This website uses cookies to ensure you have the best experience. Learn more

Identity Theft And Possible Risk In Technology

1977 words - 8 pages

Identity Theft and
Possible Risk in Technology
Identity theft has been a major issue of privacy and fraud. In the data breach analysis from the Identity Theft Resource Center (2013), the number of data breaches from the year 2005 to 2012 increased. In 2012, there had been 49% where the data breach exposed people Social Security Number. The data breach of 2012 has a rate of 27.4% caused by hackers. These breaches were commonly from 36.4% businesses and 34.7% health and medical (Identity Theft Resource Center 2013). The number of identity theft varies from physical possession to digital possession. At least one-fifth of trash cans contains papers listing people’s credit card number and personal information. People that throw away their trash mails contain much personal information that is useful to steal someone's identity (Davis, 2002). Technology becomes a need where people use it daily and as a result it has also become a use for identity theft as well. Throughout the years as technology develops so does identity theft. This paper shows the types, methods and technique used for identity theft, and it also examines possible risk of identity theft from current technology.
What is Identity Theft?
Identity theft is a term used for describing criminal that uses individual’s identity without consent. A common crime of identity theft would be identity fraud. Many of the crimes are regularly connected with money-related issues (Reyns, 2013). With technology being commonly used nowadays we are getting more dependent on it for business, financial, medical, and other forms. As a result this became a target for identity thieves as well. The Internet provides us information and accessibility, but information being stored on the Internet easily be found and with a possibility of divulging personal information. This is generally referred to as Cyber-Identity theft.
Cyber-Identity theft is an easy method where people can steal an individual’s identity without going through their trash, mails, and other method that does not need technology. Cyber-Identity theft involves the misuses of online or Internet identity tokens. Our identity tokens that we use online, such as email address, social networking, web pages and their user-name and password login. All these are considered our online identity tokens or our alias. From these tokens, identity thieves can steal this information we have on the internet without knowing who we are in person. These information that can be stolen or be dug up online would involve our name, address, contact information, phone number, tax file numbers and even social security numbers. These Cyber-Identity thieves normally use social engineering as a way of hacking to obtain information (Roberts et al., 2013).
Types of Identity Theft
Identity theft are around for quite some time and there have been different types of identity theft to it. For instance, according to the Federal Trade Commission ("Taking charge what," 2013), there is...

Find Another Essay On Identity Theft and Possible Risk in Technology

Identity Theft in Our Contemporary Society

2949 words - 12 pages with current anti-virus software or assume the risk malicious attacks. I have highlighted the causes that make identity theft America’s number one white collar crime. With the prolific development of the Internet, one of the major roots of cyber-crimes and identity theft is the fact that technology has transformed at a much faster velocity than businesses and consumers are able to adapt. Experts in the field, whether they are voicing their

Internet - Disclosure of Personal Information On-line and Identity Theft

1870 words - 7 pages world. In Ignacio Ramirez’s case we see this is true. Ramirez, who resides in San Diego, California, was a victim of an identity theft carried out in another area, which, in this particular case, was Boston, Massachusetts. What can we do to protect ourselves from identity theft on the Internet? The best possible solutions for securing information on the Internet are rooted in better technology and strict government

How to Stay Safe from Identity Theft and Fraud

1532 words - 7 pages There are moments in life were we wonder if we are really safe. Safety should not only include being physically safe but also include being safe through your identity. Many people are victims of identity theft and do not even realize it. Have you ever stopped to think are you really safe from identity theft criminals? Identity theft can happen to anyone. No matter your age if you have personal information that they can take they will. Identity

Gender, Technology and identity in How Sex Changed

726 words - 3 pages . In there the author also address the importance of the creation of new identities as well as how medication constrain how we think of our self. The author also explain how technological progress dissolve the idea of gender as well as how the study of genetics and eugenics impacts in the ideas about gender/sexuality and identity. But more importantly how technology has change the idea of biological sex as unchangeable. Joanne Meyerowitz follows

Communication Technology and Canadian Identity

1374 words - 5 pages Communication Technology and Canadian Identity Introduction We are in the middle of a global information revolution driven by the rise and convergence of information and communication technologies. The telecommunications sector is changing at warp speed, driven by technological innovation that results in new fragmenting and regionalizing entity. I will examine some of the many forms of cultural fragmentation that take place due to the

