National Crime Victimization Survey: Identity Theft Supplement, [United States], 2018 (ICPSR 37923)
Version Date: Feb 15, 2023 View help for published
Principal Investigator(s): View help for Principal Investigator(s)
United States. Bureau of Justice Statistics
Series:
https://doi.org/10.3886/ICPSR37923.v2
Version V2 (see more versions)
Alternate Title View help for Alternate Title
Summary View help for Summary
The primary purpose of the Identity Theft Supplement (ITS) is to measure the prevalence of identity theft among persons, the characteristics of identity theft victims, and patterns of reporting to the police, credit bureaus, and other authorities. The ITS was also designed to collect important characteristics of identity theft such as how the victim's personal information was obtained; the physical, emotional and financial impact on victims; offender information; and the measures people take to avoid or minimize their risk of becoming an identity theft victim. The information is intended for use by policymakers, academic researchers, practitioners at the Federal, state and local levels, and special interest groups who are concerned with identity theft to make informed decisions concerning policies and programs. Responses are linked to the NCVS survey instrument responses for a more complete understanding of the individual's circumstances.
The 2018 Identity Theft Supplement (ITS) was the fifth implementation of this supplement to the annual NCVS to obtain specific information about identity theft-related victimization on a national level. Since the ITS is a supplement to the NCVS, it is conducted under the authority of title 34, United States Code, section 10132. Only Census employees sworn to preserve confidentiality may see the completed questionnaires.
Citation View help for Citation
Export Citation:
Funding View help for Funding
Subject Terms View help for Subject Terms
Geographic Coverage View help for Geographic Coverage
Smallest Geographic Unit View help for Smallest Geographic Unit
Region
Distributor(s) View help for Distributor(s)
Time Period(s) View help for Time Period(s)
Date of Collection View help for Date of Collection
Study Design View help for Study Design
The ITS was administered at the end of the NCVS interview for each eligible respondent. The 2018 ITS was conducted from January through June 2018. Each month the U.S. Census Bureau selects respondents for the NCVS using a "rotating panel" design. Households are randomly selected and all age-eligible individuals become part of the panel. The sample of households is divided into groups or rotations. Once in the sample, respondents are interviewed every six months for a total of seven interviews over a three-year period. The first interview is considered the incoming rotation. The second through the seventh interview are in the continuing rotations. The first interview is face-to-face; the rest are by telephone unless the circumstances call for an in-person interview. After the seventh interview the household leaves the panel and a new household is rotated into the sample. The rotation scheme is used to reduce respondent burden that may result if they were to remain permanently in the sample. The ITS was administered at all NCVS households interviewed from January through June 2018.
Sample View help for Sample
The ITS was administered at the end of the NCVS interview for each eligible respondent. The 2018 ITS was conducted from January through June 2018.
Each month the U.S. Census Bureau selects respondents for the NCVS using a "rotating panel" design. Households are randomly selected and all age-eligible individuals become part of the panel. The sample of households is divided into groups or rotations. Once in the sample, respondents are interviewed every six months for a total of seven interviews over a three-year period. The first interview is considered the incoming rotation. The second through the seventh interview are in the continuing rotations. The first interview is face- to-face; the rest are by telephone unless the circumstances call for an in-person interview. After the seventh interview, the household leaves the panel and a new household is rotated into the sample. The rotation scheme is used to reduce respondent burden that may result if they were to remain permanently in the sample.
Time Method View help for Time Method
Universe View help for Universe
The NCVS target population is individuals 12 years of age and older living in households and group quarters within the United States and the District of Columbia. The sample excludes persons who are homeless, crews of vessels, in institutions (e.g., prisons and nursing homes) or members of the armed forces living in military barracks. Interviews are translated for non-English speaking respondents. NCVS ITS interviews were conducted with each household member age 16 years old or older. No proxy interviews were allowed for the ITS. NCVS household members ages 16 years or older.
