
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Differentiating identity theft: An exploratory study of victims using a national victimization survey
Heith Copes, Kent R. Kerley, Rodney Huff, et al.
Journal of Criminal Justice (2010) Vol. 38, Iss. 5, pp. 1045-1052
Closed Access | Times Cited: 83
Heith Copes, Kent R. Kerley, Rodney Huff, et al.
Journal of Criminal Justice (2010) Vol. 38, Iss. 5, pp. 1045-1052
Closed Access | Times Cited: 83
Showing 1-25 of 83 citing articles:
Scaling the Security Wall
Serge Egelman, Eyal Péer
(2015), pp. 2873-2882
Closed Access | Times Cited: 217
Serge Egelman, Eyal Péer
(2015), pp. 2873-2882
Closed Access | Times Cited: 217
A supervised machine learning algorithm for detecting and predicting fraud in credit card transactions
Jonathan Kwaku Afriyie, Kassim Tawiah, Wilhemina Adoma Pels, et al.
Decision Analytics Journal (2023) Vol. 6, pp. 100163-100163
Open Access | Times Cited: 81
Jonathan Kwaku Afriyie, Kassim Tawiah, Wilhemina Adoma Pels, et al.
Decision Analytics Journal (2023) Vol. 6, pp. 100163-100163
Open Access | Times Cited: 81
The Consequences of Identity Theft Victimization: An Examination of Emotional and Physical Health Outcomes
Katelyn A. Golladay, Kristy Holtfreter
Victims & Offenders (2016) Vol. 12, Iss. 5, pp. 741-760
Closed Access | Times Cited: 96
Katelyn A. Golladay, Kristy Holtfreter
Victims & Offenders (2016) Vol. 12, Iss. 5, pp. 741-760
Closed Access | Times Cited: 96
Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking
Steve van de Weijer, Rutger Leukfeldt, Wim Bernasco
European Journal of Criminology (2018) Vol. 16, Iss. 4, pp. 486-508
Open Access | Times Cited: 87
Steve van de Weijer, Rutger Leukfeldt, Wim Bernasco
European Journal of Criminology (2018) Vol. 16, Iss. 4, pp. 486-508
Open Access | Times Cited: 87
Perceptions of White-Collar Crime Seriousness: Unpacking and Translating Attitudes into Policy Preferences
Sally S. Simpson, Miranda A. Galvin, Thomas A. Loughran, et al.
Journal of Research in Crime and Delinquency (2022) Vol. 60, Iss. 5, pp. 582-622
Closed Access | Times Cited: 43
Sally S. Simpson, Miranda A. Galvin, Thomas A. Loughran, et al.
Journal of Research in Crime and Delinquency (2022) Vol. 60, Iss. 5, pp. 582-622
Closed Access | Times Cited: 43
Modeling and analysis of identity threat behaviors through text mining of identity theft stories
Razieh Nokhbeh Zaeem, Monisha Manoharan, Yongpeng Yang, et al.
Computers & Security (2016) Vol. 65, pp. 50-63
Closed Access | Times Cited: 61
Razieh Nokhbeh Zaeem, Monisha Manoharan, Yongpeng Yang, et al.
Computers & Security (2016) Vol. 65, pp. 50-63
Closed Access | Times Cited: 61
Secure User Authentication Using Honeywords
Palaniappan Sambandam, V. Parthipan, S. Kirubakaran, et al.
Lecture notes on data engineering and communications technologies (2019), pp. 896-903
Closed Access | Times Cited: 61
Palaniappan Sambandam, V. Parthipan, S. Kirubakaran, et al.
Lecture notes on data engineering and communications technologies (2019), pp. 896-903
Closed Access | Times Cited: 61
Identity fraud victimization: a critical review of the literature of the past two decades
Yasemin Irvin-Erickson
Crime Science (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 7
Yasemin Irvin-Erickson
Crime Science (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 7
Nonfinancial Consequences of Identity Theft Revisited: Examining the Association of Out-of-Pocket Losses With Physical or Emotional Distress and Behavioral Health
Cooper A. Maher, Brittany E. Hayes
Criminal Justice and Behavior (2024) Vol. 51, Iss. 3, pp. 459-481
Closed Access | Times Cited: 6
Cooper A. Maher, Brittany E. Hayes
Criminal Justice and Behavior (2024) Vol. 51, Iss. 3, pp. 459-481
Closed Access | Times Cited: 6
The Dark Figure of Online Property Crime: Is Cyberspace Hiding a Crime Wave?
Maria Tcherni‐Buzzeo, Andrew Davies, Graham Lopes, et al.
Justice Quarterly (2015) Vol. 33, Iss. 5, pp. 890-911
Open Access | Times Cited: 62
Maria Tcherni‐Buzzeo, Andrew Davies, Graham Lopes, et al.
