StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Identity Theft: Problems and Solutions - Essay Example

Cite this document
Summary
The essay "Identity Theft: Problems and Solutions" focuses on the critical analysis of the major issues in problems faced by people due to identity theft and the solutions that have been designed to reduce this act. The main focus is on the theft of identity using computers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Identity Theft: Problems and Solutions
Read Text Preview

Extract of sample "Identity Theft: Problems and Solutions"

Identity Theft: Problems and Solutions Introduction: The improvement of technology has been immense over the past few decades. The graph of the improvement has been sloping upwards and is continuing to be so. Technology has become a very important part of everyone’s life and now a switch of a button can do almost anything. Technological developments have however caused a number of problems for the society as well. With the increase of technological benefits, there has also been a lot of misuse of the technology. One of the biggest misuses is the fraudulent act of Identity Theft. This report aims at focussing on the problems faced by people due to identity theft and the solutions that have been designed to reduce this act. The main focus is on the theft of identity using computer. The next section aims at explaining what Identity theft means furthering which the problems are touched upon. Identity Theft: The loss and misuse of personal identification information is called Identity theft. Personal identification information like a social security number, name, place of birth, mother’s maiden name, phone number, etc. act as the only information that identify an individual. This information is used for different purposes like opening a bank account, stealing money, pension payouts or to gain any other benefits. The loss of any of the information can help the id thieves to use this and create a new id for themselves. The thieves become the accused and the person whose id is stolen becomes the victim. A victim can face major consequences with the loss of identity. The misuse of identity of an individual can lead the individual to suffer from bad credits, incorrect criminal acquisitions (Consumer Report, 2008). Identity Theft: Problems: With the constant improvements in technology, there has also been an increase in the mis-utilisation of the available technology to steal people’s identities or other types of frauds. One of the biggest issues has been that of the influence of Internet over the increase of the frauds. With the increased usage of the Internet, it has been noted that there have been an increase fraudulent activities over the Internet as well. There is a lot of information that flows around the Internet at any given point in time, with the increased usage of the Internet for different facilities like payments of bills, online bookings, e- shopping, etc (Chad, 2004). All these activities involve a lot of personal information floating all over the Internet. The Internet identity theft differs from the normal form of identity theft in a number of ways. In this form of theft the victim will not be aware of the theft for a long time and sometimes by the time a victim can realise the theft, it is too late. Every transaction we make over the Internet leaves behind a trail with one or another of our personal information. This is one of the easiest paths used by thieves to get our personal information. When payments are made online, the merchants contact our credit card company for authorisation; here again information can be easily leaked out. Marketing companies that create data basis with all our information can also have leaks, like a malicious employee who has easy access to the database could be bribed to get out personal information. Also a computer infection called spy ware can be created on the victims systems by individuals, and this can collect all our personal information, spending habits, internet usage, passwords, etc, and send it to the individual for his own benefit or for selling to other for a price (Spam Laws, 2008). Other sources of collecting personal information are through unsecured sites. Also the personal information of individuals can easily be got through phishing mails. Also with the growing importance of computers in our lives the number of ways to steal information has grown even more. The next sections aims at finding the right solution to the various problems that are faced due to the increased use of computers in our daily lives and the increased theft of identity. Solution to Identity Theft: With the increasing cyber crime, and cyber criminals being able to steal within a matter of seconds, there is only one solution to prevent theft. The solution has been backed by the major companies like Goldman Sachc, Byers, Kleiner Perkins etc. LifeLock is one of the best and most relied on solution to prevention of identity theft. LifeLock is a company that was started to help customers prevent identity theft. The company is head by some very professional, best, and most experienced people. George Reyes, CFO Google, has recently become agreed to be a part of LifeLock Board of Directors. LifeLock is a service which is provided at very lo costs to help prevent fraud and ensure that no personal information of the customer is secure (LifeLock, 2008). There are a number of steps that individuals can take to ensure and keep themselves safe from the identity frauds. Simple steps like monitoring the bank account regularly, opening even junk mails from banks will help individuals do their bit to ensure no one has stolen the identity and opened new accounts with the individual’s identity (Coates, 2007). Conclusion: The computer crimes do not only involve the Internet, but may also be caused due to breach in data security or computer security. Thus to conclude the essay, looking at the different and many risks that an individual faces in regards to their personal information it is essential that steps be taken to ensure the safety of their data. The government has come up with a lot of help for victims of identity theft and is trying to ensure that this is eradicated completely. It is essential that customer do their bit against identity theft to ensure their own safety (Doyle & Bagaric, 2005). The risks involved are numerous and it is in the hands of individuals to ensure their data is well protected. Despite the technological growth and advancement banks and other institutions are trying their best to ensure complete safety against identity theft. It is important that each one of us understands the seriousness of this crime and ensures our safety. Together with them and the government and a little diligence from the customers end, it would be quite possible to completely remove this crime from society. We need to ensure that technological developments are used in productive ways rather destructive. References Chad, 2004, ‘Tip #1309 – Phishing Spams’, World Start Inc., 2004, Accessed on 29 October 2008, Retrieved from http://www.worldstart.com/tips/tips-pr.php/1309 Consumer Reports, 2008, ‘ID leaks’, September 2008, Consumers Union of United States Coates, N., ‘Misguided Fears’, The news Media and The law, 2007 Doyle, C., & Bagaric, M., 2005, ‘The rights to privacy: Appealing but flawed’, School of law, Australia LifeLock, 2008, ‘How LifeLock works’, 2008, Accessed on 28 October 2008, Retrieved from http://www.lifelock.com/lifelock-for-people Spam Laws, 2008, ‘All About Identity Theft’, 2008, Accessed on 27 October 2008, Retrieved from http://www.spamlaws.com/identity-theft.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Identity Theft Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1549028-identity-theft
(Identity Theft Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/miscellaneous/1549028-identity-theft.
“Identity Theft Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1549028-identity-theft.
  • Cited: 0 times

