StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Identity Theft Policies - Research Paper Example

Comments (0) Cite this document
Summary
The goal of the present study is to analyze the effectiveness of various policies aimed at identity theft prevention. Identity theft per se is fraud which takes on many forms. As discussed in this paper, identity theft may be more appropriately termed as personal identity theft…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Identity Theft Policies
Read Text Preview

Extract of sample "Identity Theft Policies"

Download file to see previous pages Roberson (2008), however, observed that the terms “identity theft” and “identity fraud” are often used interchangeably, but maintained that the aforementioned terms are legally distinct. The former has something to do with taking something directly from the victim without consent, whereas the latter involves deception or scam by the perpetrator in the process of taking something from the usually unsuspecting victim.
Identity theft is not an aftermath of the digital age, but rather, an act which evolved with the passing of time. For instance, Hoffman and McGinley (2010) consider the term “identity theft” as “a modern name for an ancient crime” (p. 1). It may be recalled from the Bible that Isaac’s son Esau sold his birthright to his brother Jacob for a bowl of stew (Genesis 25: 29-34, New King James Version [NKJV]). Later, with the aid of goat’s skin and the birthright, Jacob deceived his dying father Isaac into blessing him instead of the first-born Esau (Genesis 27: 1-39, NKJV). This could well be the earliest account of identity theft on record.
In the United States (US), the very first victim of identity theft in the modern world was Hilda Schrader Whitcher, secretary in a wallet company, whose Social Security card facsimile was used in the 1930s as an insert in the wallets as a marketing strategy to show that the card actually fits into the wallet. As of 1943, close to six thousand other individuals were found to have been illicitly using Witcher's Social Security number and to date, 40,000 people were reported by the Social Security Administration to have used her number (Hoffman and McGinley, 2010; Biegelman, 2009; Ritchie, 2006; Hamadi, 2005). Biegelman (2009) considers Nigerian fraud activities which became rampant during the early 1970s as a significant boost for credit card fraud in the US.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Identity Theft Policies Research Paper Example | Topics and Well Written Essays - 2750 words, n.d.)
Identity Theft Policies Research Paper Example | Topics and Well Written Essays - 2750 words. Retrieved from https://studentshare.org/people/1740288-business-report-identity-theft-policies
(Identity Theft Policies Research Paper Example | Topics and Well Written Essays - 2750 Words)
Identity Theft Policies Research Paper Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/people/1740288-business-report-identity-theft-policies.
“Identity Theft Policies Research Paper Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/people/1740288-business-report-identity-theft-policies.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Identity Theft Policies

Identity Theft

... the bank to freeze the account. The best way to fight identity theft is to prevent identity theft. The proverb ‘prevention is better than cure’ is relevant in this regard. It is the responsibility of the individual himself/herself to ensure the security of his/her identity. We must be very careful when we provide information regarding our identity on websites or to other institutions. It’s our duty to check whether the service(s) can keep the information safely. We must check whether their privacy policies can cope with our criterions. Immense care must be taken when we disclose our identity information on social networking sites. Privacy options on those sites should be properly utilized. The computer should be installed with a good anti...
6 Pages (1500 words) Essay

Identity Theft

...? Identity theft The issue of theft identity has been such a hectic one to many people. Everyone can become a victim of theft identity. Although it may take a long time before victims can suspect or find out that they are victims of identity theft, in most cases, much damage is caused by this incident by the time they realize. This paper will assess various methods through which people’s identity can be compromised. It is also apparent that victims of identity theft experiences different and great loss. The paper will also highlight losses caused by identity theft. There must be a way through which law enforcement agencies and courts deal with such crimes. In this regard, the paper will also assess how these bodies handle such cases...
4 Pages (1000 words) Research Paper

Identity theft

...? Identity Theft Identity Theft Introduction Society has always had a certain criminal element to it that seeks personalat the harm and expense of others. With the advent of the technological age, criminal have become more savvy and responsive to any attempt to thwart their efforts. One of these innovative ideas that has become quite popular in recent years involves the stealing of another person’s identity. Identity theft involves the use of another individual’s personal information to gain access to financial and other information that would benefit the criminal. Identity theft has become an increasing problem globally in recent years, causing millions of people undue emotional and financial trauma, while costing society a great deal...
3 Pages (750 words) Essay

