identity theft, identity fraud, phishing, computer crime


Identity theft and identity fraud represent the fastest-growing forms of computer crime, having significant consequences for individuals, corporations, and financial institutions. The advancement of science and technology has endangered personal security and created opportunities for criminals to easily and deceitfully obtain financial benefits or jeopardize the security of corporations and major financial institutions. As a relatively new form of computer crime, identity theft has necessitated the alignment of criminal legislation with the emerging situation. The goal of this paper is to clarify the terminological ambiguities present in this field and highlight the current relevance of the issues related to identity theft and fraud associated with identity theft. By reviewing relevant scientific literature and applying quantitative and qualitative content analysis, comparative analysis, and comparative and historical methods, we will emphasize the importance of clear and precise definitions of identity theft and its legal incrimination. We will point out the different forms of identity theft, the most common ways it occurs, the consequences it causes, and the possibilities for prevention. Research results have shown that identity theft is expanding and that there is a need for harmonizing joint measures at an international level. Also, based on the obtained results, we can conclude that it is necessary to undertake educational measures for vulnerable categories of the population to minimize the consequences of this form of crime. Practical implications of this research indicate the need for developing a greater number of studies in this field, with particular focus on specific forms of identity theft and identity fraud.


Download data is not yet available.


th UN Congress on Crime Prevention and Criminal Justice. (n.d.) Retrieved 15.4.2024. from https://www.unodc.org/documents/crimecongress/12th-CrimeCongress/Documents/A_CONF.213_18/V1053828e.pdf

Allison, S. F., Schuck, A. M., & Lersch, K. M. (2005). Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice, 33(1), 19-29. https://doi.org/10.1016/j.jcrimjus.2004.10.007

Beal, V. (2016). ”How to Defend Yourself Against Identity Theft”, Retrieved 13.4.2024.http://www.webopedia.com/DidYouKnow/Internet/2006/identity_theft.asp.

Beals, M., DeLiema, M., & Deevy, M. (2015). Framework for a taxonomy of fraud. Financial Fraud Research Center. https://www.finrafoundation.org/sites/finrafoundation/files/framework-taxonomy-fraud.pdf

Beltran, G. (2013), Trends in child identity theft. Identity theft resource center" Retrieved 14.5.2024 from www.idtheftcenter.org/Child-ID-Theft/trends-in-child-identity-theft.html.

Bjelajac, Ž. (2008). Korupcija kao vid organizovanog kriminala [Corruption as a form of organized crime]. Pravo – teorija i praksa, 25(3-4): 47–54.

Bjelajac, Ž. (2015). Korupcija kao izazov savremenog demokratskog društva [Corruption as a challenge of modern democratic society]. Kultura polisa 12(26): 43–57.

Bjelajac, Ž., Filipović, A. (2020). Internet addiction disorder (IAD) as a paradigm of lack of security culture. Kultura polisa, 17(43): 239–258.

Bourke, P., Ward, T. and Rose, C. (2012),Expertise and sexual offending: a preliminary empirical model" Journal of Interpersonal Violence, Vol. 27 No. 12, pp. 2391–2414. https://doi.org/10.1177/0886260511433513

Burnes, D., DeLiema, M., & Langton, L. (2020). Risk and protective factors of identity theft victimization in the United States. Preventive medicine reports, 17, 101058. https://doi.org/10.1016/j.pmedr.2020. 101058

CIFAS (2010), Identity Theft- Victims [Internet], The UKs Fraud Prevention Service (CIFAS), London.

Cole, S. A., & Pontell, H. N. (2006). “Dont be low hanging fruit”: Identity theft as moral panic. In Surveillance and security (pp. 125–147). Routledge. ISBN 9780203957257

Copes, H. & Vieraitis, L.M. (2012), Identity Thieves: Motives and Methods, Northeastern University Press, Boston.

Council of Europe (2013). Cybercrime Convention Committee – T-CY Guidance Note#4, Identity theft and phishing in relation to fraud, (n.d.) Retrieved 11.4.2024 from https://rm.coe.int/16802e7132.