Unit(s) of Observation View help for Unit(s) of Observation
Data Type(s) View help for Data Type(s)
Mode of Data Collection View help for Mode of Data Collection
Description of Variables View help for Description of Variables
The identity theft supplement variables include the experience of the victims after their bank account/credit card were stolen. The data file also include variables extracted from regular NCVS: 1) all households containing ITS-eligible persons (interviewed and noninterviewed, incoming (unbounded) and continuing rotations) and 2) all ITS-eligible persons (interviewed and noninterviewed) within these households, and 3) all incidents reported by the ITS-eligible persons.
Response Rates View help for Response Rates
Of the 140,000 NCVS respondents eligible for the ITS supplement, 102,400 (73.2%) completed the ITS interview. The remaining 26.8% were noninterviews.
HideOriginal Release Date View help for Original Release Date
2021-04-05
Version History View help for Version History
2023-02-15 Edits were made to variable names and variable labels for consistency across the 2016, 2018, and 2021 National Crime Victimization Survey Identity Theft Supplement.
2021-04-05 ICPSR data undergo a confidentiality review and are altered when necessary to limit the risk of disclosure. ICPSR also routinely creates ready-to-go data files along with setups in the major statistical software formats as well as standard codebooks to accompany the data. In addition to these procedures, ICPSR performed the following processing steps for this data collection:
- Created variable labels and/or value labels.
- Standardized missing values.
- Checked for undocumented or out-of-range codes.
Name | Size | Preview | Download |
---|---|---|---|
DS1 National Crime Victimization Survey: Identity Theft Supplement, [United States], 2018 | 9 GB |
1ST PERSON'S HH COMPOSITION CODE (START 1996 Q1)
Q.16.b First Person's Household Composition Code Source code: 325
2ND PERSON'S HH COMPOSITION CODE (START 1996 Q1)
Q.16.d Second Person's Household Composition Code Source code: 327
2ND PERSON'S LINE NUMBER (START 1996 Q1)
Q.16.c Second Person's Line Number Source code: 326
3RD PERSON'S HH COMPOSITION CODE (START 1996 Q1)
Q.16.f Third Person's Household Composition Code Source code: 329
3RD PERSON'S LINE NUMBER (START 1996 Q1)
Q.16.e Third Person's Line Number Source code: 328
4TH PERSON'S HH COMPOSITION CODE (START 1996 Q1)
Q.16.h Fourth Person's Household Composition Code Source code: 331
4TH PERSON'S LINE NUMBER (START 1996 Q1)
Q.16.g Fourth Person's Line Number Source code: 330
ACTIONS TO AVOID IDENTITY THEFT: CHANGED PASSWORDS ON FINANCIAL ACCOUNTS?
During the past 12 months, have you changed passwords on any of your financial accounts? Source code: CHNG_PASSWORDS
ACTIONS TO AVOID IDENTITY THEFT: CHECKED CREDIT REPORT?
During the past 12 months have you checked your credit report? Source code: CHCKD_CR_PAST_YR
ACTIONS TO AVOID IDENTITY THEFT: CHECKED STATEMENTS FOR UNFAMILIAR CHARGES?
During the past 12 months, have you checked your banking or credit card statements for unfamiliar charges? Source code: VERIFY_CHARGES
ACTIONS TO AVOID IDENTITY THEFT: PURCHASE CREDIT MONITORING SERVICES OR IDENTITY THEFT INSURANCE?
During the past 12 months, have you purchased credit monitoring services or identity theft insurance? Source code: PURCHASE_IDTHFT_INS
ACTIONS TO AVOID IDENTITY THEFT: PURCHASED IDENTITY THEFT PROTECTION?
During the past 12 months, have you purchased identity theft protection from a company that offers protection services? Source code: PURCHASE_IDTHFT_PROT
ACTIONS TO AVOID IDENTITY THEFT: SHREDDED OR DESTROYED DOCUMENTS?
