retrieved from https://consumerfed. Consumer Law Center. Retrieved from https://www.nclc. org/wp-content/uploads/2010/08/Studies. org/images/pdf/conferences_and_webinars/webinar_ BestPracticesMeasuringUpReport.4.17.12.pdf trainings/presentations/2009/presentation_april29_ kbenway.pdf Consumer Federation of America (CFA). (2015).Best Practices for Identity Theft Services, Version 2.0. Retrieved from https:// Breuer, L. (2011). Disaster Fraud Task Force: Report to The Attorney consumerfed.org/pdfs/CFA-Best-Practices-Id-Theft- General for Fiscal Year 2011. Washington, DC: Department Services.pdf of Justice. Retrieved from https://www.justice.gov/sites/ default/files/criminal-disasters/legacy/2013/04/04/ Consumer Federation of America’s Identity Theft Service Best ReportDFTF2011.pdf Practices Working Group. (2016). My Company’s Had a , Now What? 7 Questions to Ask When Considering Breyault, J. (2013). The State of Identity Theft In 2013: A National Identity Theft Services. Retrieved from https://consumerfed. Consumers League White Paper Examining Fifteen Years of org/wp-content/uploads/2016/09/9-7-16-7-Questions- Federal Anti-Identity Theft Consumer Protection Policies. to-Ask_Fact-Sheet.pdf National Consumers League. Retrieved from https://www. slideshare.net/nationalconsumersleague/breyault-id- Consumer Financial Protection Bureau (CFPB). (2014). Protecting theftwhitepaper-final-2 Residents from Financial Exploitation: A Manual for Assisted Living and Nursing Facilities. Retrieved from https://files. Bridget S. (2013). Fraud Affects 25 Million People: Recognize consumerfinance.gov/f/201406_cfpb_guide_protecting- Anyone You Know?. Federal Trade Commission. Retrieved residents-from-financial-exploitation.pdf from https://www.consumer.ftc.gov/blog/2013/04/fraud- affects-25-million-people-recognize-anyone-you-know Consumer Financial Protection Bureau. (2016). Recommendations and Report for Financial Institutions on Preventing and Broder, B. (2003). Prepared Statement of The Federal Trade Responding to Elder Financial Exploitation. Retrieved from Commission on Identity Theft. Federal Trade Commission. https://files.consumerfinance.gov/f/201603_cfpb_ Retrieved from https://www.ftc.gov/sites/default/files/ recommendations-and-report-for-financial-institutions-on- documents/public_statements/prepared-statement- preventing-and-responding-to-elder-financial-exploitation.pdf federal-trade-commission-id-theft/broderidthefttest.pdf

Center for Victim Research: Identity Theft and Fraud Victimization | 8 Consumer Financial Protection Bureau. (2017). Help Protect Fair, L. (2011). New Compliance Resource for Health Care Providers Seniors in Your Community: Companion Lesson Plan. Retrieved and Health Plans. Federal Trade Commission. Retrieved from https://s3.amazonaws.com/files.consumerfinance. from https://www.ftc.gov/news-events/blogs/business- gov/f/documents/cfpb_placemat-companion-lesson-plan. blog/2011/02/new-compliance-resource-health-care- pdf providers-health-plans Consumer Financial Protection Bureau. (n.d.).Fake Charity Scam Fair, L. (2015a). Hr Professionals: Deter Tax Id Theft with An Open- Information for Meal Service Providers. Retrieved from Door (But Closed-Drawer) Policy. Federal Trade Commission. https://s3.amazonaws.com/files.consumerfinance.gov/f/ Retrieved from https://www.ftc.gov/news-events/blogs/ documents/cfpb_charity-scams-handout.pdf business-blog/2015/01/hr-professionals-deter-tax-id- Consumer Financial Protection Bureau (CFPB) and Federal theft-open-door-closed-drawer Deposit Insurance Corporation (FDIC). (2017). Money Smart Fair, L. (2015b). New ID Theft Recovery Plan and A Lend-A-Hand for Older Adults: Resource Guide. Retrieved from https:// Plan for Business. Federal Trade Commission. Retrieved files.consumerfinance.gov/f/documents/201703_cfpb_ from https://www.ftc.gov/news-events/blogs/business- money-smart-for-older-adults-resource-guide.pdf blog/2015/05/new-id-theft-recovery-plan-lend-hand-plan- Consumer Financial Protection Bureau (CFPB) and Office of business Older Americans. (2016). Report and Recommendations: Fair, L. (2015c). Tax Id Theft Awareness: Tips for Tax Preparers Fighting Elder Financial Exploitation Through Community Bear Repeating. Federal Trade Commission. Retrieved Networks. Retrieved from https://s3.amazonaws.com/ from https://www.ftc.gov/news-events/blogs/business- files.consumerfinance.gov/f/documents/082016_cfpb_ blog/2015/01/tax-id-theft-awareness-tips-tax-preparers- Networks_Study_Report.pdf bear-prepeating Cross, C. (2016). Policing Online Fraud in Australia: The Emergence Fair, L. (2017). Fraud Alerts Vs. Credit Freezes: FTC FAQs. Federal of a Victim‐Oriented Approach: Proceedings of the Trade Commission. Retrieved from https://www.ftc.gov/ 3rd InternationalCrime, Justice and Social Democracy news-events/blogs/business-blog/2017/09/fraud-alerts- Conference 2015. Brisbane, Australia: Crime and Justice vs-credit-freezes-ftc-faqs Research Centre. Retrieved from https://eprints.qut.edu. Federal Bureau of Investigation (FBI). (2019). National Incident- au/93198/1/Cross_CJRC_Conference_paper.pdf Based Reporting System (Nibrs). Retrieved from https://www. Deegan Jr., P.E. (2018). Elder financial fraud schemes: The case fbi.gov/services/cjis/ucr/nibrs for federal investigation and prosecution. US Att’ys Bull., 66, Federal Bureau of Investigation (FBI). (n.d.) Common Fraud 31. Schemes. Retrieved from https://www.fbi.gov/scams-and- Deem, D. (2018). International Financial Crimes: How Do We safety/common-fraud-schemes Turn the Tide and Help Older Victims? Federal Bureau of Federal Trade Commission (FTC). (1998). Identity Theft and Investigations. Retrieved from https://www.elderjusticecal. Assumption Deterrence Act (ITADA). Retrieved from: https:// org/uploads/1/0/1/7/101741090/debbie_deem-elder_ www.ftc.gov/node/119459 justice_ca_aug1_with_sbaker_7.29.18-1.pdf Federal Trade Commission (FTC). (2000). ID Theft: When Bad Deem, D., & Lande, E. S. (2018). Transnational scam predators Things Happen to Your Good Name. Retrieved from https:// and older adult victims: Contributing characteristics of archives-financialservices.house.gov/banking/91300ftc.pdf chronic victims and developing an effective response. US Att’ys Bull., 66, 177. Federal Trade Commission (FTC). (2002). At-Home Medical Billing Business. Retrieved from https://www.consumer.ftc.gov/ DePaul, S. (2010). The Hallmarks of Consumer Fraud Targeting articles/0174-home-medical-billing-businesses Senior Victims: A Primer on How to Identify, Deter, And Defend Against Consumer Fraud. National Consumer Law Center Federal Trade Commission (FTC). (2003a). Prepared Statement and the Administration on Aging. Retrieved from http:// of The Federal Trade Commission on Identity Theft Before www.nclc.org/images/pdf/conferences_and_webinars/ the Committee on the Judiciary Council of the District webinar_trainings/presentations/2010/presentation_ of Columbia. Retrieved from https://www.ftc.gov/ april14.pdf sites/default/files/documents/public_statements/ prepared-statement-federal-trade-commission-id-theft/ Dixon, P. (2006). Medical Identity Theft: The Information Crime broderidthefttest.pdf That Can Kill You. World Privacy Forum. Retrieved from http://www.worldprivacyforum.org/wp-content/ Federal Trade Commission (FTC). (2003b). Prepared Statement uploads/2007/11/wpf_medicalidtheft2006.pdf of The Federal Trade Commission on Identity Theft Before the House Financial Services Committee. Retrieved from Dixon, P. & Barrett, T. (2013).Medical Identity Theft. https://www.ftc.gov/sites/default/files/documents/public_ Office for Victims of Crime’s National Identity Theft statements/prepared-statement-federal-trade-commission- Network. Retrieved from https://www.youtube.com/ id-theft/bealesidthefttest.pdf watch?v=sOa6AWzHSEs