Dinarević, M., & Softić, L. (2021). Razvoj, pojam i oblici cyber kriminala [Development, Concept and Forms of Cyber Crime]. Pregled: časopis za društvena pitanja/Periodical for social issues, 62(2), 125-141. UDK 004.738.5:343.9

Đukić, A. (2017). Bezbednost – Krađa identiteta-oblici, karakteristike i rasprostranjenost [Security – Identity Theft: Forms, Characteristics, and Prevalence], Interdisciplinarni naučni časopis Vojno delo br.3 /Interdisciplinary Scientific Journal Vojno delo no.3, DOI: 10.5937/ vojdelo1703099D

Filipović, A., Bjelajac, Ž., Merdović, B. & Stošić, L. (2023). Some Aspects of the Criminal Potential of Artificial Intelligence. PaKSoM 2023, 41-47. ISBN: 978-86-82602-02-6

Gill, M. (2017). Learning from Offenders: Some Iatrogenic Effect of Crime Prevention Measures. In: LeClerc, B., Savona, E. (eds) Crime Prevention in the 21st Century.Springer, Cham. https://doi.org/10.1007/978-3-319-27793-6_4

Golladay, K., & Holtfreter, K. (2017). The consequences of identity theft victimization:An examination of emotional and physical health outcomes. Victims & Offenders, 12(5), 741–760. https://doi.org/10.1080/15564886.2016.1177766

Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71-80). https://doi.org/10.1145/1102199.1102214

Gupta, C. M., & Kumar, D. (2020). Identity theft: a small step towards big financial crimes. Journal of Financial Crime, 27(3), 897-910. https://doi.org/10.1108/JFC-01-2020-0014

Identity Theft Resource Center. (2014). Identity theft: The aftermath 2013. Retrieved 14.5.2024. from http://www.idtheftcenter.org/images/surveys_studies/Aftermath2013.pdf

Ipsos-Reid (2006). Concern Over Identity Theft Is Changing Consumer Behaviour, Ipsos-Reid on Behalf of Capital One.

Jagatic, T., Johnson, N., Jakobsson, M., & Menczer, F. (2005). Phishing attacks using social networks. Indiana University Human Subject Study, 05-9892.

Javelin Strategy & Research, “2020 Identity Fraud Study: Genesis of the Identity Fraud Crisis” https://www.javelinstrategy.com /coverage-area/2020-identity-fraud-study-genesis-identity-fraudcrisis.

Komlen-Nikolić, L., Gvozdenović, R., Radulović, S., Milosavljević, A., Jeković, R., Živković, V., ... & Aleksić, I. (2010). Suzbijanje visokotehnološkog kriminala [Suppression of cybercrime]. Udruženje javnih tužilaca i zamenika javnih tužilaca Srbije/Association of Public Prosecutors and Deputy Public Prosecutors of Serbia, Beograd.

Krivični zakonik Republike Srbije, [Criminal Law] ”Službeni glasnik Republike Srbije” broj 85/2005, 88/2005-ispr., 107/2005-ispr., 72/2009, 111/2009, 121/2012, 104/2013, 108/2014 i 94/2016.

Kroll (2019). Global Fraud & Risk Report 2019/2020. https://www.kroll.com/en/insights/publications/global-fraud-andrisk- report-2019.

Manap, N. A., Rahim, A. A., & Taji, H. (2015). Cyberspace identity theft: An overview. Mediterranean Journal of Social Sciences, 6(4), 290. http://dx.doi.org/10.5901/mjss.2015.v6n4s3p290

Mercuri, R. T. (2006). Scoping identity theft. Communications of the ACM, 49(5), 17-21. https://doi.org/10.1145/1125944.1125961

Milošević, M., & Urošević, V. (2009). Krađa identiteta zloupotrebom informacionih tehnologija [Identity theft by misuse of information technologies]. Bezbednost u postmodernom ambijentu–zbornik radova–knjiga VI [Security in a postmodern environment– Proceedings–book VI], 53-64.

Newman, J. Q. (1999). Identity theft: The cybercrime of the millennium. Loompanics Unlimited.

Nikolić-Ristanović, V., & Konstantinović-Vilić, S. (2018). Kriminologija [Criminology]. Beograd: Prometej.

