Security Journal

, Volume 24, Issue 4, pp 251–268 | Cite as

Strategies of adaptation and diversification: The impact of chip and PIN technology on the activities of fraudsters

  • Emily Finch
Original Article


According to the official press release that accompanied its launch, chip and PIN is the biggest change to the way that payments are made since decimalisation. The aim of this new system of plastic card payment was to tackle stolen and counterfeit card fraud. However, recent figures published by the UK Card Payments Association show that counterfeit card fraud has increased dramatically since the introduction of chip and PIN and that, although stolen card fraud has decreased, the rise in other forms of fraud – noticeably those that do not rely upon knowledge of the card's PIN – indicates that fraudsters may have adapted new methods in order to circumvent the new system. This article draws upon interviews conducted with fraudsters in 2004, before the widespread adoption of chip and PIN, and again in 2009, to ascertain the extent to which they have evolved new strategies for committing fraud. In doing so, the article highlights the attitudes and beliefs held by fraudsters that shape their actions thus providing valuable information that could shape policy decisions aimed at the reduction of plastic card fraud in the future.


chip and PIN fraud identity theft Internet retail crime 


  1. Alalehto, T. (2003) Economic crime: Does personality matter? International Journal of Offender Therapy and Comparative Criminology 47 (3): 335–355.CrossRefGoogle Scholar
  2. APACS. (2009) Fraud the Facts 2009: The Definitive Overview of Payment Industry Fraud and Measures to Prevent It. London: APACS.Google Scholar
  3. Beaver, K.M., Wright, J.P., DeLisi, M. and Vaughn, M.G. (2008) Desistance from delinquency: The marriage effect revisited and extended. Social Science Research 37 (3): 736–752.CrossRefGoogle Scholar
  4. Bernasco, W. and Nieuwbeerta, P. (2004) How do residential burglars select target areas? British Journal of Criminology 45 (3): 296–315.CrossRefGoogle Scholar
  5. Carroll, J. and Weaver, F. (1986) Shoplifters’ perceptions of crime opportunities: A process-tracing study. In: D.B. Cornish and V.G. Clarke (eds.) The Reasoning Criminal: Rational Choice Perspectives on Offending. New York: Springer-Verlag.Google Scholar
  6. Copes, H. and Cherbonneau, M. (2006) The key to auto theft: Emerging methods of auto theft from the offenders’ perspective. British Journal of Criminology 46 (5): 917–934.CrossRefGoogle Scholar
  7. Copes, H. and Vieraitis, L. (2008) The risks, rewards and strategies of stealing identities. In: M. McNally and G. Newman (eds.) Perspectives on Identity Theft, Crime Prevention Studies. Vol. 23, Cullompton: Willan Publishing, pp. 87–110.Google Scholar
  8. Cornish, D.B. and Clarke, V.G. (eds.) (1986) The Reasoning Criminal: Rational Choice Perspectives on Offending. New York: Springer-Verlag.CrossRefGoogle Scholar
  9. Cullen, F.T. and Link, B.G. (1980) Crime as an occupation: A new look. Criminology 18 (3): 399–410.CrossRefGoogle Scholar
  10. Dodds, N.J. (2000) The psychology of fraud. In: D. Canter and L.J. Alison (eds.) Profiling Property Crimes. Aldershot, UK: Ashgate Publishing Group.Google Scholar
  11. Duffield, G. and Grabosky, P. (2001) The Psychology of Fraud Trends and Issues in Crime and Criminal Justice No. 199. Canberra, Australia: Australian Institute of Criminology.Google Scholar
  12. Duffin, M., Keats, G. and Gill, M. (2006) Identity Theft in the UK: The Offender and Victim Perspective. Leicester, UK: Perpetuity Research and Consultancy International.Google Scholar
  13. Felson, M. and Clarke, R. (1998) Opportunity Makes the Thief: Practical Theory for Crime Prevention. London: Home Office. Police Research Series Paper 98.Google Scholar
  14. Finch, E. (forthcoming) The advantages of internet shopping: The fraudsters’ perspective, in preparation.Google Scholar
  15. Finch, E. and Fafinski, S. (2009) Identity Burglary: A Study. London: Invenio Research.Google Scholar
  16. Furnell, S. (2006) Safety in numbers? Early experiences in the age of chip and PIN. Computer Fraud and Security 4 (8): 4–7.CrossRefGoogle Scholar
  17. Hirschi, T. and Gottfredson, M.R. (1983) Age and the explanation of crime. American Journal of Sociology 89 (3): 552–584.CrossRefGoogle Scholar
  18. Hunter, P. (2004) Chip and PIN: Biggest UK retail project since decimalisation but not enough on its own to defeat card fraud. Computer Fraud and Security 2 (5): 4–5.Google Scholar
  19. Jenkins, R. (2008) Social Identity. Abingdon, UK: Routledge.Google Scholar
  20. Lemert, E.M. (1951) Social Pathology: A Systematic Approach to the Theory of Sociopathic Behaviour. New York: McGraw Hill.Google Scholar
  21. Levi, M. (2008) Combating identity and other forms of payment fraud in the UK: An analytical history. In: M. McNally and G. Newman (eds.) Perspectives on Identity Theft, Crime Prevention Studies. Vol. 23, Cullompton: Willan Publishing, pp. 111–131.Google Scholar
  22. Levi, M. and Handley, J. (1998) The Prevention of Plastic and Cheque Fraud Revisited. London: Home Office. Home Office Research Study No. 182.Google Scholar
  23. Levi, M., Bissell, P. and Richardson, Y. (1991) The Prevention of Cheque and Credit Card Fraud. London: Home Office. Crime Prevention Unit Paper No. 26.Google Scholar
  24. Maruna, S. (1999) Desistance and development: The psychosocial process of ‘going straight’. British Society of Criminology Conference Proceedings. Vol. 2,
  25. Maruna, S. (2001) Making Good: How Ex-Convicts Reform and Rebuild their Lives. Washingston DC: American Psychological Association.CrossRefGoogle Scholar
  26. Maruna, S. (2006) Desistance from crime. In: E. McLoughlin and J. Muncie (eds.) Sage Dictionary of Criminology, 2nd edn. London: Sage.Google Scholar
  27. Mativat, F. and Tremblay, P. (1997) Counterfeiting credit cards: Displacement effects, suitable offenders and crime wave patterns. British Journal of Criminology 37 (2): 165–183.CrossRefGoogle Scholar
  28. Sampson, R.J. and Laub, J.H. (1993) Crime and deviance over the life course: The salience of adult social bonds. American Sociological Review 55 (5): 609–627.CrossRefGoogle Scholar
  29. Soothill, K., Francis, B. and Fligelstone, R. (2002) Patterns of Offending Behaviour: A New Approach Home Office Research Findings 171. London: Home Office.Google Scholar
  30. Wall, D.S. (2007) Cybercrime: The Transformation of Crime in the Information Age. Cambridge: Polity Press.Google Scholar

Copyright information

© Palgrave Macmillan, a division of Macmillan Publishers Ltd 2010

Authors and Affiliations

  • Emily Finch
    • 1
  1. 1.School of Law, University of SurreyGuildfordUK

Personalised recommendations