Center for Victim Research: Identity Theft and Fraud Victimization | 9 Federal Trade Commission (FTC). (2003c). Report: Federal Federal Trade Commission (FTC). (2011e). Scams Against Trade Commission Overview of The Identity Theft Program. Immigrants. Retrieved from https://www.consumer.ftc.gov/ Retrieved from https://www.ftc.gov/sites/default/files/ articles/0141-scams-against-immigrants documents/reports/federal-trade-commission-identity- Federal Trade Commission (FTC). (2011f). Stolen Futures: A Forum theft-program/timelinereport.pdf on Child Identity Theft. Retrieved from https://www.ftc.gov/ Federal Trade Commission (FTC). (2005). Fraud and ID Complaints news-events/events-calendar/2011/07/stolen-futures- Received by the FTC from Consumers Age 50 and Over. forum-child-identity-theft Retrieved Jun 2019 from https://www.ftc.gov/sites/ Federal Trade Commission (FTC). (2012a). Active Duty default/files/documents/reports_annual/fraud-and-id- Alerts. Retrieved from https://www.consumer.ftc.gov/ complaints-received-ftc-consumers-age-50-and-over- articles/0273-active-duty-alerts cy-2004/fraud-idtage50-cy2004.pdf Federal Trade Commission (FTC). (2012b). Do You Need a New Federal Trade Commission (FTC). (2006). Fraud and ID Complaints Social Security Number? Retrieved from https://www. Received by the FTC from Consumers Age 50 and Over. consumer.ftc.gov/articles/0248-do-you-need-new-social- Retrieved Jun 2019 from https://www.ftc.gov/sites/ security-number default/files/documents/reports/fraud-identity-theft- complaints-received-federal-trade-commission-consumers- Federal Trade Commission (FTC). (2012c). Financial Readiness: As age-50-over-commission/fraud-idtage50-cy2005.pdf Critical as Fully Charged Batteries. Retrieved from https:// www.consumer.ftc.gov/articles/0126-financial-readiness- Federal Trade Commission (FTC). (2007). The President’s Identity critical-fully-charged-batteries Theft Task Force Combating Identity Theft: A Strategic Plan. Retrieved from https://www.ftc.gov/sites/default/ Federal Trade Commission (FTC). (2012d). Five Ways to Help files/documents/reports/combating-identity-theft- Protect Your Identity. Retrieved from https://www.ftc.gov/ strategic-plan/strategicplan.pdf news-events/audio-video/video/five-ways-help-protect- your-identity Federal Trade Commission (FTC). (2008a). : Health Information for Older People. Retrieved from https://www. Federal Trade Commission (FTC). (2012e). Hang Up on Phone consumer.ftc.gov/articles/0318-medicare-fraud Fraud. Retrieved from https://www.ftc.gov/news-events/ audio-video/video/hang-phone-fraud Federal Trade Commission (FTC). (2008b) Medical ID Theft: Health Information for Older People. Retrieved from https://www. Federal Trade Commission (FTC). (2012f). How Buying Plans consumer.ftc.gov/articles/0326-medical-id-theft-health- Work. Retrieved from https://www.consumer.ftc.gov/ information-older-people articles/0068-how-buying-plans-work Federal Trade Commission (FTC). (2010a). Envelope-Stuffing Federal Trade Commission (FTC). (2012g). How to Keep Your Schemes. Retrieved from https://www.consumer.ftc.gov/ Personal Information Secure. Retrieved from https://www. articles/0112-envelope-stuffing-schemes consumer.ftc.gov/articles/0272-how-keep-your-personal- information-secure Federal Trade Commission (FTC)(2010b). Medical Identity Theft. Retrieved from https://www.ovcttac.gov/downloads/ Federal Trade Commission (FTC). (2012h). Identity Theft: Military identitytheftnetwork/toolkit/TrainingMaterials/FTC- Personnel & Families-- What to Know, What to Do. Retrieved FactsForConsumersMedicalIDTheft.pdf from https://www.consumer.ftc.gov/articles/pdf-0016- military-identity-theft.pdf Federal Trade Commission (FTC). (2011a). Diversity Visa Lottery Scams. Retrieved from https://www.consumer.ftc.gov/ Federal Trade Commission (FTC). (2012i). Medical Identity articles/0080-diversity-visa-lottery-scams Theft. Retrieved from https://www.consumer.ftc.gov/ articles/0171-medical-identity-theft Federal Trade Commission (FTC). 2011b. Invention Promotion Firms. Retrieved from https://www.consumer.ftc.gov/ Federal Trade Commission (FTC). (2012j). Operation Empty articles/0184-invention-promotion-firms Promises: Job and Business Opportunity Scams. Retrieved from https://www.ftc.gov/news-events/audio-video/video/ Federal Trade Commission (FTC). (2011c). Medical Identity Theft: operation-empty-promises-job-business-opportunity- FAQs For Health Care Providers and Health Plans. Retrieved scams from https://www.ftc.gov/system/files/documents/plain- language/bus75-medical-identity-theft-faq-health-care- Federal Trade Commission (FTC). (2012k). Protecting Against health-plan.pdf Fraud. Retrieved from https://www.consumer. ftc.gov/articles/0216-protecting-against-credit-card-fraud Federal Trade Commission (FTC). (2011d). Prepared Statement of The Federal Trade Commission Before the Subcommittee on Federal Trade Commission (FTC). (2012l). Scams Against Social Security of The House Committee on Ways and Means Immigrants. Retrieved from https://www.ftc.gov/news- on Child Identity Theft. Retrieved from https://www.ftc.gov/ events/audio-video/video/scams-against-immigrants sites/default/files/documents/public_statements/prepared- statement-federal-trade-commission-child-identity-theft/1 10901identitythefttestimony.pdf

Center for Victim Research: Identity Theft and Fraud Victimization | 10 Federal Trade Commission (FTC). (2013a). FTC Senior Identity Federal Trade Commission (FTC). (2015a). Identity Theft. Theft Workshop. Retrieved from https://www.ftc.gov/sites/ Retrieved from https://www.consumer.ftc.gov/ default/files/documents/videos/senior-identity-theft- articles/0005-identity-theft workshop-part-1/130507senioridtheft_sess1.pdf Federal Trade Commission (FTC). (2015b). IRS Imposter Scams Federal Trade Commission (FTC). (2013b). Guide for Assisting Infographic. Retrieved from https://www.consumer.ftc.gov/ Identity Theft Victims. Retrieved from https://www. articles/0519-irs-imposter-scams-infographic consumer.ftc.gov/articles/pdf-0119-guide-assisting-id- Federal Trade Commission (FTC). (2015c). Warning Signs of theft-victims.pdf Identity Theft. Retrieved from https://www.consumer.ftc. Federal Trade Commission (FTC). (2013c). Job Scams. Retrieved gov/articles/0271-warning-signs-identity-theft from https://www.consumer.ftc.gov/articles/0243-job- Federal Trade Commission (FTC). (2015d). Work-At-Home scams Businesses. Retrieved from https://www.consumer.ftc.gov/ Federal Trade Commission (FTC). (2013d). Money Wiring articles/0175-work-home-businesses Scams. Retrieved from https://www.ftc.gov/news-events/ Federal Trade Commission (FTC). (2016a). 