During the past 12 months, have you shredded or destroyed documents that contained personal identifying information? Source code: SHRED_DOCS
ACTIONS TO AVOID IDENTITY THEFT: USED SECURITY SOFTWARE?
During the past 12 months, have you used any type of security software program on your computer to protect it against loss of credit cards/card theft? Source code: PROTECT_COMPUTER
ADDRESS TIME IN SAMPLE (START 2015 Q1)
Identifies the actual time in sample for the address. This will match the value of Time in Sample unless the address came into sample later than its original planned start date. This can occur due to new construction that enters the sample after the rotation group started, sample reductions, sample reinstatements, and implementing new sample designs. 1-7
ADJUSTED HOUSEHOLD WEIGHT - COLLECTION YEAR
Source code: ICPSR_WGTHHCY This weight variable is used to determine the average total households during the collection year. This weighting factor will contain all zeros for noninterview households. In addition, since the collection year includes only the current calendar year, household records for interviews conducted in following six months will have a value of zero for this variable. The BJS publications CRIMINAL VICTIMIZATION, YYYY use this weight to calculate household totals.
ADJUSTED PERSON WEIGHT - COLLECTION YEAR
Source code: ICPSR_WGTPERCY This weight is used to determine the average total persons 12 years and older during the collection year. This weighting factor will contain all zeros for noninterview persons. In addition, since the collection year includes only the current calendar year, person records for interviews conducted in the following six months will have a value of zero for this variable. The BJS publications CRIMINAL VICTIMIZATION, YYYY use this weight to calculate person totals.
AFFECT OF MISUSE OF PERSONAL INFORMATION: PROBLEMS WITH FAMILY MEMBERS OR FRIENDS?
Did the misuse or attempted misuse of your personal information lead you to have significant problems with family members or friends, including getting into more arguments or fights than you did before, not feeling you could trust them as much, or not feeling as close to them as you did before? Source code: IMPACT_FAMILY
AFFECT OF MISUSE OF PERSONAL INFORMATION: PROBLEMS WITH JOB OR SCHOOLWORK?
The misuse of personal information affects people in different ways. Next I would like to ask you some questions about how (the most recent/the) misuse or attempted misuse of your personal information may have affected you. Did the misuse or attempted misuse of your personal information lead you to have significant problems with your job or schoolwork, or trouble with your boss, coworkers, or peers? Source code: IMPACT_JOB
AFFECT OF PRIOR MISUSE OF PERSONAL INFORMATION: FELT WORRY, ANGER, SADNESS, VULNERABILITY, VIOLATION, COULDN'T TRUST PEOPLE,OR UNSAFE?
As a result of the identity theft that occurred more than a year ago have you .... Experienced any of the following feelings for a month or more during the past year: worry, anger, sadness or depression, vulnerability, feelings of violation, like you couldn't trust people, or feelings that you were unsafe? Source code: EXPERIENCE_FEEL_PRIOR
AFFECT OF PRIOR MISUSE OF PERSONAL INFORMATION: PROBLEMS WITH FAMILY MEMBERS OR FRIENDS?
Have you experienced any of the following consequences as a result of the identity theft that occurred more than a year ago? Have you had.... Significant problems during the past year with family members or friends, including getting into more arguments or fights than you did before, not feeling you could trust them as much, or not feeling as close to them as you did before? Source code: PROB_FAMILY_PRIOR
AFFECT OF PRIOR MISUSE OF PERSONAL INFORMATION: PROBLEMS WITH JOB OR SCHOOLWORK?
