StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Research proposal in identity theft in banking,uk - Essay Example

Comments (0) Cite this document
Summary
IDENTITY THEFT IN UK BANKING SECTOR Name: Course: Tutor: College: Date: Research Proposal, Identity Theft in Uk Banking Sector Introduction Identity theft is the illegal and the unconsented acquisition of another person’s personal information such as identity card number, bank account number and password with an intention of using it in fraudulent operations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Research proposal in identity theft in banking,uk
Read Text Preview

Extract of sample "Research proposal in identity theft in banking,uk"

Download file to see previous pages 1 billion every year to identity theft which is already sending warning signals to the online bankers. With more banks venturing in online services and online financial transfer is dominant in these sectors, the banks and the customers are at a very high risk of losing their money to fraudsters. This research intends to narrow down to cybercrime, an area that has had little coverage by researchers of identity theft, yet a threatening one. By taking a quantitative approach to identify the severity cybercrime in identity theft and identifying possible security approaches that can be used to reduce instances of identity theft, it is possible to make viable recommendations that would go way far in reducing identity theft. Problem statement In the UK, the banking sector loses approximately ?1 billion to cyber crime and customer trust is at stake in this sector (Barclays, 2013). The banking sector is a major contributor to the economy of the country contributing about 8% of the UK Gross Domestic Product. Therefore, it is one of the sectors that must be protected to ensure economic stability in the UK. Online banking is an innovative strategy that has enhanced business growth in the UK and has ensured customer comfort and satisfaction. However, as the internet technology grows, network aware experts delve in cyber crime and take advantage of innocent customers who do not know the threats that they expose themselves to wherever they conduct an online bank transaction in the UK. By identifying the vulnerability of the people and possible mitigation measures it is possible to protect the banking industry and consequently contribute to the economic development of the UK. Research Questions This research study intends to provide the answers to two critical research questions; What are the factors that predispose customers to identity theft during their online transactions? And what are the possible mitigation measures that would reduce the risk of customers falling victims of cybercrime? Objectives of the Study Main objectives To identify the factors that predispose customers to identity theft during their online bank transactions. To identify possible mitigative measures to protect online bank transactions from cyber crime. Specific Objectives To gather information from the public on their awareness risk of the identity theft while conducting online bank transactions. To assess the UK bank's security policies that protect their customers from identity theft within the scope of their online services. To identify the efficiency of the banking security policies in protecting their customers from cybercrime. To quantitatively analyse the data and make possible conclusions on identity theft To make viable recommendations on the possible measures that can protect bank customers from identity theft. Literature Review According to Haldane (2011, Para. 3), an economic analyst, the UK banking sector contributes to over 8% of the country gross domestic product and employs millions of UK residents. This points out that the UK banking sector is a major contributor in the economic development of the country, hence the need to protect it from any kind of business threat. Surprisingly, the UK banking sector continues to lose over ?1 billion every year from identity theft which has led to loss of trust in customers and a consequential drop in their revenue margin. In the current technology driven business sector, ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research proposal in identity theft in banking,uk Essay”, n.d.)
Retrieved from https://studentshare.org/law/1491045-research-proposal-in-identity-theft-in-bankinguk
(Research Proposal in Identity Theft in banking,uk Essay)
https://studentshare.org/law/1491045-research-proposal-in-identity-theft-in-bankinguk.
“Research Proposal in Identity Theft in banking,uk Essay”, n.d. https://studentshare.org/law/1491045-research-proposal-in-identity-theft-in-bankinguk.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Research proposal in identity theft in banking,uk

Identity Theft

...? Identify Theft on Internet (Add (Add (Add Identity Theft on Internet Identity theft has emerged as the biggest issue which is annoying the internet users worldwide. It is a fast spreading crime across the world. The Identity Theft Resource Center, a nonprofit organization divides identity theft into four categories, namely, financial identity theft, criminal identity theft, governmental identity theft and medical identity theft. The ITRC portal defines identity theft broadly as follows:-“It is a crime in which an impostor obtains key pieces of personal identifying information such as social security numbers and bank account information and uses them for their own personal gain. It can start with lost or stolen wallets, stolen mail...
6 Pages (1500 words) Essay

Identity Theft

... false pretense to obtain the victim’s personal information for them to use it to carryout various crimes (Vacca, 2003). Thombstone theft is another method used to steel personal information. It involves stealing dead person’s identity or personal information (Social engineering framework, 2011). In the event of death of a person’s death, that person’s beneficiaries or relative may forget to notify banks about death, and using that person’s credit cards using his identity is normal as far as banks are concerned. Therefore, thieves who manage to steal such person’s identity can easily impersonate themselves in order to steal from the dead person’s bank account. These methods of stealing identity are conducted either by single individuals...
4 Pages (1000 words) Research Paper