10 Things You Can Do audio-video/video/money-wiring-scams to Avoid Fraud. Retrieved from https://www.consumer.ftc. Federal Trade Commission (FTC). (2013e). Mystery Phone gov/articles/0060-10-things-you-can-do-avoid-fraud Charges. Retrieved from https://www.consumer.ftc.gov/ Federal Trade Commission (FTC). (2016b). Avoiding A Yo-Yo articles/0183-mystery-phone-charges Financing Scam. Retrieved from https://www.ftc.gov/news- Federal Trade Commission (FTC). (2013f). Senior Identity Theft events/audio-video/video/avoiding-yo-yo-financing-scam Workshop- Part 3. Retrieved from https://www.ftc.gov/ Federal Trade Commission (FTC). (2016c). Child Identity Theft: news-events/audio-video/video/senior-identity-theft- What to Know, What to Do. Retrieved from https://www. workshop-part-3 bulkorder.ftc.gov/system/files/publications/pdf-0010_ Federal Trade Commission (FTC). (2013g). Taking Charge: What child-idtheft-what-to-know-what-to-do.pdf to Do If Your Identity Is Stolen? Retrieved from https://www. Federal Trade Commission (FTC). (2016d). Data Breaches and You: azag.gov/sites/default/files/sites/all/docs/consumer/ A New Video. Retrieved from https://www.consumer.ftc. Identiy-Theft/pdf-0009-taking-charge.pdf gov/blog/2016/09/data-breaches-and-you-new-video Federal Trade Commission (FTC). (2013h). Telemarketing Resale Federal Trade Commission (FTC). (2016e). Family Emergency Scams. Retrieved from https://www.consumer.ftc.gov/ Imposter Scams. Retrieved from https://www.ftc.gov/news- articles/0403-telemarketing-resale-scams events/audio-video/video/family-emergency-imposter- Federal Trade Commission (FTC). (2014a). Fraud Affects Every scams Community. Retrieved from https://www.ftc.gov/system/ Federal Trade Commission (FTC). (2016f). Identity Theft: A files/documents/public_events/579161/scannedtranscript. Recovery Plan. Retrieved from https://www.consumer.ftc. pdf gov/articles/pdf-0009_identitytheft_a_recovery_plan.pdf Federal Trade Commission (FTC). (2014b). Pass It On: Charity Federal Trade Commission (FTC). (2016g). IRS Imposter Fraud. Retrieved from https://www.consumer.ftc.gov/ Scams. Retrieved from https://www.ftc.gov/news-events/ articles/pdf-0182-charity-fraud.pdf audio-video/video/irs-imposter-scams Federal Trade Commission (FTC). (2014c). Pass It On: Health Care Federal Trade Commission (FTC). (2016h). Online Romance Scams. Retrieved from https://www.consumer.ftc.gov/ Imposter Scams. Retrieved from https://www.ftc.gov/news- articles/pdf-0183-health-care-scams.pdf events/audio-video/video/online-romance-imposter-scams Federal Trade Organization (FTC). (2014d). Pass It On: Identity Federal Trade Commission (FTC). (2016i). Tech Support Imposter Theft. Retrieved from https://www.consumer.ftc.gov/ Scams. Retrieved from https://www.ftc.gov/news-events/ articles/pdf-0181-identity-theft.pdf audio-video/video/tech-support-imposter-scams Federal Trade Commission (FTC). (2014e). Pass It On: Imposter Federal Trade Commission (FTC). (2017a). Businesses Must Provide Scams. Retrieved from https://www.consumer.ftc.gov/ Victims and Law Enforcement with Transaction Records articles/pdf-0180-imposter-scams.pdf Relating to Identity Theft. Retrieved from https://www.ftc. Federal Trade Commission (FTC). (2014f). Pass It On: Paying Too gov/tips-advice/business-center/guidance/businesses- Much. Retrieved from https://www.consumer.ftc.gov/ must-provide-victims-law-enforcement-transaction articles/pdf-0184-paying-too-much.pdf Federal Trade Commission (FTC). (2017b). Credit Freeze Federal Trade Commission (FTC). (2014g). Pass It On: “You’ve FAQs. Retrieved from https://www.consumer.ftc.gov/ Won” Scams. Retrieved from https://www.consumer.ftc.gov/ articles/0497-credit-freeze-faqs articles/pdf-0185-youve-won-scams.pdf Federal Trade Commission (FTC). (2017c). Extended Fraud Alerts Federal Trade Commission (FTC). (2014h). Prize Scams. Retrieved and Credit Freezes. Retrieved from https://www.consumer. from https://www.consumer.ftc.gov/articles/0199-prize- ftc.gov/articles/0279-extended-fraud-alerts-and-credit- scams freezes

Center for Victim Research: Identity Theft and Fraud Victimization | 11 Federal Trade Commission (FTC). (2017d). Identity Theft: Planning Federal Trade Commission (FTC). (n.d.c). Statement of Rights for The Future, Parts 1, 2, and 3. Retrieved from https:// for Identity Theft Victims. Retrieved from https://www. www.ftc.gov/news-events/audio-video/video/identity- ovcttac.gov/downloads/identitytheftnetwork/toolkit/ theft-planning-future-part-1 TrainingMaterials/IDTheftVictimStatementOfRights.pdf Federal Trade Commission (FTC). (2017e). Low-Cost Trial Scams Federal Trade Commission and the Consumer Financial Infographic. Retrieved from https://www.consumer.ftc.gov/ Protection Bureau (FTC & CFPB). (2014). Debt Collection articles/0558-low-cost-trial-scams-infographic and The Latino Community. Retrieved from https://www. Federal Trade Commission (FTC). (2017f). Nanny and Caregiver consumerfinance.gov/about-us/blog/live-from-long-beach/ Imposter Scams. Retrieved from https://www.ftc.gov/news- Federal Trade Commission, Division of Privacy and events/audio-video/video/nanny-caregiver-imposter- Identity Protection. (n.d.).Importance of Identity Theft scams Report. Washington, DC: Federal Trade Commission. Federal Trade Commission (FTC). (2017g). Phishing. Retrieved Retrieved from https://www.ovcttac.gov/downloads/ from https://www.consumer.ftc.gov/articles/0003-phishing identitytheftnetwork/toolkit/TrainingMaterials/FTC- MemorandumToPolice.pdf Federal Trade Commission (FTC). (2017h). Place a Fraud Alert. Retrieved from https://www.consumer.ftc.gov/ Financial Services Roundtable. (2010). Protecting the Elderly and articles/0275-place-fraud-alert Vulnerable from Financial Fraud and Exploitation. Retrieved from http://www.fsroundtable.org/wp-content/ Federal Trade Commission (FTC). (2017i). Student Loan Debt Relief uploads/2015/05/BITSProtectingVulnerableAdults0410. Scams. Retrieved from https://www.consumer.ftc.gov/ pdf media/video-0158-student-loan-debt-relief-scams Friery, T. & Givens, B. (2006). Identity Theft Red Flags and Address Federal Trade Commission (FTC). (2017j). Tech Support Scams Discrepancies Under the Fair and Accurate Credit Transactions Infographic. Retrieved from https://www.consumer.ftc.gov/ Act Of 2003. Privacy Rights Clearinghouse, Consumer articles/0557-tech-support-scams-infographic Action, National Consumer Law Center, Privacy Activism, Federal Trade Commission (FTC). (2018a). Consumer Sentinel US Public Interest Research Group, & World Privacy Network Data Book 2017. Washington, DC: Federal Trade Forum. Retrieved from https://www.privacyrights.org/blog/ Commission. Retrieved from https://www.ftc.gov/system/ identity-theft-red-flags-and-address-discrepancies-under- files/documents/reports/consumer-sentinel-network-data- fair-and-accurate-credit-transactions book-january-december-2016/csn_cy-2016_data_book.pdf George, J. (2018). The Man with The Stolen Name. The Federal Trade Commission (FTC). (2018b). Extended Fraud Alerts Marshall Project. Retrieved from https://www. and Credit Freezes. Retrieved from https://www.consumer. themarshallproject.org/2018/05/14/the-man- ftc.gov/articles/0279-extended-fraud-alerts-and-credit- with-the-stolen-name?utm_medium=email&utm_ freezes#Why campaign=newsletter&utm_source=opening- statement&utm_term=newsletter-20180515-1052 Federal Trade Commission (FTC). (2018c). Free Credit Freezes Are Here. Retrieved from https://www.consumer.ftc.gov/ Givens, B. (2000a). Identity Theft: How It Happens, Its Impact blog/2018/09/free-credit-freezes-are-here on Victims, And Legislative Solutions. Privacy Rights Clearinghouse. Retrieved from https://www.privacyrights. Federal Trade Commission (FTC). (2018d). New Credit Law org/blog/identity-theft-how-it-happens-its-impact-victims- FAQs. Retrieved from https://www.consumer.ftc.gov/ and-legislative-solutions blog/2018/10/new-credit-law-faqs Givens, B. (2000b). Identity Theft: The Growing Problem of Wrongful Federal Trade Commission (FTC). (2019a). Consumer Sentinel Criminal Records. Privacy Rights Clearinghouse. Retrieved Network Data Book 2018. Washington, DC: Federal Trade from https://www.privacyrights.org/blog/identity-theft- Commission. Retrieved from https://www.ftc.gov/system/ growing-problem-wrongful-criminal-records files/documents/reports/consumer-sentinel-network- data-book-2018/consumer_sentinel_network_data_ Givens, B. (2000c). ID Theft: A Rapidly Growing Crime That Scars book_2018_0.pdf Its Victims. Consumer Action. Retrieved from https://www. consumer-action.org/news/articles/2000_identity_theft_ Federal Trade Commission (FTC). (2019b). Pyramid issue#Topic_01 Schemes. Retrieved: https://www.ftc.gov/public- statements/1998/05/pyramid-schemes Givens, B. (2000d). Preventing Identity Theft: Industry Practices Are Key. Privacy Rights Clearinghouse. Retrieved from https:// Federal Trade Commission (FTC). (n.d.a). Identity Theft: What to www.privacyrights.org/blog/preventing-identity-theft- Know, What to Do. Retrieved from https://www.consumer. industry-practices-are-key ftc.gov/articles/pdf-0014-identity-theft.pdf Givens, B. (2005). Criminal Identity Theft in California: Seeking Federal Trade Commission (FTC). (n.d.b). Know Your Solutions to the “Worst Case Scenario”. Privacy Rights Rights. Retrieved from https://www.identitytheft.gov/ Clearinghouse. Retrieved from https://www.privacyrights. Know-Your-Rights org/blog/criminal-identity-theft-california-seeking- solutions-worst-case-scenario

Center for Victim Research: Identity Theft and Fraud Victimization | 12 Givens, B. (2014). Senate Judiciary and Banking Committee Hearing Gressin, S. (2015b). Is Your Information Being Used for Job-Related on Data Breaches, Panel One: Data Breach Law and Identity ID Theft? Federal Trade Commission. Retrieved from https:// Theft Prevention. Privacy Rights Clearinghouse. Retrieved www.consumer.ftc.gov/blog/2015/11/your-information- from https://www.privacyrights.org/blog/senate-judiciary- being-used-job-related-id-theft and-banking-committee-hearing-data-breaches-panel-one- Harris, L.R., Rodriguez, C., & Smith, A., (2012). ID Theft and data-breach-law-and Older Adults: Prevention and Mitigation. State Givens, B. (2016). An On-The-Ground Look at Consumer Impacts Department of State, Division of Consumer Protection of Data Breaches. Privacy Rights Clearinghouse. Retrieved & Lifespan. Retrieved from https://www.ovcttac.gov/ from https://www.privacyrights.org/blog/ground-look- downloads/identitytheftnetwork/toolkit/TrainingMaterials/ consumer-impacts-data-breaches AdultAbuseTrainingInstitute_9-12.pdf Go, H.L. (2014). Want to Fight Back Against Cross-Border Fraud? Harwood, C. (2001). Washington State Senate: Identity Theft Federal Trade Commission. Retrieved from https://www. Statement. Federal Trade Commission (FTC). Retrieved consumer.ftc.gov/blog/2014/05/want-fight-back-against- from https://www.ftc.gov/public-statements/2001/01/ cross-border-fraud washington-state-senate-identity-theft-statement Goldberg, R., Drenning, K., Entwistle, A., & Mahoney, L. (2015). Harwood, C. (2013). Prepared Statement of The Federal Trade US Department of Justice and Fraud Schemes Targeting Older Commission on Soldiers as Consumers: Predatory and Unfair Americans. US Department of Justice and the National Business Practices Harming the Military Community Before the Consumer Law Center. Retrieved from https://www.nclc. Senate Committee on Commerce, Science, And Transportation, org/images/pdf/conferences_and_webinars/webinar_ United States Senate. Federal Trade Commission (FTC). trainings/presentations/2014-2015/us_dept_of_justice_ Retrieved from https://www.ftc.gov/sites/default/files/ and_fraud_schemes_targeting_older_americans.pdf documents/public_statements/prepared-statement- Government Accountability Office (GAO). (2005a).Criminal federal-trade-commission-soldiers-consumers-predatory- Debt: Court-Ordered Restitution Amounts Far Exceed Likely unfair-business-practices/131120militaryfraud.pdf Collections for The Crime Victims in Selected Financial Hebert, A, (2015). Reluctant to Be Rude? Federal Trade Fraud Cases. Retrieved from https://www.gao.gov/ Commission. Retrieved from https://www.consumer.ftc. assets/250/245227.pdf gov/blog/2015/03/reluctant-be-rude Government Accountability Office (GAO). (2005b). Identity Heckers, H. & O’Brien, M. (2014). Advanced Identity Theft Theft: Some Outreach Efforts to Promote Awareness of New Responses: Financial Identity Theft. The National Center Consumer Rights Are Under Way. Retrieved from https:// for Victims of Crime & The Financial Industry Regulatory www.gao.gov/assets/250/246990.pdf Authority Investor Education Foundation. Retrieved from Government Accountability Office (GAO). (2017). Identity Theft https://victimsofcrime.org/top-links/events/2014/09/10/ Services: Services Offer Some Benefits but Are Limited in default-calendar/advanced-identity-theft-responses Preventing Fraud. Retrieved from https://www.gao.gov/ Hinz, L., Lawrence, K., Gerber, C., & Ewing, M. (2015). Mass assets/690/683842.pdf Marketing Fraud. The National Center for Victims of Crime. Grant, S. (2013). Progress on Identity Theft Services Measuring Up Retrieved from https://victimsofcrime.org/top-links/ to CFA Best Practices. Consumer Federation of America. events/2015/04/30/default-calendar/mass-marketing- Retrieved from https://consumerfed.org/press_release/ fraud-2015 progress-on-identity-theft-services-measuring-up-to-cfa- Idaho Coalition Against Identity Theft. (2010a).Identity Theft: A best-practices/ Training for Financial Institution Employees. Retrieved from Greenberg, S. (2013). Greenberg Comments for House https://www.ovcttac.gov/downloads/identitytheftnetwork/ Subcommittee on Commerce, Manufacturing and Trade toolkit/TrainingMaterials/TrainingForBankEmployees.pdf Hearing on Fraud Against Seniors. National Consumers Idaho Coalition Against Identity Theft. (2010b).Stolen Futures: League. Retrieved from http://www.nclnet.org/greenberg_ Identity Theft and Foster Children. Retrieved from https:// comments_for_house_subcommittee_on_commerce_ www.ovcttac.gov/downloads/identitytheftnetwork/toolkit/ manufacturing_and_trade_hearing_on_fraud_against_ OutreachMaterials/TrainingForFosterParents.pdf seniors Identity Theft Resource Center (ITRC). (2000).ITRC Fact Sheet Greisman, L. (2016). Spreading the Word on Medicare Scams. 110 Criminal Identity Theft: A Guide to The Crime. Retrieved Federal Trade Commission. Retrieved from https:// from https://www.idtheftcenter.org/Fact-Sheets/fs-110. www.consumer.ftc.gov/blog/2016/06/spreading-word- html medicare-scams Identity Theft Resource Center (ITRC). (2009).The Need for Gressin, S. (2015a). Checking in On the Older Adults in Your Life. Secure Payment Agent (SPA). Retrieved from https://www. Federal Trade Commission. Retrieved from https://www. idtheftcenter.org/ITRC-Surveys-Studies/consumer- consumer.ftc.gov/blog/2015/12/checking-older-adults- awareness-survey your-life

