{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T05:56:46Z","timestamp":1773554206913,"version":"3.50.1"},"reference-count":42,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T00:00:00Z","timestamp":1630281600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2022,3,29]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Tax Identity Theft involves the illegal use of a potential taxpayer\u2019s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The victim is the real owner of the social security number who will have difficulties getting a tax refund, as the offender has already taken a refund for the year in question. This paper aims to investigate whether the increased use and adoption of electronic tax filing (i.e. E-Filing) technologies has inadvertently resulted in a corresponding growth in Tax Identity Theft.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Multiple regressions are used to analyze the data that is extracted from the Identity Theft complaint reports (maintained by the Federal Trade Commission) and the tax filing statistics (retrieved from the Internal Revenue Service).<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The results indicate that E-Filing can indirectly but significantly increase Tax Identity Theft through the full mediation effects of individual Self-E-Filing and Direct Deposit adoption, after controlling for general Identity Theft, the number of Individual Tax Returns and Total Refunds.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The authors explore the association between the adoption of tax e-filing technologies and Tax Identity Theft. The findings suggest that the key loopholes in the Tax Identity Theft process are at the Self-E-Filing and the Direct Deposit points. Several practical recommendations for patching these loopholes are provided and discussed.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-05-2021-0056","type":"journal-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T07:24:39Z","timestamp":1630049079000},"page":"173-189","source":"Crossref","is-referenced-by-count":1,"title":["Reducing tax identity theft by identifying vulnerability points in the electronic tax filing process"],"prefix":"10.1108","volume":"30","author":[{"given":"Benjamin K.","family":"Ngugi","sequence":"first","affiliation":[]},{"given":"Kuo-Ting","family":"Hung","sequence":"additional","affiliation":[]},{"given":"Yuanxiang John","family":"Li","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,8,30]]},"reference":[{"issue":"2","key":"key2022032616312419800_ref001","first-page":"104","article-title":"Some unintended consequences of information technology in health care: the nature of patient care information system-related errors","volume":"11","year":"2004","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"6","key":"key2022032616312419800_ref002","doi-asserted-by":"crossref","first-page":"1173","DOI":"10.1037\/0022-3514.51.6.1173","article-title":"The moderator\u2013mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations","volume":"51","year":"1986","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2022032616312419800_ref003","volume-title":"Corporate Computer Security","year":"2015"},{"key":"key2022032616312419800_ref004","volume-title":"2021 Identity Fraud Study: Shifting Angles","year":"2021"},{"issue":"1","key":"key2022032616312419800_ref005","first-page":"233","article-title":"Part VI: Privacy and the state","volume":"68","year":"2001","journal-title":"Social Research: An International Quarterly"},{"issue":"2","key":"key2022032616312419800_ref006","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s10796-017-9755-1","article-title":"The quest for complete security: an empirical analysis of users\u2019 multi-layered protection from security threats","volume":"21","year":"2019","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"key2022032616312419800_ref007","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","article-title":"Facebook and online privacy: Attitudes, behaviors, and unintended consequences","volume":"15","year":"2009","journal-title":"Journal of Computer-Mediated Communication"},{"key":"key2022032616312419800_ref008","article-title":"E-filing and e-payments \u2013 the way forward","year":"2008"},{"key":"key2022032616312419800_ref009","volume-title":"Introduction to Statistical Pattern Recognition","year":"1990"},{"issue":"4","key":"key2022032616312419800_ref010","first-page":"1","article-title":"Forecasting identity theft victims: Analyzing characteristics and preventive actions through machine learning approaches","volume":"16","year":"2020","journal-title":"Victims and Offenders"},{"key":"key2022032616312419800_ref011","article-title":"Internal revenue service restructuring and reform act of 1998","author":"Internal Revenue Service Restructuring and Reform Act of 1998","year":"1998"},{"issue":"3","key":"key2022032616312419800_ref012","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/j.is.2010.11.003","article-title":"The dark side of the internet: Attacks, costs and responses","volume":"36","year":"2011","journal-title":"Information Systems Research"},{"key":"key2022032616312419800_ref013","article-title":"IRS: Crooks stole data on 100k taxpayers via 'get transcript' feature","year":"2015"},{"issue":"1","key":"key2022032616312419800_ref014","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s10796-010-9270-0","article-title":"Identity matching using personal and social identity features","volume":"13","year":"2011","journal-title":"Information Systems Frontiers"},{"issue":"6","key":"key2022032616312419800_ref015","doi-asserted-by":"crossref","first-page":"894","DOI":"10.2307\/2084615","article-title":"The unanticipated consequences of purposive social action","volume":"1","year":"1936","journal-title":"American Sociological