IDEAS home Printed from https://ideas.repec.org/a/aea/jecper/v22y2008i2p171-192.html
   My bibliography  Save this article

Identity Theft

Author

Listed:
  • Keith B. Anderson
  • Erik Durbin
  • Michael A. Salinger

Abstract

Identity theft is made possible by the nature of modern payment systems. In the modern economy, sellers are willing to offer goods and services to strangers in exchange for a promise to pay, provided the promise is backed up by data that link the buyer to a specific account or credit history. Identity theft involves acquiring enough data about another person to counterfeit this link, enabling the thief to acquire goods while attributing the charge to another person's account. In this article, we discuss what is (and is not) known about the prevalence and cost of identity theft, describe the institutional framework in which identity theft takes place, and consider some of the main policy issues associated with the problem.

Suggested Citation

  • Keith B. Anderson & Erik Durbin & Michael A. Salinger, 2008. "Identity Theft," Journal of Economic Perspectives, American Economic Association, vol. 22(2), pages 171-192, Spring.
  • Handle: RePEc:aea:jecper:v:22:y:2008:i:2:p:171-192
    Note: DOI: 10.1257/jep.22.2.171
    as

    Download full text from publisher

    File URL: http://www.aeaweb.org/articles.php?doi=10.1257/jep.22.2.171
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Robert M. Hunt, 2005. "A century of consumer credit reporting in America," Working Papers 05-13, Federal Reserve Bank of Philadelphia.
    2. Julia S. Cheney, 2005. "Identity theft: do definitions still matter?," Consumer Finance Institute discussion papers 05-10, Federal Reserve Bank of Philadelphia.
    3. Jack Hirshleifer, 1983. "From weakest-link to best-shot: The voluntary provision of public goods," Public Choice, Springer, vol. 41(3), pages 371-386, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Shewangu Dzomira, 2017. "Plastic Money and Electronic Banking Services Espousal vis-a-viz Financial Identity Theft Fraud Risk Awareness in a Developing Country," Journal of Economics and Behavioral Studies, AMH International, vol. 9(5), pages 255-264.
    2. Roberds, William & Schreft, Stacey L., 2009. "Data breaches and identity theft," Journal of Monetary Economics, Elsevier, vol. 56(7), pages 918-929, October.
    3. Florian Morath & Johannes Münster, 2018. "Online Shopping and Platform Design with Ex Ante Registration Requirements," Management Science, INFORMS, vol. 64(1), pages 360-380, January.
    4. Kyoung-Soo Yoon & Jooyong Jun, 2016. "Liability, Information, and Anti-fraud Investment in a Layered Retail Payment Structure," Working Papers 2016-12, Economic Research Institute, Bank of Korea.
    5. Giannetti, Caterina & Jentzsch, Nicola, 2013. "Credit reporting, financial intermediation and identification systems: International evidence," Journal of International Money and Finance, Elsevier, vol. 33(C), pages 60-80.
    6. Philip E. Graves & Robert L. Sexton, 2017. "Optimal Public Policy Against Identity Theft," The American Economist, Sage Publications, vol. 62(2), pages 217-221, October.
    7. Caterina Giannetti & Nicola Jentzsch, 2011. "Credit Reporting, Access to Finance and Identification Systems: International Evidence," Jena Economics Research Papers 2011-031, Friedrich-Schiller-University Jena.
    8. William Roberds & Stacey L. Schreft, 2009. "Data security, privacy, and identity theft: The economics behind the policy debates," Economic Perspectives, Federal Reserve Bank of Chicago, vol. 33(Q I), pages 22-30.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kyoung-Soo Yoon & Jooyong Jun, 2016. "Liability, Information, and Anti-fraud Investment in a Layered Retail Payment Structure," Working Papers 2016-12, Economic Research Institute, Bank of Korea.
    2. William Roberds & Stacey L. Schreft, 2009. "Data security, privacy, and identity theft: The economics behind the policy debates," Economic Perspectives, Federal Reserve Bank of Chicago, vol. 33(Q I), pages 22-30.
    3. Subhasish M. Chowdhury & Iryna Topolyan, 2013. "The Attack-and-Defence Group Contests," University of East Anglia Applied and Financial Economics Working Paper Series 049, School of Economics, University of East Anglia, Norwich, UK..