Center for Victim Research: Identity Theft and Fraud Victimization | 13 Identity Theft Resource Center (ITRC). (2012a). Facebook Social Johnson, K. (2003). Financial Crimes Against the Elderly. Media Survey. Retrieved from http://www.idtheftcenter.org/ Washington, DC: U.S. Department of Justice Office of images/surveys_studies/FacebookSurveyFinding.pdf Community Oriented Policing. Retrieved from https://ric- Identity Theft Resource Center (ITRC). (2012b). The Paradox of zai-inc.com/Publications/cops-w0768-pub.pdf Declining Despite Increasing Identity Theft Jurgens, R. (2008). Avoiding Home Repair Fraud: Lessons from Crime: Identity Theft Resource Center Offers Additional Insight Hurricane Katrina. Boston, MA: National Consumer Law on Recently Released Bureau of Justice Statistics Report on Center. Retrieved from https://www.nclc.org/images/pdf/ Identity Theft. Retrieved from https://www.idtheftcenter. pr-reports/report-katrina_repair_fraud_2008.pdf org/images/surveys_studies/ITRConBJSReport.pdf Kaiser, M. (2013). Cyber Security and Identity Theft Victimization. Identity Theft Resource Center (ITRC). (2013).Identity Theft National Cyber Security Alliance and the Office for Victims Resource Center Predicts 2014 Identity Theft Climate for of Crime’s National Identity Theft Network. Retrieved from Tax Season and Beyond. Retrieved from https://www. https://www.youtube.com/watch?v=1ATmOl3IXOA idtheftcenter.org/images/surveys_studies/ITRC_ Karp, N. & Kirkman, D. (2016). Financial Frauds and Scams Against TAXSEASONIDTHEFT_2014.pdf Elders: Government Responses and Resources. National Identity Theft Resource Center (ITRC). (2016).New Account Consumer Law Center. Retrieved from https://www.nclc. Fraud: A Growing Trend in Identity Theft. Retrieved from org/national-elder-rights-training-project/consumer-fraud- http://www.idtheftcenter.org/images/page-docs/ scams/financial-frauds-scams-against-elders.html NewAccountFraud.pdf Keys, D. (2012). Identity Theft and Domestic Violence. Battered Identity Theft Resource Center (ITRC). (2018b). Clearing Criminal Women’s Legal Advocacy Project. Retrieved from https:// Identity Theft. Retrieved from https://www.idtheftcenter. www.ovcttac.gov/downloads/identitytheftnetwork/toolkit/ org/knowledge-base/clearing-criminal-identity-theft/ TrainingMaterials/DomesticViolenceAndIDTTraining.pdf Identity Theft Resource Center (ITRC). (2018c). Data Lachs, M. S., & Han, S. D. (2015). Age-associated financial Breaches. Retrieved from https://www.idtheftcenter.org/ vulnerability: An emerging public health issue. Annals of Data-Breaches/data-breaches internal medicine, 163(11), 877-878. Internal Revenue Service (IRS). (2016). IRS’s Top Ten Identity Lack, A. (2007). Cybercrime Grows Up. Gulfport, FL: National Theft Prosecutions: Criminal Investigation Continues Efforts Clearinghouse for Science, Technology and the Law at to Halt Refund Fraud. Retrieved from https://www.irs. Stetson University College of Law. Retrieved from http:// gov/newsroom/irss-top-10-identity-theft-prosecutions- www.ncstl.org/news/LackOctober07 criminal-investigation-continues-efforts-to-halt-refund- LaCounte, C., Gray, J., & Dewees, S. (2015). Financial Fraud fraud in Indian Country. Financial Crime Resource Center, Internal Revenue Service (IRS). (2019). Identity Theft Victim National Center for Victims of Crime, & Financial Assistance: How It Works. Retrieved from https://www.irs. Industry Regulatory Authority. Retrieved from https:// gov/individuals/how-irs-id-theft-victim-assistance-works victimsofcrime.org/top-links/events/2015/08/25/default- International Association of Chiefs of Police (IACP). (n.d.a). calendar/financial-fraud-in-indian-country Prevention Toolkit: Keep Your Good Name. Retrieved from Leach, J. (2016a). Fraud Affects Every Community: Debt Collection. http://www.theiacp.org/portals/0/pdfs/prevention_toolkit. Federal Trade Commission. Retrieved from https://www. pdf consumer.ftc.gov/blog/2016/01/fraud-affects-every- International Association of Chiefs of Police (IACP). (n.d.b). community-debt-collection Recovery Toolkit: Get Back Your Good Name. Retrieved from Leach, J. (2016b). The top three ways to avoid fraud. Federal Trade http://www.theiacp.org/portals/0/pdfs/recovery_toolkit. Commission. Retrieved from https://www.consumer.ftc. pdf gov/blog/2016/08/top-three-ways-avoid-fraud International Association of Chiefs of Police (IACP) and Bank of Leach, J., Weintraub Schifferle, L., Yu, P., & Sopiep, B. (2014). Pass America. (2006). Defending America Against Identity Crime: It On: Older Adults, Fraud, And the Federal Trade Commission. Identity Crime Toolkit for Police Executives. Retrieved from National Consumer Law Center. Retrieved from https:// http://www.theiacp.org/portals/0/pdfs/chiefs_toolkit.pdf www.nclc.org/images/pdf/conferences_and_webinars/ International Association of Chiefs of Police (IACP) and webinar_trainings/presentations/2013-2014/pass_it_on- . (2008a). Identity Crime Update: Part older_adults_fraud_and_the_ftc_10sep2014t.pdf I. Retrieved from http://www.theiacp.org/portals/0/ Long, R., Hartnett, A., & Bleier, L. (2016). An Advocate’s Guide to pdfs/616IdentityCrimeUpdatePartI.pdf Legislative & Regulatory Updates. The National Center for International Association of Chiefs of Police (IACP) and Victims of Crime & Advisors. Retrieved from Bank of America. (2008b). Identity Crime Update: Part https://victimsofcrime.org/top-links/events/2016/11/18/ Ii. Retrieved from http://www.theiacp.org/portals/0/ default-calendar/an-advocate’s-guide-to-legislative-and- pdfs/617IdentityCrimeUpdatePartII.pdf regulatory-updates

Center for Victim Research: Identity Theft and Fraud Victimization | 14 Maryland Crime Victims Resource Center. (n.d.). Steps for Victims National Center for Victims of Crime & Financial Industry of Identity Theft or Fraud. Office for Victims of Crime Regulatory Authority Investor Education Foundation Training and Technical Assistance Center. Retrieved from (NCVC and FINRA). (n.d.b). Taking Action: Investment https://www.ovcttac.gov/downloads/identitytheftnetwork/ Fraud Victim Recovery Checklist. Retrieved from https:// toolkit/TrainingMaterials/StepsForVictims.pdf victimsofcrime.org/docs/default-source/financial-fraud/ Mendez, R. (2017) Help Stop Fraud This Hispanic Heritage Month. recoverychecklist_investmentfraud.pdf?sfvrsn=2 Federal Trade Commission. Retrieved from https://www. National Center for Victims of Crime & Financial Industry consumer.ftc.gov/blog/2017/09/help-stop-fraud-hispanic- Regulatory Authority Investor Education Foundation heritage-month (NCVC & FINRA). (n.d.c). Taking Action: Mass Marketing Miller, J. & Robuck, R. (2013). Youth and Credit: Protecting the and Other Fraud- Victim Recovery Checklist. Retrieved from Credit of Youth in Foster Care. Baltimore, MD: Annie E. https://victimsofcrime.org/docs/default-source/financial- Casey Foundation. Retrieved from http://www.aecf.org/m/ fraud/recoverychecklist_otherfraud.pdf?sfvrsn=2 resourcedoc/AECF-YouthAndCredit-2013.pdf National Center for Victims of Crime & Financial Industry Miranda, C. (2016). Kids Turning 16? Check Their Credit Report. Regulatory Authority (NCVC & FINRA). (n.d.d). Taking Federal Trade Commission. Retrieved from https://www. Action: Mortgage and Lending Fraud- Victim Recovery consumer.ftc.gov/blog/2016/10/kids-turning-16-check- Checklist. Retrieved from https://victimsofcrime.org/ their-credit-report docs/default-source/financial-fraud/recoverychecklist_ lendingfraud.pdf?sfvrsn=2 Miranda, C. (2017). Scammers Impersonate the National Institutes of Health. Federal Trade Commission. Retrieved from National Consumer Law Center. (2010).Home Improvement https://www.consumer.ftc.gov/blog/2017/08/scammers- Scams Alert. Retrieved from https://www.nclc.org/images/ impersonate-national-institutes-health pdf/older_consumers/consumer_concerns/cc_home%20 improvement_scams_alert.pdf National Center for Victims of Crime (NCVC). (2014).White Paper: Roundtable on Serving Victims of Elder Financial National Consumer Law Center, Consumer Action, & US Public