StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Analysis of Identity Theft - Annotated Bibliography Example

Cite this document
Summary
The paper "Analysis of Identity Theft " states that Saleh’s article sought to examine the impact of identity theft upon perceived security level in e-commerce. The author has observed that the massive growth of technology is responsible for increased e-commerce…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Analysis of Identity Theft
Read Text Preview

Extract of sample "Analysis of Identity Theft"

Annotated Bibliography for Identity Theft Annotated Bibliography for Identity theft Criminals, in the of identity theft, arevictimizing organizations and individuals every single day. The fraudulent criminals obtain some key pieces of personal information, which may include addresses, important dates such as date of birth, maiden/sir name, credit information, employment information and SSN among other vital information that they use to impersonate and defraud their victims. Some of the crimes commonly perpetrated today by identity thieves include taking over the financial accounts of the victims and obtaining the victims’ social security funds. The question that becomes very critical while dealing with the issue of identity theft is whether there is anything that potential victims can do to protect themselves from such fraudulent individuals. The skyrocketing rates of identity theft seem to indicate that the victims are uninformed of appropriate measures they should employ in protecting themselves. Biegelman, M. (2002). Identity Thief handbook. Detection, Prevention and Security. New York, NY: John Wiley & Sons. This book seeks to enlighten the both educated professionals and naïve consumers of the subject of identity theft. The author has explored the manner in which this form of crime happens in the modern society, especially among the business people, consumers, organizations and upon assets and sought to inform the potential victims how they are victimized as well as how they can protect themselves and their assets. The book examines the history of identity theft, how it happens, potential victims, main loopholes that make people and organizations vulnerable, laws that govern identity theft, what law enforcers are doing to address the problem of identity theft and the 21 rules of preventing identity theft. Although Martin T. Biegelman is an expert in issues of fraud and corruption prevention, and highly qualified to write on the subject of identity theft, he also sought other expert’s opinions and incorporated them in his book. The book is quite informative on divergent subjects relating to identity theft, thus creates immense awareness of the subject and is very relevant in relation to answering the research question of whether individuals and organizations can protect themselves from identity theft. My assessment: This book has indeed confirmed that both individuals and organizations can be able to protect themselves from identity theft through employment of appropriate protective measures, especially considering that identity theft is an opportunistic kind of crime and vulnerability increases with recklessness and ignorance. This idea is employable in proving that individuals and organizations have the necessary potential to protect themselves from such fraudulent individuals. Drake, E. (2006). 50 Plus One Tips to Preventing Identity Theft. Evanston: Encouragement Press, LLC. This book has explored numerous subjects relating to identity theft, particularly answering the question of how information get stolen, how one can discover if their identity is stolen, how to protect one’s information, warnings signs for vulnerability as well as issues relating to online shopping among other significant subjects. The early warning signs explored by the author helps an individual to know when they are vulnerable to fraudulent identity thieves and thus take the necessary measures towards prevent such incidences. Drakes acknowledges that identity theft is opportunistic crime, thus argues in line with this paper’s thesis that victims have the necessary potential to protect themselves or to minimize probability of such incidences occurring. The book is full of tips on how one can protect themselves and their organizations, drawn from numerous sources, thus making Elizabeth Drake’s book quite relevant in this field. My Assessment: The topics addressed by this book are of great importance in affirming that identity theft is not an impossible challenge to confront. Although identity theft criminals are becoming more experienced every day on how to hack people’s accounts and access personal information, the book has highlighted very important lessons that could help both individuals and organizations in reducing vulnerability. The content of the book will affirm the idea that although not easy, it is possible to minimize exposure to such fraudulent individuals. The author’s ideas will also be very relevant in creating an in-depth understanding of the subject of identity theft. Hedayati, A. (2012). An analysis of identity theft: Motives, related frauds, techniques and prevention. Journal of Law and Conflict Resolution, 4(1), pp. 1-12. This paper is a review of common crimes that lead to identity fraud as well as losses of numerous cash for individuals and businesses every year. The authors highlighted some unique sustainable techniques for prevention of identity fraud for businesses and people. Being a review, it looked into different journal articles, magazines, books, and websites with relevant information on cybercrime, particularly ID theft. The authors acknowledged of the increase of fraudulent cases relating