StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Online Identity Theft - Assignment Example

Cite this document
Summary
This assignment "Online Identity Theft" presents online identity theft as a reality that has left security agencies, governments, and individuals asking many questions. Online identity fraud makes use of the zeal to exploit internet services by individuals…
Download free paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Online Identity Theft
Read Text Preview

Extract of sample "Online Identity Theft"

Online Identity Theft al affiliation: Online Identity Theft Technological advancement is almost changing the world into an online platform. People eat, communicate, trade, find pleasure and receive government services through internet. The changes have forced diversification and adjustment to remain relevant in various fields. Interestingly, thieves have not been left behind in the switch leading to internet malpractices. Among the many opportunities exploited by internet thieves, online identity theft stands out (OECD, 2009). The group is gradually shifting from stealing purses and wallets for documentation to online platforms where access is easy and many fail to realise the problem. The malicious activity has left many victims cashless, identity less and at times crime suspects. Arguably, online identity is fraud system involving the impassionation or stealing of another person’s identity for financial or other gains. The paper makes use of five potential sources of reliable information. OECD (2009) in a book titled “online identity theft” provides a comprehensive explanation and meaning of the same term. Additionally, it spearheads the general understanding of causes, motivating factors, signs and different ways of alleviating the unbecoming behaviour. Beal (2006) through a website article titled “How to Defend Yourself against Identity Theft” in Webopedia sheds light on online identity theft. According to the article, identity theft takes different routes depending on channels and intention of the fraudsters. On the other hand, Granova and Eloff (2004) in a journal of “Computer Fraud & Security titled banking and identity theft: who carries the risk?” shifts focus from individuals to the corporate world of banking. Evidently, many online identity theft platforms focus on financial institutions such as banks. Granova and Eloff (2004) did an extensive study of the risk associated with the vice and who should be held accountable for the losses. Conceivably, each party suffer from online identity losses, but one has to take responsibility. Reyns (2013) in a “Journal of Research in Crime and “focuses on “online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory beyond Direct-Contact Offenses.” Reyn tries to explain how people are gradually shifting from physical burglary and theft to non-contact means including online identity theft. Last but importantly, White and Rea (2014) caps the research in a “journal of Information Privacy and Security” where people are obsessed with looking for love the internet hence meeting scammers. Notably, preserving identity is fast becoming a serious problem in the internet world. As people strive to make use of the new discovery so does fraudsters plan to exploit the same anxious individuals. It, therefore, is a serious problem that has taken security agencies such as the Federal Bureau of Investigation (FBI) aback. In United States, for instance, identity theft is regarded as a federal crime punishable by law. Federal Trade Commission survey in a 2006 showed that consumers lost over 1.1 billion in the year (Granova & Eloff, 2004). Online thieves target information ranging from online security number, name, birth date, address, and other personal information. When they have access to this information, online fraudsters create new credit lines that can access one’s bank accounts and to a greater extent apply for official documents such as passport of driver’s license. In many cases, people get arrested for offenses they did not commit. Thieves in this field of operation have intellectual advantages making it difficult to arrest and prosecute. According to the FBI, most online fraudsters hide their identity while shifting from one place to another making it difficult to trace the offenses (Beal, 2006). Therefore, most people suffer from the online activity but do not get justice from different investigation bodies. Identity theft is a process that takes different crude methods and well organised scums. Certainly, many people have a lot of personal information saved in computers and social networking sites. Leaving information readily available is a primary process to the online fraud process. Apart from careless handling of personal information, online identity theft also follows various tricks. The cunning plans cheats people into sending personal information, which is later used for other purposes by the fraudsters. Some of common cases include sending emails composed in such a way that they represent banks, telecommunication provider or financial institutions. Also known as phishing scams, the emails trick non-suspecting citizens into sending banking and personal details to wrong people (White & Rea, 2014). These people, thereafter, use the information to withdraw or commit various offences without the victims knowing. In addition, bogus job opportunities occasionally appear as pop-ups in different websites. The job classifications are attractive ranging from positions to compensation. To apply, one has to give personal information from email address, identification, social security number, and address. Apart from sending personal information, users of various websites can also download spyware. The spyware monitors programs and collect personal information of the users further exposing them to identity theft. Some of the important information that can land in fraudsters’ hands includes credit card numbers, username, passwords, email address and bank account numbers. Identity theft has a serious effect on individuals emotionally, psychologically and physically. Most victims walk to their bank accounts and get surprised by the sight of their balances. They lose the financial grip like most of their saving end up with the wrong individuals. In extreme scenarios, victims live in a house already sold by the fraudsters of land, which has changed ownership without their knowledge. On the other hand, the government lose a lot of revenue through the illegal activity. For example, when one gains access to details of another person he can enjoy different services without paying. The government bears all these costs a matter that leads to wastage of revenue. Online identity theft strips individuals the ability to perform their daily activities. They cannot shop, use their credit cards or access various online platforms (White & Rea, 2014). Apart from the financial implications internet