Exploitation.Retrieved from http://victimsofcrime.org/docs/ Interest Research Group. (2013). Consumers at Risk: Tips default-source/financial-fraud/final-efe-white-paper--- When Experiencing a Data Security Breach. Retrieved with-participant-list.docx?sfvrsn=2 from https://www.nclc.org/images/pdf/pr-reports/pr- creditcardbreach2013.pdf National Center for Victims of Crime (NCVC). (2015). Financials 101: An Advocate’s Guide to Understanding National Consumers League. (2009). NCL Warns Senate of Financials and Best Practices in Working with Financial Recession-Fueled Fraud. Retrieved from http://www.nclnet. Institutions. Retrieved from https://victimsofcrime.org/top- org/ncl_warns_senate_of_recession_fueled_fraud links/events/2015/11/17/default-calendar/financials-101- National Consumers League. (2010). Mid-Year Report: Internet an-advocate’s-guide-to-understanding-financials-and-best- Merchandise Scams Topping Complaints to NCL’s Fraud Center. practices-in-working-with-financial-institutions Retrieved from http://www.nclnet.org/mid_year_report_ National Center for Victims of Crime. (2017). Model Civil internet_merchandise_scams_topping_complaints_to_ncl_ Provisions on Elder Financial Exploitation.Retrieved rsquo_s_fraud_center from http://victimsofcrime.org/docs/default-source/ National Consumers League. (2011). Scammers Going After Senior financial-fraud/model-civil-provisions-on-elder-financial- Victims, Says NCL’s Fraud Center. Retrieved from http:// exploitation.pdf?sfvrsn=2 www.nclnet.org/scammers_going_after_senior_victims_ says_ncl_rsquo_s_fraud_center National Center for Victims of Crime & Financial Industry Regulatory Authority Investor Education Foundation National Consumers League. (2015). Consumer Group Issues (NCVC and FINRA). (2013). Taking Action: An Advocate’s Taxpayer Warning Against ID Thieves Filing Illegitimate Guide to Assisting Victims of Financial Fraud. Retrieved from Returns. Retrieved from http://www.nclnet.org/tax_id_ https://www.saveandinvest.org/sites/default/files/Taking- theft_alert Action-An-Advocates-Guide-to-Assisting-Victims-of- National Consumers League. (2018)Top Scams of 2017. Fraud!org Financial-Fraud.pdf Retrieved from https://d3n8a8pro7vhmx.cloudfront.net/ National Center for Victims of Crime & Financial Industry ncl/pages/4567/attachments/original/1517428302/2017_ Regulatory Authority (NCVC & FINRA). (n.d.a). Taking top_scams_report.pdf?1517428302 Action: Identity Theft Victim Recovery Checklist. Retrieved National Crime Victim Law Institute (NCVLI). (2011). National from https://victimsofcrime.org/docs/default-source/ Survey of Whether Identity Theft Victims Meet the Legal financial-fraud/recoverychecklist_idtheft.pdf?sfvrsn=4 Definition of Crime “Victim”: Under A State’s Constitution, Victims’ Rights Statute & Victims’ Compensation Statute. Retrieved from https://www.ovc.gov/pdftxt/state_survey_ id_theft_victims.pdf

Center for Victim Research: Identity Theft and Fraud Victimization | 15 National Cyber Security Alliance. (2016).Cyber Safe Holiday Office for Victims of Crime (OVC). (2011).Restitution: Special Shopping Resource. Retrieved from https://staysafeonline. Circumstances. Retrieved from https://victimsofcrime. org/resource/cyber-safe-holiday-shopping-resource/ org/library/publications/restitution-and-compensation/ National Cyber Security Alliance. (2017a). Stop. Think. Connect. restitution-toolkit/special-circumstances Retrieved from https://staysafeonline.org/resource/stop- Office for Victims of Crime (OVC). (2018).Financial Crime. think-connect-fact-sheet/ Retrieved from https://ovc.ncjrs.gov/ncvrw2018/info_ National Cyber Security Alliance. (2017b). What to Do If You Are a flyers/fact_sheets/2018NCVRW_FinancialCrime_508_ Victim of Cybercrime. Retrieved from https://staysafeonline. QC.pdf org/resource/what-to-do-if-you-are-a-victim-of- Office for Victims of Crime (OVC). (2019a).Crime Victimization cybercrime/ Glossary. Retrieved from https://www.ovc.gov/library/ National Cyber Security Alliance. (2018).Stay Safe from glossary.html Cybercrime During Tax Time. Retrieved from https:// Office for Victims of Crime (OVC). (2019b).Fraud and Identity staysafeonline.org/resource/cybersecurity-tips-online-tax- Theft. Retrieved from https://ovc.ncjrs.gov/topic. time/ aspx?topicid=29 National Institute of Justice. (2009)., Foreclosures Office for Victims of Crime (OVC). (n.d.a).Identity Theft Victim and Neighborhood Decline Meeting. Retrieved from https:// Assistance Online Training: Identity Theft- Supporting Identity www.ncjrs.gov/pdffiles1/nij/242227.pdf Theft Victim’s Emotional and Financial Recovery. Retrieved National White Collar Crime Center (NWC3). (2017). Disaster from https://www.ovcttac.gov/views/TrainingMaterials/ Fraud. Retrieved from: https://www.nw3c.org/docs/ dspOnline_IdentityTheft.cfm research/disaster-fraud.pdf Office for Victims of Crime (OVC). (n.d.b). Victim Assistance Nerenberg, L. (2005). Identity Theft and Related Crimes: The Critical Training (VAT) Online Crimes: Identity Theft. Retrieved Role of Intervention, Education and Assistance to Victims. from https://www.ovcttac.gov/views/TrainingMaterials/ Outline of presentation from the NW3C’s 2005 Economic dspOnline_IdentityTheft.cfm Crime Summit, Minneapolis, MN. Office for Victims of Crime Training and Technical New York Finger Lakes Identity Theft Coalition. (n.d.). Identity Assistance Center (OVC TTAC). (2018a). Resources for Theft Kit for Victims of Identity Theft. Retrieved from https:// Attorneys. Retrieved from https://www.ovcttac.gov/ www.ovcttac.gov/downloads/identitytheftnetwork/toolkit/ identitytheftnetwork/resource-map/resources-for- OutreachMaterials/ID%20THEFT%20KIT%20FOR%20 attorneys/ VICTIMS%20-%20I.C.c.%20is%20this%20.pdf Office for Victims of Crime Training and Technical Assistance O’Brien, M. & Heckers, H. (2013). Taking Action: Assisting Victims Center (OVC TTAC). (2018b). Resources for Law of Identity Theft. The National Center for Victims of Enforcement. Retrieved from https://www.ovcttac.gov/ Crime, Identity Theft Victims Assistance Network, & The identitytheftnetwork/resource-map/resources-for-law- Financial Industry Regulatory Authority Investor Education enforcement/ Foundation. Retrieved from http://victimsofcrime.org/docs/ Office for Victims of Crime Training and Technical financial-fraud/ncvc-finra-webinar---assisting-idt-victims--- Assistance Center (OVC TTAC). (n.d.a). ATM and Debit for-display.pdf?sfvrsn=2 Cards. Retrieved from https://www.ovcttac.gov/downloads/ O’brien, M., Heckers, H., Rusch, J., Coats, S., Zalenski, C., & identitytheftnetwork/toolkit/TrainingMaterials/FTC- Pedley, E. (2012). Disaster Related Identity Theft Victimization GuidebookATMAndDebitCard.pdf and Fraud. Office for Victims of Crime’s National Identity Office for Victims of Crime Training and Technical Assistance Theft Victims Assistance Network. Retrieved from https:// Center (OVC TTAC). (n.d.b). Credit Card Issuer Obligations www.youtube.com/watch?v=vZRPCT-tei4” Under the Fair Credit Billing Act. Retrieved from https:// Office for Victims of Crime (OVC). (2000).Victims of Fraud and www.ovcttac.gov/downloads/identitytheftnetwork/toolkit/ Economic Crime: Results and Recommendations from an OVC TrainingMaterials/FTC-GuidebookCreditCardObligations. Focus Group Meeting. Washington, DC: Office for Victims of pdf Crime. Retrieved from https://www.ncjrs.gov/ovc_archives/ Office for Victims of Crime Training and Technical Assistance reports/fraud/htmlfraud/index.html Center (OVC TTAC). (n.d.c). Disputing Errors in Credit Reports Office for Victims of Crime (OVC). (2005). Attorney General Using Sections 611, 623(b), and 623(a)(1)(B). Retrieved from Guidelines for Victim and Witness Assistance. Retrieved from https://www.ovcttac.gov/downloads/identitytheftnetwork/ https://www.justice.gov/archive/olp/ag_guidelines.pdf toolkit/TrainingMaterials/FTC-GuideToAssisting- ObtrainingCopiesOfCreditReports.pdf Office for Victims of Crime (OVC). (2010).Expanding Services to Reach Victims of Identity Theft and Financial Fraud. Retrieved from https://www.ovc.gov/pubs/ID_theft/pfv.html

