Thursday, November 21, 2019
Identity theft how it has affected societies way of life and reality Research Paper
Identity theft how it has affected societies way of life and reality - Research Paper Example Every part of an individualââ¬â¢s life is surrounded with electronic items such as computers, cell phones and credit cards. Transfer of information is taking place every second in our lives, whether we are at home, work or educational centres; information is flowing from one at to another at every next moment. Due to immense use of technology, individuals end up leaving a huge track of footprints that are digital in nature. These tracks can be used by any other individual to obtain personal as well as public information of any particular individual. If these footprints fall in the hands of people who may use them wrongly, we may end up suffering heavy losses both emotionally and financially. Identity theft is referred to the criminal act of impersonating as another individual and obtaining benefits in the name of that individual. Identity theft may even be used to obtain an individualââ¬â¢s information and then committing crimes in the name of that individual. The US General Ac counting Office has defined identity theft as an act of obtaining an individualââ¬â¢s information and using that information to gain financial benefits (Hayward, 2004, p.93). Information and Privacy Commissioner defines this crime as an act of impersonating as another individual and then obtaining credit in his name (Barnard-Wills, 2012, p.188). A survey conducted by the Federal Trade Commission conducted in 2003 stated that during 2002 the number of victims of identity theft have tripled as compared to the statistics of 2001 ((Hayward, 2004, p.61). The Chubb Insurance conducted a survey during 2005 and figured out that one American our 5 American is a victim of this crime. Identity theft can be conducted in various ways (Loberg, 2004, p.34). The methods of conducting this crime are being updated and altered quite frequently. Activities of injecting an individualââ¬â¢s computer system with viruses and malicious instruments are conducted
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.