fraud also has emotional and psychological impacts on the victims. In social sites, for example, identity theft can result to misguiding information posted by wrong people. In essence, identity theft destabilizes individuals closing their financial access, social support and emotional stability. It exposes people to illegal activities making them victims of various activities. Under extreme conditions, many people have been jailed for wrong crimes because of identity theft. It, therefore, is important to find viable solutions into the surging problem involving intellects (OECD, 2009). Different security agencies have to improve their investigation techniques and ensure perpetrators of online identity theft pay for their crimes. Notably, a continued process where identity thieves steal and escape judgement encourages young and upcoming individuals to work in the same direction. It is inevitable to note that not only individuals suffer from online identity theft but also government and corporations. Financial institutions have a responsibility of creating tamper proof systems while at the same time maintaining clear, consistent and formal channels of communication far from interference by external bodies. Preventing online identity fraud requires a stringent and cognisant process, which is inaccessible by external players. Solutions to the online identity theft situation depend on both internal and external interventions. Some of the internal and individual initiatives that are affective in addressing problem include personalizing information of importance (White & Rea, 2014). Conceivably, many people easily give off information without taking into cognisance what such information contain. Personalizing information is a basic step towards eliminating online identity. People should not share personal information to friends, family or strangers through the internet. Sensitive documents should not make it to the internet and others not needed should be shredded or deleted from internet avenues. Identity safety relies on personal safety. Individuals have the responsibility of taking care of their personal information when they enter the internet. It, therefore, is important to update antispyware or antivirus software that detect and eliminates dangerous spyware. Undeniably, internet serves as an avenue for sale promotion and job advertisement. Distinguishing between the real and fake adverts is difficult (White & Rea, 2014). It is important to keep personal information from anybody regardless of the intention. For example, strange emails and popups should be treated with suspicion. Unless one is sure, divulging personal information to the sources should not be given priority. Last but most importantly, it is imperative to be aware of one’s environment. In cyber cafes, it is vital to delete all the personal information that a subsequent user or administrator can use. Externally, it is the role of various agencies to protect internet users. The government, for instance, should enact legislations governing the use of internet and associated implications for getting involved in dubious activities (Reyns, 2013). Through security agencies, the government should facilitate good investigation mechanisms. Bodies such as the FBI should have a good forensic network to monitor and ensure people only do what is intended on the internet. Online service providers such as banks, Facebook, Gmail and other social sites also have a responsibility of protecting their clients apart from prioritizing profits (Beal, 2006). They have a responsibility of protecting their sites from gainful or malicious individuals targeting their customers. Banks, for example, have to introduce mechanisms that ensure clients receive statements in the best way possible without exposing their clients to online identity theft. Identity fraud has various signs. It, therefore, is important to observe the symptoms to prevent further exploitation. For instance, when one cannot login into a personal account because of a change in personal details, it sums up to identity fraud (OECD, 2009). Additionally, when foreign entries and credit card statements appear for goods that one did not order, a quick call to the relevant authorities is necessary. In an event that one realises he is a target of online identity theft, it is important to contact the relevant agencies to minimize the impacts. It is also important to change passwords and username after a given periods. In conclusion, online identity theft is a reality that has left security agencies, governments and individuals asking many questions. Online identity fraud makes use of the zeal to exploit internet services by individuals. Evidently, online identity theft take different routes ranging from malware downloads to misleading information that requires personal data. The process has diverstating impact on victims ranging from financial instability to emotional and psychological problems. Victims of online internet fraud find it difficult to start from the scratch as most end up selling their homes without their knowledge. Notably, online identity fraud is part of cyber bulling activities that have taken over the world’s technological industry. It is vital to apply forensic investigations and legal amendments to correct the process. Above all, online security starts with personal security. People have the responsibility of protecting their own image and ensuring their information does not reach wrong destinations. Awareness creation is also essential to relay early signals for better solutions. References Beal, V. (2006). How to Defend Yourself Against Identity Theft. Webopedia. Retrieved from http://www.webopedia.com/DidYouKnow/Internet/identity_theft.asp Granova, A., & Eloff, J. (2004). Online banking and identity theft: who carries the risk?. Computer Fraud & Security, 2004 (11), 7-11. Organisation for Economic Co-operation and Development. (2009). Online identity theft. Paris: OECD. Reyns, B. W. (2013). Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory beyond Direct-Contact Offenses. Journal of Research in Crime and Delinquency, 50(2), 216-238. White, D., & Rea, A. (2014). Looking for Love in All the Wrong Places: A Security Case Study on Online Identity Theft. Journal of Information Privacy and Security, 3(3), 3-24. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Online identity theft Assignment Example | Topics and Well Written Essays - 1500 words”, n.d.)
Online identity theft Assignment Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/literature/1658212-online-identity-theft
(Online Identity Theft Assignment Example | Topics and Well Written Essays - 1500 Words)
Online Identity Theft Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/literature/1658212-online-identity-theft.
“Online Identity Theft Assignment Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/literature/1658212-online-identity-theft.
  • Cited: 0 times

