Eccesso di fiducia, eccessiva alfabetizzazione. Lo stigma del furto di identità online sugli utenti esperti

Journal title SICUREZZA E SCIENZE SOCIALI
Author/s Annalisa Plava
Publishing Year 2024 Issue 2024/2
Language English Pages 14 P. 128-141 File size 211 KB
DOI 10.3280/SISS2024-002010
DOI is like a bar code for intellectual property: to have more infomation click here

Below, you can see the article first page

If you want to buy this article in PDF format, you can do it, following the instructions to buy download credits

Article preview

FrancoAngeli is member of Publishers International Linking Association, Inc (PILA), a not-for-profit association which run the CrossRef service enabling links to and from online scholarly content.

Progress and digital transformation of the society have provided criminals with new opportunities to obtain and misuse personal identity information. The emer-gence and spread of online identity theft (OIDT) is an example of this. Very little is known about the profile, needs and experiences of people whose identity informa-tion has been compromised or misused. OIDT European victims often do not re-port the crime. But the negative experience hides important resistance in psycho-social perception. With the aim of analysing the impact of OIDT in different Euro-pean countries, but also to profile victims, this article will show how: (1) OIDT af-fects also expert users; (2) the OIDT-related stigma creates a “constructed” fragili-ty in these victims; (3) the higher the degree of confidence and digital literacy, the bigger the perception of stigma and the fear experiencing a secondary victimisa-tion.

Keywords: Online Identity Theft; cybercrime; stigma; secondary victimisation; approach to treatment.

  1. Beck U. (2000). La società del rischio. Verso una seconda modernità. Roma: Carocci.
  2. Benzecry C., Collins R. (2014). The high of cultural experience: Toward a microsociology of cultural consumption. Sociological Theory, 32, 4: 307-326.
  3. Clarke R., Greenleaf G. (2017). Dataveillance regulation: A research framework. JL Inf. & Sci., 25: 104.
  4. Couldry, N. (2023). On Social Media, Solidarity, and the Catastrophe of Climate Change. Social Media + Society, vol. 9, 2. DOI: 10.1177/20563051231177907
  5. Cross C. (2018). Denying victim status to online fraud victims: the challenges of being a ‘non-ideal victim’. In: Duggan M., ed. Revisiting the “Ideal Victim”: Developments in Critical Victimology. Bristol: Policy Press, 243-262.
  6. Döringer S. (2021). “The problem-centred expert interview”. Combining qualitative interviewing approaches for investigating implicit expert knowledge. International Journal of Social Research Methodology, vol. 24, 3: 265-278. DOI: 10.1080/13645579.2020.1766777
  7. Fanci G. (2012). La vittimizzazione secondaria: ambiti di ricerca, teorizzazioni e scenari. Rivista di criminologia, vittimologia e sicurezza, vol. V, 53-66.
  8. Floridi L. (2021). Digital time: latency, real-time, and the onlife experience of everyday time. Philosophy & Technology, vol. 34, 3: 407-412.
  9. Goffman E. (2009). L’interazione strategica. Bologna: Il Mulino.
  10. Goffman E. (2018). Stigma. Note sulla gestione dell’identità degradata. Verona: Ombre Corte.
  11. Guedes I., Martins M., Cardoso C.S. (2023). Exploring the determinants of victimization and fear of online identity theft: an empirical study. Secur J, 36: 472-497.
  12. McDonald N., Forte A. (2022). Privacy and vulnerable populations. In: Knijnenburg B.P., Page X., Wisniewski P., Lipford H.R., Proferes N., Romano J., eds. Modern socio-technical perspectives on privacy. Cham: Springer International Publishing, 337-363.
  13. Palumbo M., Garbarino E. (2022). Ricerca sociale: metodo e tecniche. Milano: FrancoAngeli.
  14. Philip G., Rogers C., Weller S. (2012). Understanding care and thinking with care. In: Rogers C., Weller S., eds. Critical Approaches to Care. London: Routledge, 1-12.
  15. Rainie L., Wellman B. (2019). The Internet in Daily Life: The Turn to Networked Individualism. In: Graham M., Dutton W.H., eds. Society and the Internet: How Networks of Information and Communication are Changing Our Lives. Oxford: Oxford Academic.
  16. Reinka M.A., Pan‐Weisz B., Lawner E.K., Quinn D.M. (2020). Cumulative consequences of stigma: Possessing multiple concealable stigmatized identities is associated with worse quality of life. Journal of Applied Social Psychology, vol. 50, 4: 253-261.
  17. Reyns B.W. (2017). Routine activity theory and cybercrime: A theoretical appraisal and literature review. Technocrime and criminological theory, 35-54.
  18. Reyns B.W., Fisher B.S., Bossler A.M., Holt T.J. (2019). Opportunity and self-control: Do they predict multiple forms of online victimization? American Journal of Criminal Justice, 44: 63-82.
  19. Teixeira A.C., Beutler D.L., Trentin M.A.S., Folle D. (2017). Complexities of Cyberculture in Pierre Lévy and Developments in Education. Creative Education, vol. 8, 1: 119-130.
  20. Wellford C.F., Triplett R.A. (2023). The future of labeling theory: Foundations and promises. In: Adler F., Laufer W.F., eds. New directions in criminological theory. London: Routledge: 1-22.

Annalisa Plava, Overconfidence, overliteracy. Online IDentity Theft stigma on the expert users in "SICUREZZA E SCIENZE SOCIALI" 2/2024, pp 128-141, DOI: 10.3280/SISS2024-002010