StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Identity Theft (PII) - Research Paper Example

Cite this document
Summary
Identity Theft Introduction Identity theft is the crime that involves stealing of a person’s private information “in order to impersonate that person in a legal sense”, according to Vacca (2005, p.137). When a person’s identity is stolen, he is at great risk of facing a terrifying number of monetary and individual dealings done in his name by the thief…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Identity Theft (PII)
Read Text Preview

Extract of sample "Identity Theft (PII)"

Identity Theft Introduction Identity theft is the crime that involves stealing of a person’s private information “in order to impersonate that person in a legal sense”, according to Vacca (2005, p.137). When a person’s identity is stolen, he is at great risk of facing a terrifying number of monetary and individual dealings done in his name by the thief. Technology, along with its pros, has introduced exceedingly technical and chic means of acquiring someone’s basic identifying information.

Whatever means the thief uses, identity theft brings great damage to the victim’s name and reputation as the victim is solely left responsible for whatever financial or personal loss he faces. One often has to reveal bits of his personal information while doing online transactions, such as, his name, address, telephone number, bank information, credit card information, and etcetera1. The thief, after stealing this information, can misuse it by, for instance, applying for loans in the victim’s name, changing his billing address, obtaining driving license, applying for jobs, applying for insurance or new banking accounts, getting authorization for electronic transfers by using the victim’s electronic signature, or any other fraud.

How Identity Theft is Accomplished On the internet, identity theft is being accomplished using techniques like sending Trojan horses, which are destructive programs, into the computer system, and important passwords and useful information like social security number is transferred to the thief. Another way to steal identity is email phishing. The victim is sent emails telling the victim that they are from so-and-so enterprise and scamming him by directing him to a fake website which asks for his personal information.

Though, internet identity theft has made people uncertain about shopping and selling online, checking their bank statements online, visiting auction websites or entering into business contracts or transactions; however, computer forensics2 has played its part in helping law enforcement agencies in gathering digital evidence and identifying stolen identities as well as the criminals involved (Newman, 2009). Identity theft has also raised the problem of cyber stalking. Anderson (2008), who works with NTI (New Technologies, Inc.) writes that: NTI was involved in a case where an individual assumed the identity of a past employee that had been discharged by a business.

That identity was used, over the Internet, to terrorize a female Human Resources Manager who had fired the individual. After several weeks of investigation we discovered that the communications were fabricated by a peer worker within the corporation. This, and many other such cases occurring due to insecure internet environment, have been identified and solved by forensic computing strategies. Ethical Issues There are some socio-ethical issues regarding identity theft. It is important to educate the users of internet and computer systems about “intellectual property rights issues, privacy/ surveillance issues, access to data issues and issues of human-computer interaction” (Stahl, Carroll-Mayer & Norris, 2006, p.298). They should be able to relate principled reasoning to ethical cases.

They should know that the other person’s identity is something that is his own property and not theirs; that they have no right upon others’ personal information, and they cannot use or disclose it without the owner’s permission. A virtual world businessman should respect his employees’ and clients’ personal identification data and should take measures to lock and protect the databases and data warehouses from unauthorized access. Even at very personal level, an internet user must know that he is supposed to protect and defend the second person’s identification information and at the same time, he should be aware of security breaches proposed by the World Wide Web so that he is able to protect his own identity.

Conclusion Putting everything together, it is very important for the consumers to remain alert while they are interacting with the online community. In spite of so many laws, legislations and Acts that have been passed to ensure the consumers’ protection online, still cases happen where they can become a victim to fraudulent activities and scams put forward by retail companies and vendors. Though, there are numerous true and honest websites performing in a sincere and straightforward fashion, but still, it is always a sensible idea to protect one’s identity and personal information before giving it out.

It is vital to educate the e-consumers about their rights of protection so that they do not get trapped in the hands of criminals. The more the awareness about the consumer protection, the lesser will be the fraudulent activities taking place in the online world. References Anderson, M.R. (2008). Identity theft in financial crime cases. Identity Theft: Computer Forensics to the Rescue. Retrieved August 7, 2011, from http://www.forensics-intl.com/art18.html Newman, R.C. (2009). Computer Security: Protecting Digital Resources.

