Cyber-Identity Theft

Cyber-Identity Theft

Angeline Grace Close (University of Georgia, USA, North Georgia College and State University, USA and University of Nevada, Las Vegas, USA), George M. Zinkhan (University of Georgia, USA) and R. Zachary Finney (University of South Alabama, USA)
Copyright: © 2006 |Pages: 4
DOI: 10.4018/978-1-59140-799-7.ch028
OnDemand PDF Download:
No Current Special Offers


Internet technology facilitates “faceless” transactions. At the same time, a new set of risks arises. In this article, we focus on the Internet-related risks associated with identity theft. Specifically, our objectives are to explain electronic-based identity theft (i.e., cyber-identity theft) and to explore the impact of cyber-identity theft on consumers, businesses, organizations and public policies. Our article makes two specific contributions to the identity theft literature: (a) it explains identity theft as it relates to the Internet and (b) it defines key methods of cyber-identity theft.

Complete Chapter List

Search this Book: