StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Identity Theft - Assignment Example

Cite this document
Summary
The development and advancement of technology means that we have to live in an increasingly interconnected information age and yet it also poses a risk of security and fraud. The first approach would be to review the circumstances that made possible the professors’ identity…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Identity Theft
Read Text Preview

Extract of sample "Identity Theft"

Identity Theft [Insert [Insert Unit and [Insert [Insert [Insert Identity Theft In your opinion, what would be your plan to review the case of identity theft toward the university professors? Why? The development and advancement of technology means that we have to live in an increasingly interconnected information age and yet it also poses a risk of security and fraud. The first approach would be to review the circumstances that made possible the professors’ identity theft in the first place and the compelling reasons for the perpetrators to commit the crime.

A useful approach is the Fraud Triangle which was developed by Cressey R Donanld. By reviewing the case in the fraud triangle context we will find out the motivating factor behind the crime commission; it postulates that in order for a crime to be committed such as the identity theft case; three elements namely; pressure, opportunity and rationalization must be in play. These are depicted in the figure below; Pressure Opportunity RationalizationAll these factors must be present for fraud to happen.

Completely stopping or eliminating either one of them will reduce the chances of fraud almost to zero.Pressure: This is what pushes a person to engage in an act of fraud and can entail a desire to pass exams in our case, social revolt or a financial challenge.Opportunity refers to the capability to commit a crime. Since very few crooks like being caught, they must act in a way that will ensure their activities remain untraceable. This becomes possible when weak internal controls and management practices exist that allow the fraudsters to sneak in and wreak havoc.

Lack of established procedures to anticipate, detect, and respond to attacks and violations creates an opportunity for frauds. This is one area where frauds and crooks have the greatest leverage and control and are always looking to find a loophole; maybe a weak encryption system.Rationalization: this is another key component for frauds, which allows a fraudster to reconcile her behavior with normally accepted concept of trust and common decency. The fraudster feels no guilt and in fact feels justified (Turner, Mock & Srivastava).

The fraud triangle is useful because it identifies why, what, where and who of the fraud. Once this is established then remedial measures can be taken.2. Do you think identity theft can be stopped? Fraud cannot be stopped; the pace of technological change and advancement gives it (fraud) an evolutionary nature and so the crooks will keep getting better and more sophisticated. There is however great opportunity more than ever to slow it down considerably to protect the masses and ordinary people.

The identity world will continue to experience this cycle where a smart organization comes up with a secure system to protect identity and an even smarter crook comes up with a way around the security measure (‘Consumer protection Division’, 2005).3. How would you propose to stop it or at least slow it down? The first step would be to take the basic measures, use passwords, use secure connections, and have anti spyware. By adopting the fraud triangle, measures can be put in place to anticipate, identify, and mitigate fraud through data encryption, using secure systems, installing firewalls and anti spyware.

A very good strategy would be to run information servers on open source operating systems such as Linux where the code and the kernel has been modified by a small ‘in-house’ team. Without the basic code and kernel, the frauds would have a very big problem accessing a system or network. Physical backups of identity or information databases should be encrypted so that should it fall into the wrong hands then it is almost worthless (Mitic, 2009).ReferencesFederal Trade Commission (2005). Take charge fighting back against identity theft.. (pp. 7-21). Arkansas: Consumer protection Division.Mitic, S. (2009) Stopping identity theft: 10 easy steps to security (pp.

3-12, 54-63). Berkeley, CA: NoloTurner, J., Mock, T., & Srivastava, R. (2003, January) An analysis of the fraud triangle Retrieved from http://aaahq.org/audit/midyear/03midyear/papers/Research Roundtable 3-Turner-Mock-Srivastava.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Identity Theft Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Identity Theft Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/law/1588875-identity-theft
(Identity Theft Assignment Example | Topics and Well Written Essays - 500 Words)
Identity Theft Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/law/1588875-identity-theft.
“Identity Theft Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/law/1588875-identity-theft.
  • Cited: 0 times

CHECK THESE SAMPLES OF Identity Theft

Identity theft and business ethics

This essay is an evaluation of Identity Theft and other ethical dilemmas can be of negative impact to the business and the methods that can be used to control and prevent risks that may arise from such business ethical issues.... Identity Theft has been identified as one of the ethical dilemmas facing many business enterprises and organizations.... Identity Theft in itself is a crime and is punishable by law with not less than 15 years imprisonment in the US....
5 Pages (1250 words) Essay

Identity Theft in the Organization

This paper “Identity Theft in the Organization” discusses the issue of Identity Theft, how major institutions govern the information of clients and recommendations on how to stop Identity Theft.... Identity Theft is defined as a situation in which a person steals the whole identity of a person.... This paper discusses the issue of Identity Theft, how major institutions govern the information of clients and additionally, recommendations on how to stop Identity Theft....
12 Pages (3000 words) Research Paper

Credit & Identity Theft

Identity Theft is a crime in which someone wrongfully obtains and uses another persons personal information in some way that involves fraud or deception.... The faster you find out that your credit or your identity has been tampered with, the faster and Credit and Identity Theft Identity Theft is a crime in which someone wrongfully obtains and uses another persons personal information in some way that involves fraud or deception.... Once you have the reports, create an Identity Theft Report....
1 Pages (250 words) Research Paper

Identity Theft Statutes

In the paper “Identity Theft Statutes” the author analyzes statues of frauds, which enable the parties to recognize their obligations and perform in accordance with the agreed terms.... The statute includes the names of the contracting parties as well as the terms and conditions contract requirements....
8 Pages (2000 words) Assignment

The Cybercrime: Identity Theft

They are the unauthorized access to information stored in the computer and start the software "logic bombs" that are triggered when the certain conditions are met and partially or completely incapacitate a computer system, also it could be the development and distribution of computer viruses, and theft of computer information....
4 Pages (1000 words) Assignment

Analysis of Identity Theft

This essay discusses an analysis of Identity Theft.... Identity Theft can take many forms.... 1The criminal, a convicted felon, not only incurred more than $100,000 of credit card debt, obtained a federal home loan, and bought homes, motorcycles, and handguns in the victims name, but called his victim to taunt him -- saying that he could continue to pose as the victim for as long as he wanted because Identity Theft was not a federal crime at that time -- before filing for bankruptcy, also in the victims name....
3 Pages (750 words) Essay

Credit Card Theft and Identity Theft

The paper "Credit Card Theft and Identity Theft " describes that it has been observed that the advancement of political debate is indeed a positive development, however; the recognition of tools for conducting the activity is integral towards deciding whether hacktivism should be penalized.... The analysis which has been conducted in this discussion focuses upon exploring two critical aspects of crime by highlighting fundamental issues concerning hacking, Identity Theft and credit card theft....
5 Pages (1250 words) Essay

Identity Theft and Networking Security

… The paper "Identity Theft and Networking Security" is a worthy example of a term paper on information technology.... The paper "Identity Theft and Networking Security" is a worthy example of a term paper on information technology.... Some are related to cases of stolen identity, outright negligence, or poor network security initiatives....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us