Identity theft

...? Identity Theft: The Need for Protection and Security Identity Theft: The Need for Protection and Security IntroductionSociety has long had a certain criminal element that would seek out their own personal gain at the harm and expense of others. With the advent of the technological age, criminals have become even more savvy and responsive to any attempt to thwart their efforts. They have also become more innovative in their devices in recent years. One such example is the concept of stealing the identity of another person for the express purpose of gain, either economic or logistical (Ciechanowicz, 2010). Identity theft involves the use of another individual’s personal information in order to gain access to financial or other information...
10 Pages (2500 words) Research Paper

Identity Theft

...Identity Theft Identity theft is up-and-coming as the most important crime of the 21st century. Identity theft is a term used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.1Identity theft can be broadly categorized as Financial Fraud and Criminal Activities. The most common forms of identity theft for Financial Fraud occur when someone obtains another person's social security number, driver's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false loans. Criminal identity theft, the most common non-financial...
10 Pages (2500 words) Essay

Identity Theft

... The aim of the research is to define what identity theft is, what prevention measures exist to minimize the negative impact of identity theft and how organizations respond to the facts of identity theft. The research will be conducted through the online survey. The results will be analyzed through the qualitative and quantitative means. The key words: identity theft, victimization, response. Chapter One Context of the Problem Identity theft has been a problem for years, and has become one of the fastest growing crimes in the nation. Identity theft is when someone uses your name, social security number, financial information and any other identification without your knowledge to commit fraud and or other crimes. Identity theft...
10 Pages (2500 words) Essay

Identity theft

... has become the source for criminals to gather identification data, like passwords or banking information. Many people while exploring the Internet in a hurry respond to "spam" ­ or unsolicited email ­ that request identifying data in the pretext of offering some benefits. Here people do not realize that in many of such cases the person who has requested for personal information has no intention of passing on any benefit to them. However Internet is not the only source. Misplaced or stolen wallets containing credit cards or other personal information, stolen laptops again containing personal data can prove easy targets for identity thefts. To prevent any kind of fraudulent use of one’s identity one must have a security policy and certain...
10 Pages (2500 words) Essay

Identity Theft

...IDENTITY THEFT Identity theft is a serious and new crime that the legal system is currently grappling with. It is not an easy one to deal with and its repercussions are serious. It can take years to recover from this kind of crime. Taking peoples most personal information and using it in malicious ways can be a devastating experience. There are a number of useful precautions that a person can take to ensure that their personal data is protected and is not vulnerable to theft by criminals. The first is to ensure that you have strong passwords protecting your online information. You should not use your name as a password or your birthday. It is always best to use a combination of numbers and letters. Do not write your password down in your...
1 Pages (250 words) Research Paper

Identity Theft

...Identity Theft [Insert [Insert Unit and [Insert [Insert [Insert Identity Theft In your opinion, what would be your plan to review the case of identity theft toward the university professors? Why?  The development and advancement of technology means that we have to live in an increasingly interconnected information age and yet it also poses a risk of security and fraud. The first approach would be to review the circumstances that made possible the professors’ identity theft in the first place and the compelling reasons for the perpetrators to commit the crime. A useful approach is the Fraud Triangle which was developed by Cressey R Donanld. By reviewing the case in the fraud triangle context we will find out the motivating factor behind...
2 Pages (500 words) Assignment

Identity Theft

...Identity Theft While it may seem that identity theft is something new, it is a crime almost as old as there are names. It has even been romanticized in such tales from the legend of King Arthur and the Prince and the Pauper to more modern versions as clones in The Sixth Day and face transplants in the movie Face Off. Although nothing new, Identity Theft has increased exponentially over the past couple of decades. This has primarily been due to the proliferation of the World Wide Web and the potential access to electronic information. However it is also in no small part due to the unfortunate ease with which information can be accessed by credit card agencies and other financial institutions as well as the low threshold of security...
17 Pages (4250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Identity Theft Policies for FREE!

Contact Us