CHECK THESE SAMPLES OF Identity Theft: Problems and Solutions

Virtual ID Thieves: A Menace Difficult to Apprehend

This research is being carried out to explore the problem of identity theft in the United States.... The Internet is also making identity theft a breeze.... This research tells that identity theft is a serious problem.... Those behind the identity theft are no different from the robbers who ply the streets at night.... These are few elements that proliferated identity theft.... Ultimately, the best way is for the government to implement the existing policies and to pass stricter policies that can curb identity theft....
4 Pages (1000 words) Essay

Identity Theft and Identity Fraud

In the paper 'identity theft' the author analyzes a dramatic increase in the crimes related to identity theft.... identity theft can be divided in to four categories; criminal identity theft, financial identity theft, identity cloning and commercial identify theft.... The author states that the term 'identity theft' focuses on the act of obtaining personal information required for perpetrating impersonation....
9 Pages (2250 words) Essay

The Issue of Identity Theft

"The Issue of identity theft" paper highlights two major breaches of Heartland Payment Systems and the National Archive and Records Administration.... Fraudsters who indulge in identity theft in recent times have successfully stolen entire corporate identities.... Today identity theft in the US is quite widespread causing huge problems for individuals.... In the United States, many people have suffered huge losses on account of unauthorized persons withdrawing funds from their bank or financial accounts, and very often these persons who have stolen their identity have committed crimes and run huge debts using the victim's identity....
10 Pages (2500 words) Essay

Final Project Problem at Work

o an individual this problem has been leading to identity theft, embarrassments, and blackmails all of which can make a person to incur losses and destroy his relationship with other people.... Therefore, if we can address this problem we can be able to avoid issues such as identity theft, embarrassments, and blackmails.... mong the issues caused by this problem, the most prevalent one is the identity theft.... identity theft is undertaking an activity while pretending to be somebody else....
4 Pages (1000 words) Essay

How to Identity Theft

This research paper, How to identity theft, highlights that over the past few decades technology has grown to great heights and is still improving.... In this essay we focus on how technological developments have helped the growth of fraudulent activities like identity theft.... Then we focus on what is identity theft, its growth using computers, and the possible precautions.... To understand the seriousness of identity theft we firstly need to know the different types of electronic frauds....
15 Pages (3750 words) Essay

Published Piece of Research

For the purpose of the critical review, I have chosen the research article entitled 'Media Constructions of identity theft'.... The research article is carefully chosen as there have not been many previous studies on the media constructions of identity theft in the United States.... The introductory part of the research seems concise and precise, and it focuses specifically on the media portrayal of identity theft in the United States.... The researchers identify identity theft as a typical 21st-century phenomenon due to the rapid growth of technology and information systems....
9 Pages (2250 words) Term Paper

Strengths Perspective and Solutions Focused Perspective

This coursework "Strengths Perspective and solutions Focused Perspective" describes the notion that the groups of clients are an untapped resource of vigor and momentum in their own lives.... These assumptions, along with the use of a solution-focused interviewing, enable the client in the process of problem resolution where solutions don't have to be related to the problem but undergoing the process aids in resolving them....
8 Pages (2000 words) Coursework

Manage IT Security for the London Olympic 2012 Games

espite the above security, the potential IT security vulnerabilities of the event are still high and the major threat is identity theft.... Vacca (2003) defines this as a type of crime where someone steals the identity of someone else and poses as that person.... This is basically an identity fraud.... In true-name ID fraud, the person's identity information is not modified....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us