StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Identity Theft - Research Paper Example

Cite this document
Summary
Identity theft Name: University: Abstract The issue of theft identity has been such a hectic one to many people. Everyone can become a victim of theft identity. Although it may take a long time before victims can suspect or find out that they are victims of identity theft, in most cases, much damage is caused by this incident by the time they realize…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Identity Theft
Read Text Preview

Extract of sample "Identity Theft"

Download file to see previous pages

In this regard, the paper will also assess how these bodies handle such cases. Identity theft Introduction Identity theft is argued to be a form of stealing someone’s identity whereby the thief pretends to be the victim, characteristically in order to have access to resources in the victim’s name and identity (Vacca, 2003). This form of theft can cause and lead to adverse consequences to the victim in the event of being held accountable for crimes committed by the thief. According to Hammond, (2003), identity theft takes place when someone uses other person’s personal identification documents or information.

Some of the common identification documents or information prone to such effects includes social security number or credit card number, which are used by identity thieves to commit fraud or other related crimes (Hammond, 2003). Different methods of how someone’s identity can be compromised and what identity thieves do with stolen identity Stealing is one and most common method used by identity thieves to obtain victims personal information. This mostly happens in the streets whereby thieves snatches or steals a purse or wallet (Social engineering framework, 2011).

This can also come in the form of identity victims kidnapping victims and asking them to disclose their personal information. Using this method, identity thieves can go further to commit various crimes using the victim’s personal identification documents or information. Dumpster diving is a method used by identity thieves by a way of rummaging through the other person’s trash for them to look for some personal information that can aid them launch an attack (Social engineering framework, 2011).

In some cases, people dump vital personal information documents without being aware of the danger they pose. However, some documents are dumped after being considered irrelevant or after being used. Identity thieves can use such information obtained from people’s trash to commit a crime. Skimming is a situation where the thief uses a special device to store victim’s personal information. Skimming is a form of high-tech technique whereby thieves scan or swipe victim’s credit or bank card in order to get off the magnetic strip (Social engineering framework, 2011).

This is common in areas where victims use their personal documents to purchase items or services. Phishing is another method used to by identity thieves to obtain personal information of their victims. They pretend to be a financial institution or other organizations that people presume to be genuine. They send a malicious email in the effort to encourage their victims to enter specific information (Vacca, 2003). Unknowingly, victims provide all their personal information, which is used by the impersonators.

Changing of address is also used by identity thieves whereby they change victims address mostly in situations where victims have to fill out a “change of address” form. They can transfer victim’s bills after ordering high ticket items. Pretexting is also another method used by identity thieves by a way of using false pretense to obtain the victim’s personal information for them to use it to carryout various crimes (Vacca, 2003). Thombstone theft is another method used to steel personal information.

It involves stealing dead person’

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Identity Theft Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/other/1399265-identity-theft
(Identity Theft Research Paper Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/other/1399265-identity-theft.
“Identity Theft Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/other/1399265-identity-theft.
  • Cited: 0 times

CHECK THESE SAMPLES OF Identity Theft

Personal Identity Theft

The objective of paper "Personal Identity Theft" is to come up with a sensitization framework of educating the public on Identity Theft and to establish ways of preventing the crime.... By and large, the perception of Identity Theft has been that it does not amount to a serious crime but rather a nuisance crime involving the stealing of personal information of the victim.... The objective of paper is to come up with a sensitization framework of educating the public on Identity Theft and to establish ways of preventing the crime....
44 Pages (11000 words) Dissertation

Computer Crime & Identity Theft

The following essay entitled "Computer Crime & Identity Theft" deals with any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution.... For the purposes of this paper, the particular computer crime will be concentrated in the area of Identity Theft and the impact it has both personally and economically on the individual and society.... What is Identity Theft?... The encyclopedic definition of Identity Theft is the use of another person's identity, i....
11 Pages (2750 words) Essay

Effects of Identity Theft

Identity Theft and Assumption Deterrence Act (ITADA) has defined Identity Theft as the knowing transfer, possession, or usage of any name or number that identifies another person, with the intent of committing or aiding or abetting a crime” (Roberts & Shreft, 2009, pp.... CSU (2009, pp 7-8) has reported that the trend of Identity Theft had been on increase in 2008.... The report had cited in the last six months of the year 2008, there had been an increase of 25 percent in the issues pertaining to Identity Theft....
5 Pages (1250 words) Research Paper

IDENTITY THEFT CAN AFFECT

Identity Theft is one of the crimes that threaten the security of… The statistics reported about the crime showed that the crime costs American citizens more than USD 21 billion in 2012 (Javelin Strategy & Research, 2013).... The average costs incurred by the victims of Identity Theft were USD 365 (Javelin Strategy & Research, 2013).... This paper will explore the growth of Identity Theft, its effects on individuals and the wider community and the types of Identity Theft....
5 Pages (1250 words) Research Paper

Online Identity Theft

hellip; Among the many opportunities exploited by internet thieves, online Identity Theft stands out (OECD, 2009).... OECD (2009) in a book titled “online Identity Theft” provides a comprehensive explanation and meaning of the same term.... Beal (2006) through a website article titled “How to Defend Yourself against Identity Theft” in Webopedia sheds light on online Identity Theft.... According to the article, Identity Theft takes different routes depending on channels and intention of the fraudsters....
7 Pages (1750 words) Assignment

How to Identity Theft

This research paper, How to Identity Theft, highlights that over the past few decades technology has grown to great heights and is still improving.... In this essay we focus on how technological developments have helped the growth of fraudulent activities like Identity Theft.... Then we focus on what is Identity Theft, its growth using computers, and the possible precautions.... To understand the seriousness of Identity Theft we firstly need to know the different types of electronic frauds....
15 Pages (3750 words) Essay

Identity Theft Policies

The goal of the present study is to analyze the effectiveness of various policies aimed at Identity Theft prevention.... Identity Theft per se is fraud which takes on many forms.... As discussed in this paper, Identity Theft may be more appropriately termed as personal Identity Theft.... hellip; Roberson (2008), however, observed that the terms “Identity Theft” and “identity fraud” are often used interchangeably....
12 Pages (3000 words) Research Paper

Analysis of Identity Theft

The paper "Analysis of Identity Theft " states that Saleh's article sought to examine the impact of Identity Theft upon perceived security level in e-commerce.... The article has acknowledged the massive increase in online shopping as well as increased vulnerability to technology-related crimes such as Identity Theft.... The question that becomes very critical while dealing with the issue of Identity Theft is whether there is anything that potential victims can do to protect themselves from such fraudulent individuals....
6 Pages (1500 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us