USA: Jones & Bartlett Publishers. Stahl, B., Carroll-Mayer, M., & Norris, P. (2006). Legal, professional, and ethical content. Forensic Computing: The Problem of Developing a Multidisciplinary University Course. Retrieved August 7, 2011, from http://www.cse.dmu.ac.uk/~bstahl/publications/2006_forensic_computing_course_development.pdf Vacca, J.R. (2005). Identity theft. Computer Forensics: Computer Crime Scene Investigation. USA: Cengage Learning.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Identity Theft (PII) Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1430216-personally-identifiable-information-pii
(Identity Theft (PII) Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1430216-personally-identifiable-information-pii.
“Identity Theft (PII) Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1430216-personally-identifiable-information-pii.
  • Cited: 0 times

CHECK THESE SAMPLES OF Identity Theft (PII)

Identity Theft: Definition, Effect on Public and Ways of Protection

Defining identity theft, its effect on the public and finding ways on how a company or an individual can be protected from Identity Thieves I.... Introduction identity theft is one of the most pervasive problems in our computerized era.... hellip; The identity theft Resource Center (see www.... If the financial information of a certain person is compromised and the identity theft gain access to the person's bank accounts, credit cards and others, the theft may be able to easily steal the money of that person (Abagnale, 2007)....
8 Pages (2000 words) Research Paper

Personally Identifiable Information (PII) : Ethical Implications

Personally Identifiable Information (pii) – Ethical Implications Name: Institution Date: Personally Identifiable Information (pii) - Ethical Implications Personal Identifiable Information abbreviated as pii refers to the info that can be used to contact, locate or identify a single person.... If by any chance pii was not in existence, then it would be extremely difficult to hunt down and identify individuals since one name is shared by many people....
3 Pages (750 words) Research Paper

Consequences of Attacks via Cyberspace

The first level, referred to by Schwartau (1994) as interpersonal Attacks,' focuses on identity theft, both of individuals and of corporations.... On the corporate level, however, identity theft may be identified as a serious annoyance more than a problem insofar as the theft of corporate identity is much more difficult than the theft of individual identity and much easier to disprove.... Much has been written about the consequences of cyberattacks and the extent to which the theft, unauthorized access or tampering with information has the potential to wreak havoc upon individual lives, companies and economies....
5 Pages (1250 words) Essay

Identity Theft among Students

In the paper “identity theft among Students” the author analyzes the problem of identity theft, which is getting so bad that the US Federal Trade Commission says that identity theft is America's largest consumer complaint.... These college students offer a prime target for identity theft schemes.... hellip; The author states that college students also find it odd that they may be targets for identity theft when they feel that they are safe at school and don't have a lot of information that thieves could steal from them....
2 Pages (500 words) Assignment

The History of Identity Theft: the UNESCO Mission and US Federal Efforts

hellip; According to the United States Federal Trade Commission, over $10 million in consumer funds are lost annually to identity theft in the country, totaling over $50 billion of reported losses.... million consumers became victims of identity theft, with 6.... At the Sixteenth Session of the United Nations Economic and Social Council (UNESCO) Commission on Crime Prevention and Criminal Justice in 2007, the Results of the study on fraud and the criminal misuse and falsification of identity in a Report of the UN Secretary-General toward 'international cooperation in the prevention, investigation, prosecution and punishment of fraud, the criminal misuse and falsification of identity and related crimes' set the international platform toward legislative policies pertaining to cyber identity theft, and the economic impact of transnational fraud....
11 Pages (2750 words) Essay

Personally Identifiable Information

Therefore, training and knowledge of the pii is of unmeasurable vitality in today's society.... To sufficiently protect pii, one must comprehend what Personal… pii is the type of information that distinguishes the identity of a person e.... Department of Commerce (DOC) in partnership with ‘National Institute of Standards and Technology (NIST)' established Special Publication (SP) 800-122, which protects the pii existing in databases....
4 Pages (1000 words) Research Paper

The Current Meaning of Identity Theft

This paper will review the current meaning of identity theft as well as the various forms it can take.... hellip; This essay analyzes that according to the identity theft and Assumption Act of 1998, identity theft, occurs when someone is "knowingly transferring or using, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, in the unlawful activity that constitutes a violation of federal law....
16 Pages (4000 words) Essay

Information Security, Identity Theft and Identity Fraud

… The paper “Information Security, identity theft and Identity Fraud, Components of an Effective Security Education” is a  convincing variant of assignment on information technology.... The paper “Information Security, identity theft and Identity Fraud, Components of an Effective Security Education” is a  convincing variant of assignment on information technology.... Non-Repudiation: This refers to the assurance that a particular sender is supplied with proof of delivery and that the respective recipient of the transaction is equally provided with a proof of the identity of the sender, therefore, making it impossible for any of them to deny having processed the information....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us