Home Computers; our greatest weakness in the fight against identity theft

659 words - 3 pages financial records) on their home PCs, and sending other sensitive data (such as credit card numbers) over the Web. Meanwhile, identity thieves are acquiring more devious software tools allowing them virtual free access to our home systems and placing more potential victims at risk. Identity theft will inevitably increase, but the good news is, you can protect yourself now. Keep security uppermost in mind. Use and update your anti-virus software regularly and for best protection incorporate a Firewall into your system. These simple steps will increase your protection against identity theft ten-fold.

Biometric Technology in Verifying a Person's Identity

1774 words - 8 pages . In fact, both could be stolen. Conversely, biometric technology is capable of establishing a much closer relationship between the user’s identity and a particular body, through its unique features or behavior. Biometric verification performs comparison of biometric template with the one it has on records. Face recognition is one of the techniques used in biometric verification. While performing face recognition on mobile platform it does not

Risk and Resilience in Adolescence

1829 words - 8 pages Within psychology adolescence is described as a period of transition from childhood to adulthood. It is a period between year twelve and late teens, when the physical growth is complete, the person becomes sexually mature and establishes identity (Nolen-Hoeksema, Friedricson, Loftus & Wagenaar, 2009). During this period of development, the individual has to face several risk factors, which are considered as a hazard on normal psychological

War and Risk in 1914

3334 words - 13 pages War and Risk in 1914 The assassination of Archduke Franz Ferdinand and his wife on the 28th June 1914 began what has since been termed the July Crisis, a month or so of intense diplomatic wrangling and military preparation. The crisis ended in early August 1914 with all five major European powers at war, a European war that ultimately escalated into World War I. During the war itself, aggressive premeditation by each

This essay is about secruity risk List four possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist

1481 words - 6 pages Question 1a. List four (4) possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist.There are 4 possible security risks that the bank and the clients are facing in the present network setup.Firstly, there may be a possible security risk of interception occurs. Interception means that unauthorized party gain access to an asset. Because client send their

AIDS Epidemic in Sub-Saharan Africa: Possible Solutions and Causes

2257 words - 9 pages AIDS Epidemic in Sub-Saharan Africa: Possible Solutions and CausesSub-Saharan Africa is made up of about ten percent of the world's population. In 2001, two-thirds of the 40 million people living with HIV resided in this region (Hearing 2). Only in Sub-Saharan Africa is this epidemic not concentrated to certain risk groups. The HIV virus is indiscriminate to all of the people living there with almost the same number of women affected as men (De

Similar Essays

Identity Theft In America Essay

1525 words - 7 pages “Most people are other people. Their thoughts are someone else’s opinions, their lives a mimicry, their passions a quotation” (Oscar Wilde). This quote illustrates how in our world, a person’s identity can be easily changed. Many Americans are effected by this problem today. Citizens, criminals, and the government all play a role in this process. However, many disagree as to whether identity theft should be allowed in our country. Based on the

Juvenile Victimization In Identity Theft Essay

2325 words - 10 pages juvenile victimization in identity theft (Woods, 2014). Problem Statement According to news reports and recent studies, children are at higher risk for identity theft than adults, infants and youth have become greater targets to criminals in the growing trends of this catastrophic crime. Identity theft is a crime of which is difficult for an adult to recover from and get their life back after falling victim, much less an infant, child, or even

Internet Fraud And Identity Theft Essay

1210 words - 5 pages Internet Fraud and Identity Theft The Internet is not just a medium for information; it is a tool for communication. Creating a new social sphere and environment, the Internet allows virtually anyone to be a participant. Chat rooms, discussion boards, instant messaging services and e-mail are all mediums that allow individuals to engage in communication. However, although the Internet is a public domain, individuals do not have to honestly

Identity Theft And The Internet Essay

1543 words - 6 pages service line. After being transferred here and there, answering this question and that one, it hits you: you're just another victim. This is the way I discovered last year that I had become a victim of identity theft. Weeks and months later, I learned that, in addition to making fraudulent charges to my credit card, the criminals opened several cell phone accounts using my name, address, date of birth, and social security number. They even had the