to identity theft every year across the globe. The article analyzed the external micro-environmental factors relating to identity theft as including political, social, economic and technological factors. They highlighted some of the common crimes associated with identity theft as including financial fraud, resume fraud, medical fraud, tax fraud, and immigration fraud. Hedayati’s article is quite expansive in exploring all sorts of crimes relating to identity theft and is quite relevant in informing and enlightening the audiences on the subject matter. The author has drawn information from quite a wide range of resources and authors, making the content quite credible in addressing the issue of identity theft. My Assessment: This article will be used to emphasize the opportunistic nature of identity theft and human role in minimizing such incidences. It will affirm the idea that incidences of identity theft are skyrocketing and that every individual has a duty to cover the loopholes that makes such crimes possible and thus minimize such incidences. The paper reaches a similar conclusion as Biegelman’s work that, though challenging, it is very possible for one to overcome the problem of cybercrime, especially those relating to identity theft. Mulig, E., Smith, M., & Stambaugh, C. (2014, December). Identity Hack! Is Your Company Next? Strategic finance, 33-39. This article provides an overview about identity theft as well as the associated exposure and risks. It also addresses the opportunities and challenges that confidentiality and private issues tend to present to management accountants together with the other members of this profession. The authors described procedures employable by both individuals and organizations in the efforts of detecting and preventing identity theft. They have also highlighted the procedures that these individuals should implement upon discovery of procedure problems. In this paper is a list of some common-sense tactics, which could go a long way in minimizing or preventing incidences of identity theft. The relevance of the article in relation to identity theft is emphasized by the vast increase of identity theft crime, especially among the Americans. They argued that being the fastest growing crime among the Americans, it is important for the people to be equipped with relevant information on how to protect themselves, which makes their work very relevant in addressing the concerns of the research proposal. The paper indeed supports the thesis of this research that indeed it is possible to protect oneself and one’s organization and properties from identity thieves. My Assessment: By listing the eight common-sense tactics employable in preventing identity theft, the authors indeed affirmed the position of thesis that it is possible to have measures in place that prevents or minimizes identity theft. The ideas of Mulig, Smith and Stambaugh will be used when exploring the various methods that organizations and individuals can use on minimizing victimization. The ideas will also be used in examining the various ways through which this form of crime takes place. Saleh, Z. (2013). The Impact of Identity Theft on Perceived Security and Trusting E-Commerce. Journal of Internet Banking and Commerce, 18(2), pp. 1-11. Saleh’s article sought to examine the impact of identity theft upon perceived security level in the e-commerce. The author has observed that the massive growth of technology is responsible for increased e-commerce and plays a very critical role in business advancement. However, although technological growth has been very important to development of e-commerce, it is also characterized by numerous risks, especially because of exposure of personal information. The article has acknowledged the massive increase of online shopping as well as increased vulnerability to technology-related crimes such as identity theft. Although the article is not highly relevant in addressing the question of whether people can protect themselves from identity theft, it goes a long way in examining people’s feelings about the subject, which is very relevant in creating a general awareness of people’s take on the subject matter. The study reveals that there is no direct relationship between perceived internet security and degree of fear of identity theft among technology consumers. The works, however, are quite authentic with the wide consultation of the works of different experts in the field. My Assessment: This article can be used in underscoring the idea that identity theft crimes are on increase and people ought to be enlightened on relevant issues on the subject. Although it does not answer our research question, the article is relevant in enhancing awareness on identity theft, especially in relation to e-commerce, thus enlightening businesspersons on the fears of their clients and equipping them with the relevant information on how they could address such concerns. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Analysis of Identity Theft Annotated Bibliography Example | Topics and Well Written Essays - 1500 words, n.d.)
Analysis of Identity Theft Annotated Bibliography Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/social-science/1866927-course-project-annotated-bibliography
(Analysis of Identity Theft Annotated Bibliography Example | Topics and Well Written Essays - 1500 Words)
Analysis of Identity Theft Annotated Bibliography Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/social-science/1866927-course-project-annotated-bibliography.
“Analysis of Identity Theft Annotated Bibliography Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/social-science/1866927-course-project-annotated-bibliography.
  • Cited: 0 times

