Id Theft Literature Review

Only available on StudyMode
  • Download(s) : 135
  • Published : November 5, 2011
Open Document
Text Preview
         

Ide ty Thef entit T ft Lit ture Re w terat e eview
Vinod K Kumar, MS080 055
Identity thef is the faste growing white-collar crime. ft est r Identity thef and identi fraud are terms used to refer ft ity to all types of crime in w which someo wrongfu one ully obtains and uses anothe person‘s p d er personal dat in ta some way th involves f hat fraud or dec ception, typi ically for economic ga In this r gain. review I have presented some of the cases if identity thef and tried t classify th f ft to hem according to their purpose and the harms cause o ed because of i it.     01-Oct-11

  IISER Mohali

Table of Contents
Introduction:.............................................................................................................................................. 2 Types of Identity Theft ............................................................................................................................. 2 Did privacy cause identity theft? – Lynn Lopucki ................................................................................ 3 An Evaluation of Identity-Sharing Behavior in Social Network Communities –Stutzman .................. 3 Human Identification Theory and the Identity Theft Problem - Lynn Lopucki.................................... 4 Case study : Identity theft used in Financial scams .............................................................................. 5 Cyber Security- Identity Theft Protection in the High Tech World : Allen Cummings ....................... 6

ii   

IISER Mohali

Page 1 

Identity Theft Introduction
Introduction: Identity theft is the act of using someone else’s personal information, or their actual identity for personal gain. . Identity theft is defined as any unauthorized usage of another's personal information with a fraudulent intention1. Frighteningly it happens without you even knowing it and once you have become aware of it, in most cases the damage has already been done. Identity theft is a product of the new age of information technology and as such fits nicely into the literature of opportunity theory in criminology which examines how offenders take advantage of new (and old) ways of doing business and conducting the affairs of everyday life2. It is the world's fastest growing white-collar crime1. Contrary to what the crime sounds like, it is not necessary that a person's complete identity be taken over in order for the theft to be committed. This personal information may include items such as credit cards, social security numbers, and/or state issued forms of identification Types of Identity Theft

Although there are many different methods that one can utilize to rip someone off in an identity theft type scam, there are really only two basic types of actual identity theft 1. Account takeover: - It is a situation when a thief gets hold of someone’s actual physical credit card, or perhaps just the card number and expiry date, using it to purchase services or products. This works out extremely well for the thief, as the credit card owner doesn’t usually notice the additional purchases until they either receive their monthly statement in the mail or have attempted to use the card and found that it has reached the maximum limit allowed. 2.

Application fraud (true name fraud):-In order for a thief to be successful at application fraud, they must have access to a good deal of someone’s personal information such as full name, address, place of work, salary, driver’s license number, date of birth etc. Of course not all of these pieces of information would be necessary for a thief to get away with application fraud but certainly a combination of some of the above would be required.

Identity theft can happen in a variety of ways, but the basic elements are the same. Criminals first gather personal information, either through low-tech methods such as stealing mail or workplace records, or “dumpster diving,” or through complex...
tracking img