    4. Camacho, Carmen & Hassan, Waleed, 2023. "The dynamics of revolution: Discrimination, social unrest and the optimal timing of revolution," Economic Modelling, Elsevier, vol. 128(C).
    5. Daniel E. O'Leary, 2018. "DNA Mining and genealogical information systems: Not just for finding family ethnicity," Intelligent Systems in Accounting, Finance and Management, John Wiley & Sons, Ltd., vol. 25(4), pages 190-196, October.
    6. Atallah, Shadi S. & Huang, Ju-Chin & Leahy, Jessica & Bennett, Karen, 2020. "Preference Heterogeneity and Neighborhood Effect in Invasive Species Control: The Case of Glossy Buckthorn in New Hampshire and Maine Forests," 2020 Annual Meeting, July 26-28, Kansas City, Missouri 304623, Agricultural and Applied Economics Association.
    7. Luca Dall’Asta & Paolo Pin & Abolfazl Ramezanpour, 2011. "Optimal Equilibria of the Best Shot Game," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 13(6), pages 885-901, December.
    8. Alejandro Caparrós & Michael Finus, 2020. "Public good agreements under the weakest‐link technology," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 22(3), pages 555-582, June.
    9. Le Maux, Benoit & Rocaboy, Yvon, 2012. "A simple microfoundation for the utilization of fragmentation indexes to measure the performance of a team," Economics Letters, Elsevier, vol. 116(3), pages 491-493.
    10. Conybeare, John A C & Murdoch, James C & Sandler, Todd, 1994. "Alternative Collective-Goods Models of Military Alliances: Theory and Empirics," Economic Inquiry, Western Economic Association International, vol. 32(4), pages 525-542, October.
    11. Kamijo, Yoshio, 2016. "Rewards versus punishments in additive, weakest-link, and best-shot contests," Journal of Economic Behavior & Organization, Elsevier, vol. 122(C), pages 17-30.
    12. Rémy Delille & Jean-Christophe Pereau, 2014. "The Seawall Bargaining Game," Games, MDPI, vol. 5(2), pages 1-13, June.
    13. Louis Rouanet, 2024. "On the tendency of revolutions to devour their own children," Public Choice, Springer, vol. 200(3), pages 603-626, September.
    14. Alessandra Cepparulo & Luisa Giuriato, 2012. "Global Challenges and Country-Specific Responses through Aid Financing of Global Public Goods," Working Papers in Public Economics 156, University of Rome La Sapienza, Department of Economics and Law.
    15. Henrik Orzen, 2005. "Fundraising through Competition: Evidence from the Lab," Discussion Papers 2005-04, The Centre for Decision Research and Experimental Economics, School of Economics, University of Nottingham.
    16. Ziyi Chen & Kaiyan Dai & Xing Jin & Liqin Hu & Yongheng Wang, 2023. "Aspiration-Based Learning in k -Hop Best-Shot Binary Networked Public Goods Games," Mathematics, MDPI, vol. 11(14), pages 1-19, July.
    17. Todd Sandler, 2009. "Intergenerational Public Goods: Transnational Considerations," Scottish Journal of Political Economy, Scottish Economic Society, vol. 56(3), pages 353-370, July.
    18. Nikolai Kukushkin, 2015. "The single crossing conditions for incomplete preferences," International Journal of Game Theory, Springer;Game Theory Society, vol. 44(1), pages 225-251, February.
    19. Stefanie Gerke & Gregory Gutin & Sung-Ha Hwang & Philip Neary, 2019. "Public goods in networks with constraints on sharing," Papers 1905.01693, arXiv.org, revised Jun 2023.
    20. Jean Hindriks & Yukihiro Nishimura, 2021. "Taxing multinationals: The scope for enforcement cooperation," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 23(3), pages 487-509, June.

    More about this item

    JEL classification:

    • E42 - Macroeconomics and Monetary Economics - - Money and Interest Rates - - - Monetary Sytsems; Standards; Regimes; Government and the Monetary System
    • K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aea:jecper:v:22:y:2008:i:2:p:171-192. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Michael P. Albert (email available below). General contact details of provider: https://edirc.repec.org/data/aeaaaea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.