CHECK THESE SAMPLES OF Analysis of Identity Theft

Identity Theft

By reviewing the case in the fraud triangle context we will find out the motivating factor behind the Identity Theft [Insert [Insert Unit and [Insert [Insert [Insert Identity Theft In your opinion, what would be your plan to review the case of identity theft toward the university professors?... The first approach would be to review the circumstances that made possible the professors' identity theft in the first place and the compelling reasons for the perpetrators to commit the crime....
2 Pages (500 words) Assignment

Training Series Part 6

After hacking and fooling the online database of “a criminal offense on the Web, a criminal offense regarding the Internet, a violation of law on the Internet, an illegality committed with regard to the Internet, breach of law on the Internet, computer crime, contravention through the Web, corruption regarding Internet, criminal activity on the Internet, disrupting operations through malevolent programs on the Internet, electric crime, Internet crime, sale of contraband on the Internet, stalking victims on the Internet, theft of identify on the Internet” Cybercrimes have now become extremely important to be dealt with....
3 Pages (750 words) Assignment

Project Management - Project Breakdown, Risks and Staffing

The major risks that face the business organisation are staffing, management, and handling of a new project and the risk of running out of business because of the adverse competitors.... For an organization to run and operate smoothly it is the duty of the managers to control… The management should come up with a plan which will ensure effective project management with regard to the risks and challenges that the organisation faces....
4 Pages (1000 words) Assignment

PAst Education

There exist varied individuals characterizing the society that deem moral vices like fraud, violence and theft take place depicts elements who have not undergone any form of instructing.... Individual enhancement, identity as well as self-fluffiness comprise critical aspects emphasized by each model and what all citizens ought to acquire (Owen & Joshua, 2011).... Journal Of Policy analysis & Management, 30(3), 674-676....
2 Pages (500 words) Assignment

Conflict Spectrum in Crime and Analysis

First and foremost, Clark is attempting to state policies ensured that all offenses including prior crimes such as identity theft, fraudulent documents… Moreover, the DoD has a more layered approach along with collaboration of information.... First and foremost, Clark is attempting to state policies ensured that all offenses including prior crimes such as identity theft, fraudulent documents creation, and money laundering will be monitored.... Clark calls for a mesh network analysis in which agencies worked together to ensure that they are sharing information rather than chasing leads by themselves....
1 Pages (250 words) Essay

Protecting Information Resources

Regular analysis hinders potential harm since one detects identity theft promptly.... ne recommendation for preventing or reducing ID theft is protecting one's Social Security Card by refraining from carrying it when not necessary.... astly, checking one's mail early lowers exposure to mail theft.... ATM cards, social security cards, online bank accounts, and registration cards have personal identity numbers that on should always secure....
1 Pages (250 words) Assignment

Condition vs. Statement Analysis

analysis of financial statement is the process of considering an organization's financial statements such as the balance sheet, cash flow statement, and retained earnings.... ment Analysis Affiliation Financial ment Analysis analysis of financial ment is the process of considering an organization's financial statements such as the balance sheet, cash flow statement, and retained earnings.... Financial analysis is therefore a method of evaluating the performance of the business at hand (Studenmund, 2011)....
1 Pages (250 words) Coursework

Infant Protection and Baby Switching Prevention Act 2011

Though not as serious as child theft, baby switching is also a serious problem in hospitals as most health workers are usually busy.... hild theft and infant switching is a rising problem in the world.... The author of this paper "Infant Protection and Baby Switching Prevention Act 2011" discusses and analyzes the validity and viability of the Infant Protection and Baby Switching Prevention Act 2011 and its potential to rectify the problem in the United States hospital systems....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us