
Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 1-1-2011 The elr ationship between cell phone use and identity theft Lewis O. Saunders Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Databases and Information Systems Commons, Public Administration Commons, and the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Lewis Saunders has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Raj Singh, Committee Chairperson, Public Policy and Administration Faculty Dr. Walter McCollum, Committee Member, Public Policy and Administration Faculty Dr. Wendy Andberg, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2014 Abstract The Relationship Between Cell Phone Use and Identity Theft by Lewis O. Saunders Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University March 2014 Abstract The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim’s personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users’ attitudes toward identity theft and the extent to which they connect it to cell phone use. The purpose of this qualitative study was to determine how cell phone use is affected by attitudes toward privacy and identity theft. The study was based on social impact theory, according to which people’s attitudes and behavior are affected by the strength and immediacy of others’ attitudes and behavior. The research questions concerned the extent to which participants connected cell phone use with decreasing privacy and increasing cybercrime, how the use of biometrics affected cell phone users’ attitudes and behavior, and what steps can be taken to reduce the misuse of private information associated with cell phone use. Data collection consisted of personal interviews with representatives from 3 groups: a private biometrics company, individual cell phone users who earn more than $55,000 a year, and individual cell phone users who earn less than $55,000 a year. Interviews were transcribed and coded for themes and patterns. Findings showed that interviewees were more likely to see identity theft as a problem among the public at large than in the industries in which they worked. Participants recommended a variety of measures to improve cell phone security and to reduce the likelihood of identity theft: passwords, security codes, voice or fingerprint recognition, and encryption. The implications for positive social change include informing government officials and individual users about the use and abuse of cell phones in order to decrease violations of privacy and identity theft while still promoting national security. The Relationship Between Cell Phone Use and Identity Theft by Lewis O. Saunders Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University March 2014 UMI Number: 3615824 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI 3615824 Published by ProQuest LLC (2014). Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI 48106 - 1346 Dedication I dedicate this analytical effort to my mother, Frances J. Roy Saunders, who has been a guiding light in my pursuit for higher education. Additionally, special gratitude is given to my wife, Rachel, who has provided comments and corrections when, to my belief, everything seems to be perfect. Thanks to our children, Valera, Sarita, and Cassandra, who provided support and encouragements throughout the entire process of receiving my Ph.D. Acknowledgements Special thanks and deep appreciation to my mentor and chair, Dr. Raj Singh. Without his special guidance I would have not been able to reach the goal I have planned and hoped for since I was a boy. I am also grateful for the help and advice of Dr. Walter McCollum, who assisted me in applying to Walden University and recommended books to read. Thank you Dr. Iran Birdsall for serving on one of the most important parts of any dissertation or study by assuring that the methodology can produce sound and useful results. Table of Contents List of Tables ..................................................................................................................... iv List of Figures ..................................................................................................................... v Chapter 1: Introduction ....................................................................................................... 1 Introduction ................................................................................................................. 1 Problem Statement ...................................................................................................... 3 Nature of the Study ...................................................................................................... 5 Research Questions ..................................................................................................... 7 Purpose of the Study .................................................................................................... 7 Theoretical Framework ............................................................................................... 8 Definitions of Terms ................................................................................................. 10 Assumptions, Limitations, and Scope ....................................................................... 11 Significance of the Study .......................................................................................... 11 Summary ................................................................................................................... 13 Chapter 2: Literature Review ............................................................................................ 14 Introduction ............................................................................................................... 14 Theoretical Framework ............................................................................................. 14 Information Technology ............................................................................................ 16 Privacy and Security .................................................................................................. 18 Cloud Computing ...................................................................................................... 22 Legislative Reform .................................................................................................... 27 Third-Party Use of Personal Data ............................................................................. 28 i Identity Theft ............................................................................................................. 37 Public Versus Private Safety ..................................................................................... 42 Biometrics ................................................................................................................. 44 Obstacles to Security ................................................................................................. 49 Future Trends ............................................................................................................ 51 Summary ................................................................................................................... 51 Chapter 3: Methodology ................................................................................................... 53 Introduction ............................................................................................................... 53 Research Design ........................................................................................................ 53 Role of the Researcher .............................................................................................. 56 Research Questions ................................................................................................... 56 Ethical Protections ..................................................................................................... 56 Population and Sampling ..........................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages138 Page
-
File Size-