StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Identity theft and business ethics - Essay Example

Cite this document
Summary
Poor behavior and lack of control over ones conduct with regard to the set standards leads to breaking of the code of ethics that is allowed and acceptable and may attract heavy punishments…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Identity theft and business ethics
Read Text Preview

Extract of sample "Identity theft and business ethics"

Download file to see previous pages

can be of negative impact to the business and the methods that can be used to control and prevent risks that may arise from such business ethical issues. Identity theft has been identified as one of the ethical dilemmas facing many business enterprises and organizations. This refers to the invasion to the privacy of information systems by malicious persons who acquire information that is supposed to be confidential and use it for their own benefit or to cause malicious damage to the integrity of the business (Angelopoulou et al 2005 p 78).

This information can be used to defraud the owner of the information or it can be availed to competitors or the press, an occurrence that can cause serious financial and integrity damage. Identity theft in itself is a crime and is punishable by law with not less than 15 years imprisonment in the US. According to statistics, the year 1995 recorded the highest number of arrests in the US amounting to approximately 95% of the total arrests which were related to identity theft (Angelopoulou et al 2005 p 77).

This prompted the government to enact the Identity Theft and Assumption Deterrence Act of 1998 which was aimed at controlling the vice that was rated by the FBI as the nation’s fastest growing crime. There are various types of identity theft that include and not limited to; credit card fraud, phone fraud, document, loan and bank fraud etc (Angelopoulou et al 2005 p 80). It is therefore necessary for everyone to be aware of the various forms of identity theft so as to avoid the repercussions which may arise and also to be able to refrain from conducting activities that may expose one to the risks.

This ethical dilemma has been increasing due to the various businesses incorporation and embracing of technology, which has made it easier for the criminals to conduct their operations. One way through which identity theft is being accomplished is by hacking of information systems (Angelopoulou et al 2005 p 82). Hackers are

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Identity theft and business ethics Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1557871-identity-theft-and-business-ethics
(Identity Theft and Business Ethics Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/miscellaneous/1557871-identity-theft-and-business-ethics.
“Identity Theft and Business Ethics Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1557871-identity-theft-and-business-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Identity theft and business ethics

Ethical Issues Concerning Information Technology

hellip; However, as technology advances, risks such as genetic identity theft are also increased (McHughen, 2009).... However, the issue of ethics in the utilization of technology has been overlooked for a long time now (Anderson & Goodman, 2002).... Similarly, information technology has been assimilated in business activities through systems such as supply chain management systems, inventory management systems, and customer relationship management systems (Atkinson & McKay, 2007)....
14 Pages (3500 words) Essay

Identity Theft by a Family Member: Legal and Ethical Issues

There are some possible precautions that people can take to avoid identity theft and subsequent fraudulent activities.... This report talks about identity theft which has been growing rampantly as one of the most potential crimes in the United States for the past few years.... Although the term identity theft refers to a variety of fraudulent activities, ‘identity theft by a family member' has become a unique form of crime....
14 Pages (3500 words) Research Paper

Identity Theft Issue

This crime is called identity theft and it refers to the act of stealing victims' personal information such as name, birth date, Social Security number, credit card number, passport, address, with the aim of impersonating them typically for one's own financial gain by gaining access to their finances or with an aim of framing the clients' for a crime.... As the use of computer networks, particularly the Internet, has become widespread, the concept of computer… Computer security is closely connected to such disciplines as ethics and risk analysis, and is considered with topics such as computer crime; the prevention, revealing, and In the given paper we will consider the identity theft as one of topic related to the ethics in computing, will examine the nature of the given problem, methods of its investigation and prevention....
10 Pages (2500 words) Essay

Identity fraud its impact and the case for prevention

The most common bad act is the crime of credit card fraud, but mortgage fraud, and also gaining access to the finances of a specified targeted person or a frame of a targeted person falls within what mass media reports of identity theft have included.... Lack of proper and due care with respect to identity protection could make one an unsuspecting victim of identity theft, and even when this is detected, it may be too late to remedy.... With identified fraud crossing the £14 billion mark during 2008 in contemporaneous UK business settings, the arena is now all set to tackle it with determination, not only due to its perceptible legal immunity but also the detriment it poses to the UK economy....
24 Pages (6000 words) Essay

Identity Theft in the Organization

The workstation is something that is clearly important if the organization is dealing with matters that may lead to identity theft and therefore, there should be rules and regulations that govern the way the employees perform and conduct themselves.... This paper “identity theft in the Organization” discusses the issue of identity theft, how major institutions govern the information of clients and recommendations on how to stop identity theft....
12 Pages (3000 words) Research Paper

Conducting Independent Scholarship

hellip; After initial approval, project supervisors need to submit these forms to PG IS, UG ARP, UG MP or LTW coordinator who would then submit these to the Chair of the Computing ethics Committee (CREC) for further consideration.... The admission essay "Conducting Independent Scholarship " states that students conducting PG Independent Scholarship, UG Applied Research Project (UG ARP), UG Maths Projects (UG MP) or Learning-through-Work (LTW) projects must complete this form and submit to their project supervisors for approval....
6 Pages (1500 words) Admission/Application Essay

Ethical Issues Concerning Information Technology

However, the issue of ethics in the utilization of technology has been overlooked for a long time now (Anderson & Goodman, 2002).... This research proposal "Ethical Issues Concerning Information Technology" discusses ethical issues concerning information technology in the business field.... Similarly, information technology has been assimilated into business activities through systems such as supply chain management systems, inventory management systems, and customer relationship management systems (Atkinson & McKay, 2007)....
14 Pages (3500 words) Research Proposal

Information Security, Identity Theft and Identity Fraud

This assignment "Information Security, identity theft and Identity Fraud" presents information security that refers to the means of ways of safeguarding information and information systems from being from unauthorized or unlawful access, perusal, inspection, destruction, or recording.... hellip; Given that ethics refers to the way and how people should act, on issues concerning goodness and value of situations and things, Information Security ethics is” the analysis of the impact and nature of information technology and the relating formulation and implementation of policies for the ethical use of such technology....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us