Download full text from publisher
References listed on IDEAS
- Julia S. Cheney, 2005. "Identity theft: do definitions still matter?," Payment Cards Center Discussion Paper 05-10, Federal Reserve Bank of Philadelphia.
- Jack Hirshleifer, 1983. "From weakest-link to best-shot: The voluntary provision of public goods," Public Choice, Springer, vol. 41(3), pages 371-386, January.
CitationsCitations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
- Charles M. Kahn & José M. Liñares-Zegarra, 2016. "Identity Theft and Consumer Payment Choice: Does Security Really Matter?," Journal of Financial Services Research, Springer;Western Finance Association, vol. 50(1), pages 121-159, August.
- Giannetti, Caterina & Jentzsch, Nicola, 2013. "Credit reporting, financial intermediation and identification systems: International evidence," Journal of International Money and Finance, Elsevier, vol. 33(C), pages 60-80.
- Caterina Giannetti & Nicola Jentzsch, 2011. "Credit Reporting, Access to Finance and Identification Systems: International Evidence," Jena Economic Research Papers 2011-031, Friedrich-Schiller-University Jena.
- Roberds, William & Schreft, Stacey L., 2009. "Data breaches and identity theft," Journal of Monetary Economics, Elsevier, vol. 56(7), pages 918-929, October.
- Florian Morath & Johannes Muenster, 2014. "Online Shopping and Platform Design with Ex Ante Registration Requirements," Working Papers tax-mpg-rps-2014-21, Max Planck Institute for Tax Law and Public Finance.
- William Roberds & Stacey L. Schreft, 2009. "Data security, privacy, and identity theft: The economics behind the policy debates," Economic Perspectives, Federal Reserve Bank of Chicago, issue Q I, pages 22-30.
More about this item
- E42 - Macroeconomics and Monetary Economics - - Money and Interest Rates - - - Monetary Sytsems; Standards; Regimes; Government and the Monetary System
- K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
StatisticsAccess and download statistics
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aea:jecper:v:22:y:2008:i:2:p:171-192. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Jane Voros) or (Michael P. Albert). General contact details of provider: http://edirc.repec.org/data/aeaaaea.html .
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.