Identity Fraud: The Heinous Impersonator Outline - 25. Retrieved from https://studentshare.org/social-science/1616325-outline
Identity Fraud: The Heinous Impersonator Outline - 25. https://studentshare.org/social-science/1616325-outline.
Today, my intent is to enlighten you about: 1. Identity dupery. 2. Forms of identity fraud and factor predisposing one to the crime. 3. Ways of preventing identity fraud.(Transition: To begin with, I would like to provide you with facts showing the worryingly progressive trend of identity theft.)I. Trends of Identity Frauda) Technological advancement has contributed significantly to the growth of identity theft. This is an aspect attributable to the ease of access warranted by the internet. b) Identity fraud is currently considered to be the most rapidly growing form of crime in America (Gerard, Hillison & Pacini, 2004).c) As a matter of fact, the prolific nature of this crime is overwhelming for law enforcers mandated with the responsibility of protecting the public.d) An estimated 15 million Americans are victims of fraudulent identity theft (Gerard et al., 2004).(Transition: Many of you might wonder about the situations that would make you susceptible to identity theft.)1. Misplacement of credit cards.2. Unsecure storage of personal banking information.3. Improper storage of checkbooks. 4. Easy access to personal information such as names, and social security numbers (Lacey & Cuganesan, 2004).
(Transition: The mentioned vulnerability loopholes expose individuals to diverse types of fraud…)A. Forms of Identity fraud1. Mortgage fraud.2. Medical identity fraud.3. Financial fraud.4. Criminal identity fraud.(Transition: Despite the scary notion of one’s identity being stolen several steps can be taken to avoid identity dupery…)A. Ways of preventing identity theft1. Keenness in the storage of personal information.2. Installation of security firewalls for information that can be obtained online (Kerley & Copes, 2002).
ConclusionA. In conclusion, identity fraud is a force to be reckoned with and if not avoided through sufficient securing of information, it can have detrimental effects on a victim’s life.
Read More