{"id":1907,"date":"2007-02-01T00:00:00","date_gmt":"2007-02-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/01\/study-id-fraud-in-decline\/"},"modified":"2021-12-30T11:40:16","modified_gmt":"2021-12-30T11:40:16","slug":"study-id-fraud-in-decline","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/01\/study-id-fraud-in-decline\/","title":{"rendered":"Study: ID fraud in decline"},"content":{"rendered":"<p>Despite high-profile data breaches, identity fraud may be on the decline, according to a study released on Thursday.  The firm found that the percentage of the U.S. adult population that experience fraud dropped to 3.7 percent in 2006 from 4.0 percent in 2005.  The Javelin study found that the victim&#8217;s income played a major role in the fraud rate.  While Americans with incomes of more than $150,000 had a high rate of fraud, with 7.3 percent reporting incidents, they only took half as long to resolve fraud as victims whose income was less than $15,000.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;While identity fraud is still a serious criminal issue in the United States, (the) study points to significant identity fraud reduction as a direct result of changes in industry and consumer behaviors,&#8221; James Van Dyke, president and founder of Javelin, said in a statement announcing the results.<\/p>\n<p>In January, retail giant TJX Companies announced that data thieves had stolen an large number of its customers&#8217; credit-card information from a server that processed transactions.<\/p>\n<p>http:\/\/www.securityfocus.com\/brief\/423<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1907","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1907"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1907\/revisions"}],"predecessor-version":[{"id":4394,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1907\/revisions\/4394"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}