CHECK THESE SAMPLES OF Online Identity Theft

Legal and Illegal Access to Personal Information Online

?? Written By: Table of Contents Introduction 2 Thesis statement 3 Categories of Cyber Crime 3 E-Commerce 4 Social Networking 5 identity theft and Hacking 5 Evaluation and Solutions for E-Commerce & Social Networking 6 References 8 Introduction We live in an era which is rapidly getting transformed into a cyber-world.... Thesis Statement An analysis of the reasons of internet crime along with its consequence leads to a technological challenge -- whether the harmful consequences outweigh the benefits of internet and what should be done to reduce crime involving unethical practices of hacking, identity theft, crime in e-commerce and social networking....
7 Pages (1750 words) Essay

Online Security Threats Removal

So, it is clear that several threats linger in the world of the internet but Online Identity Theft is one of the most prevalent issues.... The reason is the availability of many tools and methods that are utilized by hackers to access a computer for Online Identity Theft.... However, there are lots of people who believe that solutions are insufficient and the issue of identity theft can not be resolved with them.... The objective of this essay is to delve more into the details to find if identity theft has become an incurable disease or there are ways to get over it....
6 Pages (1500 words) Essay

The History of Identity Theft: the UNESCO Mission and US Federal Efforts

According to the United States Federal Trade Commission, over $10 million in consumer funds are lost annually to identity theft in the country, totaling over $50 billion of reported losses.... million consumers became victims of identity theft, with 6.... Cyber-theft knows no boundaries, and the tendency for such crimes to be commissioned through a network of communications is extensive.... Indeed, apprehension of cyber-identity criminals and especially multi-national organized crime rings pose a serious challenge to law enforcement specialists deployed to tackle transnational jurisdictional measures....
11 Pages (2750 words) Essay

Online Identity Theft: The Crime of the Future

No other theft can be accomplished quite as easily as Online Identity Theft; no names, no faces, and no fingerprints left behind. ... Online Identity Theft is a serious crime.... Whether it's the financial side of things, or the emotional, one thing is for sure: Online Identity Theft is a serious crisis.... In order to truly understand the crime of Online Identity Theft, the following points must be thoroughly discussed:What electronic/Online Identity Theft isWhat the problems are that are associated with Online Identity Theft, and why it has been possibleWhat the prevention methods - past, present and future - are, and how they have (or how they will) work to deter against the surging epidemical crime of Online Identity Theft....
34 Pages (8500 words) Essay

Effect of Internet on Fraud and Identity Theft

The paper 'Effect of the Internet on Fraud and identity theft' examines the influence of the Internet on deception and persona robbery and will address the issues surrounding the difficulty of security and inadequacy of legislation against these crimes.... The purpose of the study will be to examine the effect of the internet on fraud and identity theft.... Bankers, for instance, who conduct online banking transactions are particularly vulnerable to fraud and identity theft (Sullins, 2006)....
4 Pages (1000 words) Essay

Electronic Crime and Computer Forensics

Electronic crimes exist in various forms such as malware, internet scams and fraud, Online Identity Theft, copyright infringement, and online child safety.... By educating themselves on basic online safety through recommended websites (Ghosh & Turinni 291).... Individuals can also educate their families about online safety....
1 Pages (250 words) Essay

Evaluation and Solutions for E-Commerce & Social Networking

An analysis of the reasons for internet crime along with its consequence leads to a technological challenge -- whether the harmful consequences outweigh the benefits of the internet and what should be done to reduce crime involving unethical practices of hacking, identity theft, crime in e-commerce and social networking.... The worst part about cyber-crime is that it is much easier to escape from it without revealing the identity or improvising a false identity....
7 Pages (1750 words) Case Study

Trends and Issues for Online Customers and Business

Finally, the report has given certain recommendations on how to reduce the incidences of Online Identity Theft.... This essay strives to explains certain aspects of identity theft.... The work has first defined identity theft as basically the act of impersonating people so as to gain access to their financial statements.... This essay strives to explains certain aspects of identity theft.... The work has first defined identity theft as basically the act of impersonating people so as to gain access to their financial statements....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us