Review"},{"issue":"2","key":"key2022032616312419800_ref016","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1111\/j.1745-6606.2004.tb00865.x","article-title":"Consumers\u2019 protection of online privacy and identity","volume":"38","year":"2004","journal-title":"Journal of Consumer Affairs"},{"issue":"1","key":"key2022032616312419800_ref017","first-page":"46","article-title":"Combating credit card fraud with online behavioural targeting and device fingerprinting","volume":"11","year":"2017","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"key2022032616312419800_ref018","article-title":"Americans plan to spend a little, save a little with tax refunds this year, according to NRF survey","author":"National Retail Foundation","year":"2011"},{"key":"key2022032616312419800_ref019","volume-title":"Economics","year":"2009"},{"key":"key2022032616312419800_ref020","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.cose.2015.11.001","article-title":"Taxonomy of information security risk assessment (ISRA)","volume":"57","year":"2016","journal-title":"Computers and Security"},{"issue":"4","key":"key2022032616312419800_ref021","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1080\/15564886.2016.1211404","article-title":"Understanding how the internet facilitates crime and deviance","volume":"11","year":"2016","journal-title":"Victims and Offenders"},{"key":"key2022032616312419800_ref022","article-title":"The identity theft and assumption deterrence act of 1998","author":"The identity theft and assumption deterrence act of 1998","year":"1998"},{"key":"key2022032616312419800_ref023","article-title":"Consumer fraud and identity theft complaint data for January-December 2006","volume-title":"in US Federal Trade Commission (Ed)","author":"US Federal Trade Commission","year":"2007"},{"key":"key2022032616312419800_ref024","article-title":"Consumer sentinel network databook for January-December 2014","author":"US Federal Trade Commission","year":"2015"},{"key":"key2022032616312419800_ref025","article-title":"Consumer sentinel network data book for January-December 2015","author":"US Federal Trade Commission","year":"2016"},{"key":"key2022032616312419800_ref026","article-title":"Identity theft: Greater awareness and use of existing data are needed","author":"US Government Accountability Office","year":"2002"},{"key":"key2022032616312419800_ref027","article-title":"Identity theft: Total extent of refund fraud using stolen identities is unknown","author":"US Government Accountability Office","year":"2012"},{"key":"key2022032616312419800_ref028","article-title":"Enhanced authentication could combat refund fraud, but IRS lacks an estimate of costs, benefits and risks","author":"US Government Accountability Office","year":"2015"},{"key":"key2022032616312419800_ref029","article-title":"Taxpayer guide to identity theft","author":"US Internal Revenue Service","year":"2013"},{"key":"key2022032616312419800_ref030","article-title":"IRS releases the \"dirty dozen\" tax scams for 2014; identity theft, phone scams lead list","author":"US Internal Revenue Service","year":"2014"},{"key":"key2022032616312419800_ref031","article-title":"2015 And prior year filing season statistics","author":"US Internal Revenue Service","year":"2015"},{"key":"key2022032616312419800_ref032","article-title":"Free file: I will choose a free file software","author":"US Internal Revenue Service","year":"2015"},{"key":"key2022032616312419800_ref033","article-title":"Taxpayer guide to identity theft","author":"US Internal Revenue Service","year":"2016"},{"key":"key2022032616312419800_ref034","article-title":"2019 Filing season statistics","author":"US Internal Revenue Service","year":"2019"},{"key":"key2022032616312419800_ref035","article-title":"The dirty dozen represents the worst of the worst tax scams","author":"US Internal Revenue Service","year":"2019"},{"key":"key2022032616312419800_ref036","article-title":"Filing season statistics for week ending may 10, 2019","author":"US Internal Revenue Service","year":"2019"},{"key":"key2022032616312419800_ref037","article-title":"There are billions of dollars in undetected tax refund fraud resulting from identity theft","author":"US Treasury Inspector General for Tax Administration","year":"2012"},{"key":"key2022032616312419800_ref038","article-title":"Detection has improved; however, identity theft continues to result in billions of dollars in potentially fraudulent tax refunds","author":"US Treasury Inspector General for Tax Administration","year":"2013"},{"key":"key2022032616312419800_ref039","article-title":"Efforts are resulting in the improved identification of fraudulent tax returns involving identity theft","author":"US Treasury Inspector General for Tax Administration","year":"2015"},{"issue":"4","key":"key2022032616312419800_ref040","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1287\/isre.11.4.342.11872","article-title":"Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model","volume":"11","year":"2000","journal-title":"Information Systems Research"},{"key":"key2022032616312419800_ref041","unstructured":"Weisman, S. (2015), \u201cProtect yourself from income tax identity theft\u201d, USA TODAY."},{"key":"key2022032616312419800_ref042","volume-title":"The Best Tax Software for 2015","year":"2015"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-05-2021-0056\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-05-2021-0056\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:56Z","timestamp":1753406576000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/30\/2\/173-189\/111634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,30]]},"references-count":42,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,8,30]]},"published-print":{"date-parts":[[2022,3,29]]}},"alternative-id":["10.1108\/ICS-05-2021-0056"],"URL":"https:\/\/doi.org\/10.1108\/ics-05-2021-0056","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2021,8,30]]}}}