Center for Victim Research: Identity Theft and Fraud Victimization | 16 Office for Victims of Crime Training and Technical Assistance Platt Majoras, D. (2007).Maintaining Momentum in The Fight Center (OVC TTAC). (n.d.d). FCRA 615(g) (15 U.S.C. § Against Identity Theft. Federal Trade Commission (FTC). 1681m(g)) Requirements on Users of Consumer Reports-- Retrieved from https://www.ftc.gov/sites/default/files/ Debt collector communications concerning identity documents/public_statements/maintaining-momentum- theft. Retrieved from https://www.ovcttac.gov/downloads/ fight-against-identity-theft/071001ncsas.pdf identitytheftnetwork/toolkit/TrainingMaterials/DebtCollec Platt Majoras, D., Swindle, O., Leary, T.B., Jones Harbour, P., torCommunicationsConcerningIDTheft(FCRA615(g)).pdf & Leibowitz, J. (2005). Monitoring Software on Your PC: Office for Victims of Crime Training and Technical Assistance , , And Other Software. Federal Trade Center (OVC TTAC). (n.d.e). Free Annual Credit Reports Commission (FTC). Retrieved from https://www.ftc.gov/ and Other Free Reports. Retrieved from https://www. sites/default/files/documents/reports/spyware-workshop- ovcttac.gov/downloads/identitytheftnetwork/toolkit/ monitoring-software-your-personal-computer-spyware- TrainingMaterials/FTC-GuidebookFreeCreditReports.pdf adware-and-other-software-report/050307spywarerpt.pdf Office for Victims of Crime Training and Technical Assistance Poss, P., Vaca, M., Leach, J., Carroll, N., Ornbaun, M., & Baddour, Center (OVC TTAC). (n.d.f). Identity Theft Involving Federal A. (2016). Webinar: Fighting Fraud in Minority Communities Student Loans. Retrieved from https://www.ovcttac.gov/ [Webinar]. National Center for Victims of Crime & downloads/identitytheftnetwork/toolkit/TrainingMaterials/ Financial Industry Regulatory Authority Investor Education FTC-GuidebookAndStudentLoans.pdf Foundation. Retrieved from https://victimsofcrime.org/ Office for Victims of Crime Training and Technical Assistance top-links/events/2016/10/20/default-calendar/webinar- Center (OVC TTAC). (n.d.g). Identity Theft Involving the fighting-fraud-in-minority-communities Internal Revenue Service. Retrieved from https://www. Privacy Rights Clearinghouse. (2018). Data Breaches. Retrieved ovcttac.gov/downloads/identitytheftnetwork/toolkit/ from https://www.privacyrights.org/data-breaches TrainingMaterials/FTC-GuidebookIRS.pdf Puig, A. (2015). Unlocking the Code. Federal Trade Commission. Office for Victims of Crime Training and Technical Assistance Retrieved from https://www.consumer.ftc.gov/ Center (OVC TTAC). (n.d.h). Identity Theft Involving the blog/2015/04/unlocking-code Social Security Administration. Retrieved from https://www. Rich, J. (2016a). Combating Fraud in African-American And Latino ovcttac.gov/downloads/identitytheftnetwork/toolkit/ Communities. Federal Trade Commission. Retrieved from TrainingMaterials/FTC-GuidebookSSA.pdf https://www.consumer.ftc.gov/blog/2016/06/combating- Office for Victims of Crime Training and Technical Assistance fraud-african-american-and-latino-communities Center (OVC TTAC). (n.d.i). Obtaining Business Records Rich, J. (2016b). When Women Are Targeted for Scams. Federal Relating to Identity Theft. Retrieved from https://www. Trade Commission. Retrieved from https://www.consumer. ovcttac.gov/downloads/identitytheftnetwork/toolkit/ ftc.gov/blog/2016/03/when-women-are-targeted-scams TrainingMaterials/FTC-GuidebookObtainingBusRecords.pdf Roberts, E. & Cook, L. (2017). The Intersection of Stalking & Office for Victims of Crime Training and Technical Assistance Financial Fraud. The National Center for Victims of Crime & Center (OVC TTAC). (n.d.j). The Primary Tools to Minimize Financial Industry Regulatory Authority Investor Education Further Fraud. Retrieved from https://www.ovcttac.gov/ Foundation. Retrieved from https://www.youtube.com/ downloads/identitytheftnetwork/toolkit/TrainingMaterials/ watch?v=z-BYCwM_-IQ&feature=youtu.be FTC-GuidebookPrimaryToolsForVictims.pdf Saunders, L. & Benway, K. (2009). Protecting the Pocketbook: Olson, N.E. (2014). National Taxpayer Advocate: Help Is Available Guarding Elders Against Wealth Stealing and Equity Draining for Victims of Identity Theft. Federal Trade Commission. Scams. National Consumer Law Center and Federal Retrieved from https://www.consumer.ftc.gov/ Trade Commission. Retrieved from https://www.nclc.org/ blog/2014/01/national-taxpayer-advocate-help-available- national-elder-rights-training-program/housing-consumer- victims-identity-theft related-issues/protecting-the-pocketbook-guarding-elders- Pierce, P. (2009). Identity Theft. Office for Victims of Crime against-wealth-stealing-and-equity-draining-scams.html Training and Technical Assistance Center. Retrieved Saunders, L., Pizor, A., & Twomey, T. (2009). Desperate from http://www.ncdsv.org/images/OVCTTAC_ Homeowners: Loan Mod Scammers Step in When Loan IdentityTheftResourcePaper_2012.pdf Services Refuse to Provide Relief. National Consumer Law Pineda-Kando, C. (2013). A (Potentially) Taxing Situation. Federal Center. Retrieved from https://www.nclc.org/images/pdf/ Trade Commission. Retrieved from https://www.consumer. pr-reports/report-loan-mod-scams-2009.pdf ftc.gov/blog/2013/02/potentially-taxing-situation Pizor, A. (2010). Mortgage Assistance Relief Scams: What Advocates Should Know & Updates on Regulation. National Consumer Law Center. Retrieved from https://www.nclc.org/images/ pdf/conferences_and_webinars/webinar_trainings/ presentations/2010/presentation_march10.pdf

Center for Victim Research: Identity Theft and Fraud Victimization | 17 Schaffer, P., Velasquez, E., Fiorentino, N., Dwyer, K., Hamilton, Texas Identity Theft Coalition. (2010e).Module 4: Screening A., Barney, K., Brown, D., Laluk, L., & Dwoskin, M. (2016). and Referring Identity Theft Victims to Professional Therapy. Identity Theft and The Holiday Season: Understanding Retrieved from https://www.ovcttac.gov/downloads/ and Managing Risk During a Time of Increased Travel and identitytheftnetwork/toolkit/TrainingMaterials/Module_4_ Spending. Generali Global Assistance and the Identity Theft ReferringToProfessionalTherapy.pdf Resource Center. Retrieved from https://cdn2.hubspot. Texas Identity Theft Coalition. (2010f).Someone Stole My Stuff, net/hubfs/524149/Gated_Content/Identity%20Theft%20 But They Didn’t Steal Me. Retrieved from https://www. and%20the%20Holiday%20Season.pdf ovcttac.gov/downloads/identitytheftnetwork/toolkit/ Schaffer, P., Velasquez, E., Fiorentino, N., Dwyer, K., Hamilton, TrainingMaterials/Brochure.pdf A., Barney, K., & Dwoskin, M. (2017a). Data Protection: Texas Identity Theft Coalition. (n.d.a). Action Plan for Victims of Employer Obligations and Motivations. Identity Theft Identity Theft. Retrieved from https://www.ovcttac.gov/ Resource Center and Generali Global Assistance. Retrieved downloads/identitytheftnetwork/toolkit/TrainingMaterials/ from