Cyber threats to health information systems: A systematic review
R Luna, E Rhine, M Myhra, R Sullivan… - … and Health Care, 2016 - content.iospress.com
BACKGROUND: Recent legislation empowering providers to embrace the electronic
exchange of health information leaves the healthcare industry increasingly vulnerable to …
exchange of health information leaves the healthcare industry increasingly vulnerable to …
Identity fraud victimization: a critical review of the literature of the past two decades
Y Irvin-Erickson - Crime Science, 2024 - Springer
This study aims to provide an understanding of the nature, extent, and quality of the research
evidence on identity fraud victimization in the US. Specifically, this article reviews …
evidence on identity fraud victimization in the US. Specifically, this article reviews …
Learning on the job: Studying expertise in residential burglars using virtual environments
In this article, we describe a quasi‐experiment in which experienced incarcerated burglars
(n= 56), other offenders (n= 50), and nonoffenders (n= 55) undertook a mock burglary within …
(n= 56), other offenders (n= 50), and nonoffenders (n= 55) undertook a mock burglary within …
“I suspect that the pictures are stolen”: romance fraud, identity crime, and responding to suspicions of inauthentic identities
C Cross, R Layt - Social Science Computer Review, 2022 - journals.sagepub.com
Romance fraud impacts the lives of thousands of people globally. Financial losses exceed
millions of dollars each year and are steadily increasing annually. It occurs when an …
millions of dollars each year and are steadily increasing annually. It occurs when an …
Do deliberate firesetters hold fire-related scripts and expertise? A quantitative investigation using fire service personnel as comparisons
Purpose: This research investigated, for the first time, the presence of fire-related scripts and
expertise in males who have set deliberate fires. Method: One hundred and twenty-seven …
expertise in males who have set deliberate fires. Method: One hundred and twenty-seven …
An inclusive, value sensitive design perspective on future identity technologies
Identity technologies constitute one of the fastest growing areas for research and
development, driven by both commercial and administrative imperatives. Crucially, they …
development, driven by both commercial and administrative imperatives. Crucially, they …
Preventing identity theft: perspectives on technological solutions from industry insiders
An estimated 26 million American citizens per year have been victims of an identity-based
crime. This study contributes to the scholarship on financial crimes facilitated through identity …
crime. This study contributes to the scholarship on financial crimes facilitated through identity …
The role of verbal intelligence in becoming a successful criminal: Results from a longitudinal sample
CM Boccio, KM Beaver, JA Schwartz - Intelligence, 2018 - Elsevier
Intelligence has been linked with success across a wide array of life domains. To date,
however, relatively little research has examined whether intelligence may predict criminal …
however, relatively little research has examined whether intelligence may predict criminal …
More than money: examining the potential exposure of romance fraud victims to identity crime
Romance fraud occurs when an offender uses the guise of a genuine relationship to defraud
an individual for financial gain. Known statistics indicate that millions are lost each year to …
an individual for financial gain. Known statistics indicate that millions are lost each year to …
The psychology of the corrupt: some preliminary findings
Purpose This paper aims to present findings based on the psychological profile of 17
offenders who have been convicted of occupational fraud, bribery or related offences. It …
offenders who have been convicted of occupational fraud, bribery or related offences. It …