Identity Theft

Only available on StudyMode
  • Download(s) : 63
  • Published : March 6, 2013
Open Document
Text Preview
“Identity Theft”

“People must be vigilant in protecting their identities” this is the argument that the police department uses to be able to get personal information of people from their cellphones. Unfortunately, as long as identity theft is a profitable venture, it will not disappear. The only way consumers and businesses can deal with it is to learn how to prevent it and then take those preventative measures. The most important action anyone can take to prevent against identity theft is to be aware of how personal or financial information is disseminated and the ways in which such information is vulnerable to misuse.

By: (Alex K., Newton, and Heather 2)

CyberSafety: Identity Theft

An incredible amount of information about people is available on the Internet in public records, which are created whenever people interact with the legal system or the government. Births, deaths, marriages, divorces, and a host of other events are a matter of public record. Records about the events in people’s lives have been maintained for longer than people have been able to put pen to paper.

Another thing people can do is to be mindful of their presence on the Internet. Are they leaving an identification trail? Shopping is just one Internet activity that might provide an identity thief with lucrative information. Be sure when shopping electronically, that the Web site is considered secure. It should say on the Web site that it is secure; another sign is the “s” in the URL after http: https.

CITATION: (J. Vacca, and M. Vacca 68-69)
Vacca, John R., and Mary E. Vacca. Identity Theft. New York, NY: Chelsea House, 2012. p.68-9.

“Computers and society”

For many people, the commercial use of data about them represents the computer era’s most disturbing threat to privacy... Some social critics argue that in a society in which citizens increasingly define themselves by consumer choices, they inevitably feel naked when they realize that unknown marketing mavens are compiling profiles of them based upon their purchases...

It is very easy to put data into a computerized database-and very difficult to get it out. Hitting “delete” doesn’t do it: Deleting a file only gets rid of the electronic “pointer” that puts the file on the screen... A pro easily can recover deleted files from a hard drive. Furthermore, even a true deletion won’t delete a file from the other computers to which it may have traveled over the Internet.

CITATION: Wagner, Roberts, Brin, Stephens, Weber (69-100).

Wagner, David, Glen Roberts, David Brin, Gene Stephens, and Thomas E. Weber.Computers And Society. San Diego, CA: Greenhaven, 1997.

IDENTITY THEFT

The ranks of identity theft victims are large. Just how large may depend In broad terms — including a thief's use of existing credit card, bank or other accounts — the number of victims is about nine million a year, or roughly 4 percent of the United States adult population, according to surveys by Javelin Strategy and Research, an independent research firm, in tandem with the Better Business Bureau.

No exact measure of the crime's costs exists, but the Javelin study estimates, based on survey responses from victims, that the average annual cost per stolen identity is $6,300, a 22 percent increase since 2003. The Javelin study also found that about three million Americans each year fall victim to the worst kind of identity theft: new account fraud.

Citation:

Article from “The New York Times”.

http://www.nytimes.com/2006/05/30/us/30idtheftside.html?ref=us

“Government Legislation Will Not Be Adequate In” Eliminating Identity Theft.

Identity theft is a prevalent and fast-growing crime in America in the twenty-first century; it is estimated that between 9 and 10 million Americans become victims of identity theft each year. Identity theft continues to spread because it is difficult to prevent and easy to commit, since identity thieves require as little as a...
tracking img