http://us.generaliglobalassistance.com/blog/white- Module1_handout.pdf paper-data-security/ Texas Identity Theft Coalition. (n.d.b). Module 1: Identity Theft Schaffer, P., Velasquez, E., Fiorentino, N., Dwyer, K., Hamilton, 101. Retrieved from https://www.ovcttac.gov/downloads/ A., Barney, K., Brown, D., Laluk, L., & Dwoskin, M. (2017b). identitytheftnetwork/toolkit/TrainingMaterials/Module1_ Phishing and Tax Fraud: Understanding These Growing Crimes’ instructions.pdf Effect on Businesses. Generali Global Assistance and the Identity Theft Resource Center. Retrieved from http:// Thorleifson, T., Anderson, K., Greenberg, S., Fisher, L., Szuchman, irisidentityprotection.com/articles/white-paper-phishing- D., Carpenter, N., & Deem, D. (2009). Quantifying Fraud tax-fraud/ and Under-Reported Fraud: Identifying the Fraud That Is Not Reported and Exploring Ways to Reach Vulnerable Consumers Schifferle, L.W. (2016).Identity Theft by . Federal [PowerPoint Presentation]. Retrieved from https://www. Trade Commission. Retrieved from https://www.consumer. ftc.gov/sites/default/files/documents/public_events/fraud- ftc.gov/blog/2016/06/identity-theft-mobile-phone forum/b.day1panel2.ppt Schifferle, L.W., Pierce, P., Morris, K., & Hiemenz, J. (2011). Toporoff, S. (2013). Talking Through Identity Theft: A Program for Identifying, Preventing, And Addressing Identity Theft. The Blind and Visually Impaired. Federal Trade Commission. National Consumer Law Center. Retrieved from https:// Retrieved from https://www.consumer.ftc.gov/ www.nclc.org/national-elder-rights-training-program/ blog/2013/07/talking-through-identity-theft-program- identifying-preventing-and-addressing-identity-theft.html blind-and-visually-impaired Small, B. (2016). Prize Scams in Your Mailbox. Federal Trade Toporoff, S. (2014). Tax Identity Theft: What Your Business Needs Commission. Retrieved from https://www.consumer.ftc. to Know. Federal Trade Commission. Retrieved from https:// gov/blog/2016/09/prize-scams-your-mailbox www.ftc.gov/news-events/blogs/business-blog/2014/01/ Sussman, E. & Shoener, S. (2013). The Use of Identity Theft by tax-identity-theft-what-your-business-needs-know Domestic Violence Perpetrators. Office for Victims of Crime’s Toporoff, S., Gargano-Ahmed, A., Heckers, H., & Ayers, S. National Identity Theft Network. Retrieved from https:// (2013). Identity Theft and Children in The Foster Care www.youtube.com/watch?v=IdGTKfAHvYc System. Office for Victims of Crime National Identity Theft Texas Identity Theft Coalition. (2010a).Common Reactions to Network. Retrieved from https://www.youtube.com/ Identity Theft. Retrieved from https://www.ovcttac.gov/ watch?v=3h4TcjFKBBM downloads/identitytheftnetwork/toolkit/TrainingMaterials/ Treasury Inspector General for Tax Administration. (2018). CommonReactionsBrochure.pdf Results of the 2017 Filing Season. Washington, DC: Texas Identity Theft Coalition. (2010b).Mental Health Issues Treasury Inspector General for Tax Administration. of Identity Theft Victims. Retrieved from https://www. Retrieved from https://www.treasury.gov/tigta/ ovcttac.gov/downloads/identitytheftnetwork/toolkit/ auditreports/2018reports/201840012fr.pdf TrainingMaterials/TipsForProfessionalTherapists_doc.pdf Tressler, C. (2013). Guarding Against Identity Theft After a Weather Texas Identity Theft Coalition. (2010c).Module 2: Emotional Emergency. Federal Trade Commission. Retrieved from Impact of Identity Theft. Retrieved from https://www. https://www.consumer.ftc.gov/blog/2013/09/guarding- ovcttac.gov/downloads/identitytheftnetwork/ against-identity-theft-after-weather-emergency toolkit/TrainingMaterials/Module_2_ Tressler, C. (2016). Con Artists Prey on Victims of Timeshare Resale EmotionalImpactOfIdentityTheft.pdf Scams. Federal Trade Commission. Retrieved from https:// Texas Identity Theft Coalition. (2010d).Module 3: Strengthening www.consumer.ftc.gov/blog/2013/09/con-artists-prey- Resilience in Identity Theft Victims. Retrieved from https:// victims-timeshare-resale-scams www.ovcttac.gov/downloads/identitytheftnetwork/toolkit/ TrainingMaterials/Module_3_StrengtheningResilience.pdf

Center for Victim Research: Identity Theft and Fraud Victimization | 18 Tripoli, S. & Renuart, E. (2005). Dreams Foreclosed: The Rampant Webster, S. (2014). When the Fraud Is Stamped: Prevention, Theft of Americans’ Homes Through Equity Stripping Enforcement, And Recovery for Victims of Mail and Lottery Foreclosure “Rescue Scams”. Boston, MA: National Consumer Fraud. The National Center for Victims of Crime. Law Center. Retrieved from https://www.nclc.org/images/ Retrieved from https://victimsofcrime.org/top-links/ pdf/foreclosure_mortgage/scam/report-foreclosure- events/2014/10/22/default-calendar/when-the-fraud- rescue-scams-2005.pdf is-stamped-prevention-enforcement-and-recovery-for- US Department of Housing and Urban Development Center for victims-of-mail-and-lottery-fraud Faith-Based and Neighborhood Partnerships (HUD Center Winston, J. (2007). The Prepared Statement of The Federal Trade for Faith-Based and Neighborhood Partnerships). (n.d.). Commission Before the Subcommittee on Crime, , Toolkit on Foreclosure Prevention & Scam Awareness for Faith- And Homeland Security on Protecting Consumer Privacy Based and Community Organizations. Retrieved from https:// and Combating Identity Theft. Federal Trade Commission. www.hud.gov/sites/documents/TOOLKIT_HYPERLINKS_2. Retrieved from https://www.ftc.gov/sites/default/files/ PDF documents/public_statements/prepared-statement- US Department of Justice (DOJ). (2014). Civil Legal Aid 101. federal-trade-commission-protecting-consumer-privacy- Retrieved from https://www.justice.gov/atj/civil-legal- and-combating-identity-theft/p065404idtheft.pdf aid-101 Wolf, R. (2010). A Full Response to An Empty House: Public Safety US Department of Justice (DOJ). (2017). Department of Justice vs. Strategies for Addressing Mortgage Fraud and The Foreclosure Jeffery K Skilling.Retrieved from https://www.justice.gov/ Crisis. New York, NY: Center for Court Innovation. criminal-vns/case/skillingjk Retrieved from https://www.bja.gov/Publications/CCI_ Foreclosure_Crisis.pdf US Securities and Exchange Commission (US SEC). (2013). Affinity Fraud: How to Avoid Investment Scams That Target World Privacy Forum. (2007). Responses to Medical Identity Theft: Groups. Retrieved from https://www.sec.gov/investor/ Eight Best Practices for Helping Victims of Medical Identity pubs/affinity.htm Theft. Retrieved from https://www.worldprivacyforum. org/2007/10/medicalidtheftresponses/ Velasquez, E. & Schifferle, L.W. (2015).Advanced Identity Theft. The National Center for Victims of Crime & The World Privacy Forum. (2012). Medical ID Theft: How to Recover Financial Crime Resource Center. Retrieved from https:// If You’re a Victim and What to Do If You Are Worried victimsofcrime.org/top-links/events/2015/03/26/default- About Becoming a Victim. Retrieved from https://www. calendar/advanced-identity-theft-2015 worldprivacyforum.org/2012/04/faq-victims-of-medical- id-theft/ Vincent Fleming, N. (2013). Money Transfer Scams. Federal Trade Commission. Retrieved from https://www.consumer.ftc. gov/blog/2013/12/money-transfer-scams Visentin, P., Husinger, S., & Medlin, D. (2009). Identity theft recovery: Using equity theory to explore the need for victim advocacy. Issues in Information Systems, Vol (NoX 2), 520-528. Retrieved from http://iacis.org/iis/2009/ P2009_1320.pdf

Center for Victim Research: Identity Theft and Fraud Victimization | 19