Methods Identity Theft Takes Place Research Paper

PAGES
2
WORDS
696
Cite
Related Topics:

Identity theft is a kind of theft that involves someone stealing the identity of someone else by assuming that person's identity (Lai, Li, & Hsieh, 2012). This is usually a method of gaining access to the person's resources like credit cards and other things in the person's name. This is considered a white-collar crime and it has gained popularity amongst criminals. Identity theft does not involve any physical theft. Therefore, the victim might not realize the theft until significant damage has occurred. Identity thieves make use of a variety of methods, and not all of them are computer based. Thieves can go through the person's trash or mail searching for bank and credit card information, statements, and tax information. The information stolen can then be used to commit crimes like accessing credit under the person's name and using their details. Another method used to steal information is stealing the person's credit cards, identification, and bankcards from their purse or wallet. Stealing the person's identification and credit cards would allow the thieves to pose as the person and obtain credit using the person's identity. Thieves can also redirect the victim's mail by completing a change of address form, which allow them to receive the victim's mail...

...

Posing as a property owner or someone else who is authorized to obtain a credit report, the thieves can acquire a person's credit report. Thieves can also use a contactless credit card and bankcard reader to obtain personal information. The readers have the ability to acquire data wirelessly from the RFID cards. When this method is used, the victim would not be aware that the theft has occurred unlike the physical stealing of purses, or wallets.
Other computer-based methods can be used to commit identity theft like phishing, hacking, brute force attack, and exploiting computer breaches. Using the phishing method, the thieves will create a look-a-like website of a genuine website in order to trick victims to submit their personal information. The thieves will send emails to potential victims requesting or informing them that they need to change or update their personal information (Tajpour, Ibrahim, & Zamani, 2013). The link provided within the link directs the victims to the fake website, and if they submit any information, the thieves will use it to commit fraud. Hacking involves forcefully accessing computer networks, databases, and computer systems in order to steal the information being transmitted…

Sources Used in Documents:

References

Lai, F., Li, D., & Hsieh, C.-T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52(2), 353-363.

Tajpour, A., Ibrahim, S., & Zamani, M. (2013). Identity Theft Methods and Fraud Types. International Journal of Information Processing & Management, 4(7).


Cite this Document:

"Methods Identity Theft Takes Place" (2015, November 16) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/methods-identity-theft-takes-place-2161224

"Methods Identity Theft Takes Place" 16 November 2015. Web.19 April. 2024. <
https://www.paperdue.com/essay/methods-identity-theft-takes-place-2161224>

"Methods Identity Theft Takes Place", 16 November 2015, Accessed.19 April. 2024,
https://www.paperdue.com/essay/methods-identity-theft-takes-place-2161224

Related Documents

Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005) Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help

Identity Theft III Identity Theft Clean-Up and Credit Monitoring Product Solutions for the United States Market Product Description Proactive Solutions Reactive Solutions Target Market Market Analysis Potential Market Growth In previous reports various aspects of a new market expansion for a credit monitoring and other related services would be introduction crossed borders from the corporate headquarters in Canada into the United States. The move into the United States marketplace represents a new market expansion that represents an incredible

Pharmers now not only small local servers operated by Internet service providers (ISP) but they also target the 13 servers on which all other DNS servers depend. Implications Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only

Identity Theft
PAGES 10 WORDS 2926

Identity Theft: Managing the Risk Management What's New for the Future of Identity Theft Prevention In this paper I examine the basics of identity theft in today's age of widespread and accessible information. The fundamental problem is that while information technologies continue to make aspects of our lives as simple as "point and click," they tend to make certain forms of crime equally simple. The internet, in particular, makes information not only

When a Social Security number is stolen, contacting the Social Security Administration can help to place a watch on its use as well (SSA 2009). This particular problem can lead to many complications, as obtaining a new Social Security Number can create many difficulties for the victim while keeping the old number might allow the thief to continue using the victim's identity (SSA 2009). Generally, though, a new number

Online Dating Scams and Its Role in Identity Theft ONLINE DATING SCAMS AND IDENTITY THEFT The increased use of the Internet in modern communications has contributed to the emergence of cyberspace, which has become an alternative medium for developing and experiencing new relationships. The cyberspace is currently used for various purposes including communication and for developing creative romantic endeavors with less spatio-temporal restrictions. While online love platforms have proliferated and blossomed in