During the past year, have you experienced any of the following consequences as a result of the identity theft that occurred more than a year ago? Have you had.... Significant problems with your job or schoolwork, or trouble with your boss, coworkers, or peer during the past year? Source code: PROB_SCHOOL_JOB_PRIOR
AGE (ALLOCATED)
Q.21.a Age Last Birthday Source code: 404(A)
AGE (ORIGINAL)
Q.21.o Age Last Birthday Source code: 404(O)
AGENCY OR COMPANY THAT ISSUES DOCUMENTS FLAG
The verbatim responses captured during the original interview were reviewed during post-data collection and recoded: Source code: F_CONT_GOVTAGNCY
AMOUNT OF ADDITIONAL COSTS INCURRED
Other than the costs you already told me about, ($ Personal Loss) how much, IF ANY, additional costs did YOU incur as a result of (the most recent/the) misuse or attempted misuse of your personal information? Include costs for things such as legal fees, bounced check fees, and any miscellaneous expenses, such as postage, phone calls, or notary fees. Do not include lost wages. Source code: ADD_COSTS_INCUR
AMOUNT OF ADDITIONAL COSTS INCURRED IN THE LAST 12 MONTHS
Not counting the ($ Total every incident) dollars that were obtained during ALL incidents of identity theft in the past 12 months, what were the total additional costs, that YOU incurred as a result of the misuses or attempted misuses of your personal information? Include costs for things such as legal fees, bounced check fees, and any miscellaneous expenses, such as postage, phone calls, or notary fees. Do not include lost wages. Source code: TOTAL_ADD_COST
ANGRY FLAG
Source code: F_FEEL_ANGRY The verbatim responses captured during the original interview were reviewed during post-data collection and recoded:
ANOTHER TYPE OF EXISTING ACCOUNT FLAG
The verbatim responses captured during the original interview were reviewed during post-data collection and recoded: Source code: F_OTHER_EXISTING_ACCTS
APPLY FOR A JOB FLAG
The verbatim responses captured during the original interview were reviewed during post-data collection and recoded: Source code: F_APPLY_FOR_JOB
APPLY FOR GOVERNMENT BENEFITS FLAG
The verbatim responses captured during the original interview were reviewed during post-data collection and recoded: Source code: F_GOVT_BENEFITS
APPROXIMATE TOTAL DOLLAR AMOUNT OF WHAT SOMEONE OBTAINED DURING (THE MOST RECENT/THE) INCIDENT?
What is the approximate total dollar value of what someone obtained during (the most recent/the) incident of the misuse or attempted misuse of your personal information? Include the value of goods, services, credit, loans, cash, and anything else the person may have obtained. Source code: TOTAL_LOSS RECORD ESTIMATED AMOUNT 0000000-0999996 Amount of total loss related to attempted misuse of personal information
APPROXIMATE TOTAL DOLLAR AMOUNT OF WHAT SOMEONE OBTAINED IN THE LAST 12 MONTHS
For the next few questions please think about ALL of the misuses of your personal information during the last year, that is, since (reference period start date; 12 month reference period). Including every incident that occurred over the past 12 months, not just the most recent, what is the approximate total dollar value of what someone obtained while misusing your personal information? Include the value of goods, services, credit, loans, cash, and anything else the person may have obtained. Source code: TOTAL_EVERY_INCIDENT
ARE YOU BLIND OR DO YOU HAVE SERIOUS DIFFICULTY SEEING EVEN WHEN WEARING GLASSES (START 2016 Q3)
Are you blind or do you have serious difficulty seeing even when wearing glasses? Source code: DIS_VISION
ARE YOU DEAF OR DO YOU HAVE SERIOUS DIFFICULTY HEARING? (START 2016 Q3)
Are you deaf or do you have serious difficulty hearing? Source code: DIS_HEARING
AT LEAST ONE BANK ACCOUNT FLAG
The verbatim responses captured during the original interview were reviewed during post-data collection and recoded: Source code: F_ACTIVE_BANK_ACCT