Justice Quarterly (2015) Vol. 33, Iss. 5, pp. 890-911
Open Access | Times Cited: 62
Cyber Victimization on College Campuses
Michelle F. Wright
Criminal Justice Review (2016) Vol. 41, Iss. 2, pp. 190-203
Closed Access | Times Cited: 53
Michelle F. Wright
Criminal Justice Review (2016) Vol. 41, Iss. 2, pp. 190-203
Closed Access | Times Cited: 53
The Use of Military Profiles in Romance Fraud Schemes
Cassandra Cross, Thomas J. Holt
Victims & Offenders (2021) Vol. 16, Iss. 3, pp. 385-406
Open Access | Times Cited: 35
Cassandra Cross, Thomas J. Holt
Victims & Offenders (2021) Vol. 16, Iss. 3, pp. 385-406
Open Access | Times Cited: 35
Examining the Association Between Citizenship and Ethnicity on Identity Theft Risk: Findings from the National Crime Victimization Survey
Cooper A. Maher
American Journal of Criminal Justice (2024) Vol. 49, Iss. 3, pp. 400-421
Closed Access | Times Cited: 5
Cooper A. Maher
American Journal of Criminal Justice (2024) Vol. 49, Iss. 3, pp. 400-421
Closed Access | Times Cited: 5
Afraid of the Unknown: Crypto Literacy and Fear of Online Fraud
Timothy A. Engle, Cooper A. Maher, Michael Jones
Journal of Economic Criminology (2025), pp. 100135-100135
Open Access
Timothy A. Engle, Cooper A. Maher, Michael Jones
Journal of Economic Criminology (2025), pp. 100135-100135
Open Access
Identity Theft and Consumer Payment Choice: Does Security Really Matter?
Charles M. Kahn, José Manuel Liñares-Zegarra
Journal of Financial Services Research (2015) Vol. 50, Iss. 1, pp. 121-159
Closed Access | Times Cited: 44
Charles M. Kahn, José Manuel Liñares-Zegarra
Journal of Financial Services Research (2015) Vol. 50, Iss. 1, pp. 121-159
Closed Access | Times Cited: 44
The Physical and Emotional Toll of Identity Theft Victimization: A Situational and Demographic Analysis of the National Crime Victimization Survey
Ryan Randa, Bradford W. Reyns
Deviant Behavior (2019) Vol. 41, Iss. 10, pp. 1290-1304
Closed Access | Times Cited: 37
Ryan Randa, Bradford W. Reyns
Deviant Behavior (2019) Vol. 41, Iss. 10, pp. 1290-1304
Closed Access | Times Cited: 37
Responding to identity theft: A victimization perspective
Yuan Li, Adel Yazdanmehr, Jingguo Wang, et al.
Decision Support Systems (2019) Vol. 121, pp. 13-24
Open Access | Times Cited: 33
Yuan Li, Adel Yazdanmehr, Jingguo Wang, et al.
Decision Support Systems (2019) Vol. 121, pp. 13-24
Open Access | Times Cited: 33
The Financial and Psychological Impact of Identity Theft Among Older Adults
Marguerite DeLiema, David Burnes, Lynn Langton
Innovation in Aging (2021) Vol. 5, Iss. 4
Open Access | Times Cited: 23
Marguerite DeLiema, David Burnes, Lynn Langton
Innovation in Aging (2021) Vol. 5, Iss. 4
Open Access | Times Cited: 23
A Black Box Warning: The Marginalization of White-Collar Crime Victimization
Mary Dodge
Journal of White Collar and Corporate Crime (2019) Vol. 1, Iss. 1, pp. 24-33
Open Access | Times Cited: 24
Mary Dodge
Journal of White Collar and Corporate Crime (2019) Vol. 1, Iss. 1, pp. 24-33
Open Access | Times Cited: 24
Fraud reporting in Catalonia in the Internet era: Determinants and motives
Steven Kemp
European Journal of Criminology (2020) Vol. 19, Iss. 5, pp. 994-1015
Closed Access | Times Cited: 21
Steven Kemp
European Journal of Criminology (2020) Vol. 19, Iss. 5, pp. 994-1015
Closed Access | Times Cited: 21
Investigating identity fraud management practices in e-tail sector: a systematic review
Zahoor Ahmed Soomro, Javed Ahmed, Mahmood Shah, et al.
Journal of Enterprise Information Management (2019) Vol. 32, Iss. 2, pp. 301-324
Open Access | Times Cited: 18
Zahoor Ahmed Soomro, Javed Ahmed, Mahmood Shah, et al.
Journal of Enterprise Information Management (2019) Vol. 32, Iss. 2, pp. 301-324
Open Access | Times Cited: 18
Identity theft in the internet age: Evidence from the U.S. states
Rajeev K. Goel
Managerial and Decision Economics (2019) Vol. 40, Iss. 2, pp. 169-175
Closed Access | Times Cited: 17
Rajeev K. Goel
Managerial and Decision Economics (2019) Vol. 40, Iss. 2, pp. 169-175
Closed Access | Times Cited: 17
Preventing Identity Theft: Perspectives on Technological Solutions from Industry Insiders
Nicole Leeper Piquero, Alex R. Piquero, Stephen V. Gies, et al.
Victims & Offenders (2021) Vol. 16, Iss. 3, pp. 444-463
Open Access | Times Cited: 13
Nicole Leeper Piquero, Alex R. Piquero, Stephen V. Gies, et al.
Victims & Offenders (2021) Vol. 16, Iss. 3, pp. 444-463
Open Access | Times Cited: 13
‘But I’ve never sent them any personal details apart from my driver’s licence number …’: Exploring seniors’ attitudes towards identity crime
Cassandra Cross
Security Journal (2015) Vol. 30, Iss. 1, pp. 74-88
Closed Access | Times Cited: 15
Cassandra Cross
Security Journal (2015) Vol. 30, Iss. 1, pp. 74-88
Closed Access | Times Cited: 15
The Role of Victim Services for Individuals Who Have Experienced Serious Identity-Based Crime
Brandn Green, Stephen V. Gies, Amanda Bobnis, et al.
Victims & Offenders (2020) Vol. 15, Iss. 6, pp. 720-743
Closed Access | Times Cited: 14
Brandn Green, Stephen V. Gies, Amanda Bobnis, et al.
Victims & Offenders (2020) Vol. 15, Iss. 6, pp. 720-743
Closed Access | Times Cited: 14