Identity theft

Identity theft has become an increasing problem globally in recent years, causing millions of people undue emotional and financial trauma, while costing society a great deal of money. The heartache caused has limited access to critical services and credit availability for millions of honest and hardworking citizens globally, but particularly in the United States. It is a serious issues that must be tackled. The aim of the short paper is to introduce the seriousness of this problem and to present possibly research questions that should be explored to better introduce society to various methods to limit the risk of becoming a victim of identity theft. Problem Statement The problem is that identity theft is destroying the financial...
3 Pages (750 words) Essay

Identity Theft

Criminal identity theft, the most common non-financial type, occurs when someone gives another's personal information to a law enforcement officer when he or she is arrested. In addition to the financial losses resulting from identity theft, the person whose personal information has been used will have an erroneous credit or criminal history that is often expensive and time-consuming to correct. This type of identity fraud involves taking on someone else's identity in order to commit a crime, enter a country, get special permits, hide one's own identity, or commit acts of terrorism. These criminal activities can include Computer and cyber crimes, Organized crime, Drug trafficking, Alien smuggling and money laundering.
The inci...
10 Pages (2500 words) Essay

Identity Theft

... The aim of the research is to define what identity theft is, what prevention measures exist to minimize the negative impact of identity theft and how organizations respond to the facts of identity theft. The research will be conducted through the online survey. The results will be analyzed through the qualitative and quantitative means. The key words: identity theft, victimization, response. Chapter One Context of the Problem Identity theft has been a problem for years, and has become one of the fastest growing crimes in the nation. Identity theft is when someone uses your name, social security number, financial information and any other identification without your knowledge to commit fraud and or other crimes. Identity theft...
10 Pages (2500 words) Essay

Identity theft

Personal data like Social security number, credit card number, bank account, etc. are not unique like for instance fingerprints and can be misused when they fall into the wrong hands. In the United States many people have suffered huge losses on account of unauthorized persons withdrawing funds from their bank or financial accounts and very often these persons who have stolen the identity have committed crimes and run huge debts using the victim’s identity. In short a criminal can use an individual’s identity to commit a wide range of crimes such as fraudulent withdrawal of money from banks, apply for credit cards and loans, fraudulent use of telephone calling cards, or buy goods or services which might not have been possible...
10 Pages (2500 words) Essay

Identity Theft

IDENTITY THEFT Identity theft is a serious and new crime that the legal system is currently grappling with. It is not an easy one to deal with and its repercussions are serious. It can take years to recover from this kind of crime. Taking peoples most personal information and using it in malicious ways can be a devastating experience.
There are a number of useful precautions that a person can take to ensure that their personal data is protected and is not vulnerable to theft by criminals. The first is to ensure that you have strong passwords protecting your online information. You should not use your name as a password or your birthday. It is always best to use a combination of numbers and letters. Do not write your password...
1 Pages (250 words) Research Paper

The Trade Union Movement in the UK

Before the ERA 1999, union membership and recognition in the UK were characterized by voluntarism, in which employers and employees could bargain over the terms and conditions of employment without any legal interference. With the statutory system ushered in by the new law, voluntary recognition of unions is no longer allowed and it becomes unlawful for British employers to deny recognition to unions under any circumstances. That conveys the impression that ERA created a radical change in British industrial relations. This paper takes the contrary view, however, and proposes that while the new industrial relations law looks revolutionary in principle, there are no fundamental changes in actuality for the change to qualify as &ldqu...
8 Pages (2000 words) Case Study

Marketing Research Plan: Old Navy

Gap’s credit ratings thereby limiting access to the capital market, international trade matters which may be disruptive of the supply chain, changes to its IT systems disruptive of operations, changes in the IT services agreement with IBM that can disrupt operations and produce adverse effects on financial results, international expansion through franchising and other arrangements may impair the value of its brands if unsuccessful, products are subject to risks associated with overseas outsourcing and manufacturing, and failure of vendors to adhere to Gap’s code of vendor conduct could harm the business. From available data in the 2007 Annual Report, both the Gap and Old Navy brands have exhibited declining net sales....
11 Pages (2750 words) Business Plan

Credit Crunch in the UK

To sell more profitable subprime mortgages, mortgage companies bundled the debt into consolidation packages and sold the debt on to other finance companies. In other words, mortgage companies borrowed to be able to lend mortgages. For example, the lending was not financed out of saving accounts (Mortgage Guide).