ATTACK, THREAT, THEFT: LOCATION CUES
Q.40a-b (Other than any incidents already mentioned,) since _____ ___, 20__, were you attacked or threatened or did you have something stolen from you - (a) At home including the porch or yard - (b) At or near a friend's, relative's, or neighbor's home - (c) At work or school - (d) In places such as a storage shed or laundry room, a shopping mall, restaurant, bank, or airport - (e) While riding in any vehicle - (f) On the street or in a parking lot - (g) At such places as a party, theater, gym, picnic area, bowling lanes, or while fishing or hunting- OR (h) Did anyone attempt to attack or attempt to steal anything belonging to you from any of these places? MARK OR ASK -- Did any incidents of this type happen to you? Source code: 539
ATTACK, THREAT: WEAPON & ATTACK CUES
Q.41a-b (Other than any incidents already mentioned,) has anyone attacked or threatened you in any of these ways EXCLUDE TELEPHONE THREATS (a) With any weapon, for instance, a gun or knife - (b) With anything like a baseball bat, frying pan, scissors, or stick - (c) By something thrown, such as a rock or bottle - (d) Include any grabbing, punching, or choking, (e) Any rape, attempted rape, or other type of sexual attack - (f) Any face to face threats - OR (g) Any attack or threat or use of force by anyone at all? Please mention it even if you are not certain it was a crime. MARK OR ASK -- Did any incidents of this type happen to you? Source code: 541
ATTENDING SCHOOL
Q.26 Attending college Source code: 411
BANKING PROBLEMS - PRIOR FLAG
Source code: F_BANK_PROB_PRIOR The verbatim responses captured during the original interview were reviewed during post-data collection and recoded:
BANKING PROBLEMS FLAG
Source code: F_BANK_PROBS The verbatim responses captured during the original interview were reviewed during post-data collection and recoded:
BEEN TURNED DOWN FOR A JOB OR LOST A JOB FLAG
Source code: F_EMPLOYMENT_PROBS The verbatim responses captured during the original interview were reviewed during post-data collection and recoded:
BROKEN IN OR ATTEMPTED
Q.37a-b.HHresp (Other than any incidents already mentioned,) has anyone: (a) Broken in or attempted to break into your home by forcing a door or window, pushing past someone, jimmying a lock, cutting a screen, or entering through an open door or window? (b) Has anyone illegally gotten in or tried to get into a garage, shed or storage room? OR (c) Illegally gotten in or tried to get into a hotel or motel room or vacation home where you were staying? Did any incidents of this type happen to you? Source code: 534
BUILDING WITH RESTRICTED ACCESS (START 2004 Q1)
Q.11c.2 Building with restricted access Source code: 223
C ACTIVE DUTY: AUGUST 1990 TO AUGUST 2001 (START 2017 Q1)
August 1990 to August 2001 (including Persian Gulf War) When did you serve on active duty in the U.S. Armed Forces? Source code: ACTIVE_DUTYWHEN
C ACTIVE DUTY: FEBRUARY 1955 TO JULY 1964 (START 2017 Q1)
February 1955 to July 1964 When did you serve on active duty in the U.S. Armed Forces? Source code: ACTIVE_DUTYWHEN
C ACTIVE DUTY: JANUARY 1947 TO JUNE 1950 (START 2017 Q1)
January 1947 to June 1950 When did you serve on active duty in the U.S. Armed Forces? Source code: ACTIVE_DUTYWHEN
C ACTIVE DUTY: KOREAN WAR (JULY 1950 TO JANUARY 1955) (START 2017 Q1)
Korean War (July 1950 to January 1955) When did you serve on active duty in the U.S. Armed Forces? Source code: ACTIVE_DUTYWHEN
C ACTIVE DUTY: MAY 1975 TO JULY 1990 (START 2017 Q1)
When did you serve on active duty in the U.S. Armed Forces? Source code: ACTIVE_DUTYWHEN
C ACTIVE DUTY: NOVEMBER 1941 OR EARLIER (START 2017 Q1)
November 1941 or earlier When did you serve on active duty in the U.S. Armed Forces? Source code: ACTIVE_DUTYWHEN
Notes
The public-use data files in this collection are available for access by the general public. Access does not require affiliation with an ICPSR member institution.