OECD Ministerial meeting on the future of the internet economy – Scoping paper on Online Identity Theft, Ministerial background report: DSTI/CP (2007)3/FINAL. (n.d.) Retrieved 15.4. 2024 from http://www.oecd.org/sti/40644196.pdf

Passel, J.S. (2006), The Size and Characteristics of the Unauthorized Migrant Population in the US. [Internet, Microsoft the Pew Hispanic Centre, Washington, DC https://www.procon.org/wpcontent/uploads/sites/40/immidoc6.pdf

Prlja, D., & Reljanović, M. (2009). Visokotehnološki kriminal–uporedna iskustva. [Cyber crime – comparative experiences], Strani pravni život, (3), 161–194. https://www.stranipravnizivot.rs/index.php/SPZ/issue/view/30

Prosch, M. (2009). Preventing identity theft throughout the data life cycle. Journal of Accountancy, 207(1), 58–62. https://doi.org/10.1080/15536548.2006.10855783

Roberts, L. D. (2008). Cyber-victimisation in Australia: Extent, impact on individuals and responses. Tasmanian Institute of Law Enforcement Studies. http://hdl.handle.net/20.500.11937/9773

Rocha, K. (2013), Medical Identity Theft: The Basics, The Identity Theft Resource Center.

Sproule, S., and N. Archer. (2007). Defining Identity Theft. Eighth World Congress on the Management of eBusiness, Toronto, IEEE. https://doi.org/10.1515/9780776619927

Stojanović, Z. (2010). „Krivičnopravni ekspanzionizam i zakonodavstvo Srbije“. [Criminal law expansionism and Serbian legislation], Stanje kriminaliteta u Srbiji i pravna sredstva reagovanja,(ur. Đ. Ignjatović), IV deo/State of crime in Serbia and legal means of response, (ed. Đ. Ignjatović, part IV, Beograd, 32-48.

Stojković Numanović, K., Merdović, B., & Živaljević, D. (2023). Forging payment cards and cybercrime. Pravo – Teorija I Praksa, 40(4)/Law – Theory and Practice, 40(4), 138–154. https://doi.org/10.5937/ptp2304138S

UNHCR (2007), Why Do People Move to Another Country? [Internet], The United Nations High Commissioner for Refugees UNHCR, Geneva.

Urošević, V., Ivanović, Z., & Uljanov, S. (2012). Mač u world wide webu [A sword in the world wide web], Beograd:Eternal mix.

Vilić, V. (2017). Cybercrime: Basic criminological characteristics and legislation. Lap - Lambert Academic Publishing – International Book Market Service Ltd., member of OmniScriptum Publishing Group. -166. ISBN 978-620-2-01800-5.

World Privacy Forum (2024). Medical Identity Theft, Retrieved 11.5.2024 from https://www.worldprivacyforum.org/category/med-id-theft/

Zakon o organizaciji i nadležnosti državnih organa za borbu protiv visokotehnološkog kriminala [Law on the Organization and Competence of State Bodies for the Fight against High-Tech Crime]”Službeni glasnik Republike Srbije/ Official Gazette of the Republic of Serbia” broj 61/2005 104/2009.

Zakon o organizaciji nadležnih organa u suzbijanju organizovanog kriminala, korupcije i drugih posebno teških krivičnih dela[Law on the organization of competent authorities in the fight against organized crime, corruption and other particularly serious crimes] „Službeni glasnik Republike Srbije/ Official Gazette of the Republic of Serbia“ br.42/02,27/03,39/03,67/03,29/04,58/04-dr. zakon/ state law, 45/05,61/ 05,72/09).

Zakonik o krivičnom postupku, [Criminal Procedure Code] “Službeni glasnik Republike Srbije” br. 72/2011, 101/2011, 121/2012, 32/2013, 45/2013, 55/2014, 35/2019, 27/2021 – odluka/ decision US i 62/2021 – odluka/decision US




How to Cite

Merdović , B., & Jovanović, B. (2024). UNDERSTANDING IDENTITY THEFT AND FRAUD . KULTURA POLISA, 21(2), 17–43. https://doi.org/10.51738/Kpolisa2024.21.2r.17mj


Most read articles by the same author(s)

1 2 > >>