These mortgage debts were bought by financial intermediaries. The idea was to spread the risk, but, actually, it just spread the problem. Usually, subprime mortgages would have a high-risk assessment rating. But, when the mortgage bundles got passed onto other lenders, rating agencies gave these risky subprime mortgages a low risk rating. Therefore, the financial system denied the extent of risk in their balance...
8 Pages (2000 words) Case Study

Research Methods in Linguistics

 The writer of content tries to preserve his/her culture and also wants his/her culture to get attached to his/her recent living due to which, he/she makes use of the bilingual aspect to write a narrative.

Because of this writing, the English reader faces some problem in decoding the meaning but he/she realizes the presence of another culture by means of this writing. Many writers provide a glossary at the end so that the readers face no problem in decoding the words given in another language such as Soueif has done but many take it for granted that readers know the other language as well.

The article contains a detailed evaluation of the novel by Soueif which can be categorized as the strength of the re...
6 Pages (1500 words) Assignment

Developing a Research Base for Intravenous Peripheral Cannula Resites

...Context of the Paper To begin with, the of the paper is very much apt for the content. Although the could have come up with a more direct title, the title “Developing a Research base for Intravenous Peripheral cannula re-sites. A randomized controlled trial” captures the essence of the paper and what the authors aim to address. They, however, could have made it more direct to the point by maybe saying that the study is about a comparison between 3 day cannula re-sites and cannula re-sites as dictated by clinical condition. Nonetheless, the chosen t title is suitable enough to briefly inform the reader of the topic of the research. Two hypotheses were tested in this paper. There are two groups that were compared in the paper...
6 Pages (1500 words) Case Study

Christian Identity Movement

verted to this religion believe that finally they have found their true identity by discovering that they are the descendants of the tribes of “white” Israel that were lost (Quarles 2004, p.7).
When any group of people say that they are superior to others on the basis of the race they belong to and also inculcate the belief that they are the only chosen people of God and not the people from other ethnic background, then one can very well say that that group or the organization is practicing racial beliefs. People who follow the Christian Identity believe that the people from Caucasian ethnic background are true Israelites and hence they are the only people from the God’s family (Quarles 2004, p.9). The teach...
6 Pages (1500 words) Coursework

Analysis of the Methods of 3 Research Papers about Child Abuse

Research ethics was maintained as the identity of the individuals participating was kept secret. As far as the validity of the study was concerned, the researchers attempted to use content validity in order to get an accurate response. The content validity focused on measuring off the ethnicities and gender percentages within the area and attempting to get a random sample of individuals via the phone. Their approach to random calling allowed for a significant random sample in the study. There were a few issues, however, with this type of approach. Those answering the phone sometimes were not always the desired individual, and not all of the desired people were surveyed. Different replacements did have to be used, and the attempt w...
6 Pages (1500 words) Literature review

Critical Review of Goth: Identity, Style and Subculture by Paul Hodkinson

The allure from this standpoint is seen by the author. This report measures mainly the methodology that Hodkinson uses, which is grounded theory research, and the report also examines questions of fixed vs. flexible research. The findings of the research are briefly presented before the current research investigation concludes.

The Goth subculture is founded on principles of viewing some of what society outside this subculture, or mainstream culture, views as abhorrent or negative. There is some fetish tendency in this subculture towards the macabre and death, with face-paint style makeup and mourning clothing being prominent features of belongingness, which are certainly not reflective of mainstream fashion and makeup....
6 Pages (1500 words) Book Report/Review

Contrast of Two Explanations of Social Disorder in Contemporary UK Society

As the process of urbanization takes off and more people start residing in major cities, the fissures start to appear within the apparent harmonious co-existence. There are several reasons why disorderly conduct on part of individuals and groups takes place. Sociologists have proposed numerous theories explaining this phenomenon.

Erving Goffman was an astute observer of society, who immersed himself in the social environment which he was studying. He carefully observed and recorded the ways in which people’s behavior and interpersonal interactions are carried out in everyday life. He notes that “people perform their social roles and, as they do so, they produce social order through their actions and the regu...
6 Pages (1500 words) Article

The Key Macro Factors that Have Influenced the UK Grocery Retailing Industry since the Early 1960s

...1. Assess the key macro factors that have influenced the UK grocery retailing industry since the early 1960s. The concept of organisational change is inherently intertwined with external threats and opportunities, which businesses must adapt to as part of strategic planning to continue long term growth. Senior and Fleming argue that the concept of organisational change has many faces, namely “convergent changes and transformational change that is organisation wide and characterised by radical shifts in strategy, mission values and associated changes of structures and systems” (In Thompson & Martin, 2005, p.41). Moreover, Johnson et al highlight that external macro-economic factors intrinsically impact strategy management and without...
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Research proposal in identity theft in banking,uk for FREE!

Contact Us