Friday, February 7, 2020

Identity Theft Essay Example | Topics and Well Written Essays - 2000 words

Identity Theft - Essay Example In the given paper we will consider the Identity Theft as one of topic related to the ethics in computing, will examine the nature of the given problem, methods of its investigation and prevention. Information explosion, supported by this period of easy credit, has resulted in the expansion of a crime that is fed by the inability of consumers to trace who has access to their private information and how it is protected. This crime is called identity theft and it refers to the act of stealing victims’ personal information such as name, birth date, Social Security number, credit card number, passport, address, with the aim of impersonating them typically for one’s own financial gain by gaining access to their finances or with an aim of framing the clients’ for a crime. (United States Department of Justice, 2006). It can also be used to facilitate illegal immigration, unauthorized phone or utility services’ use, terrorism, espionage or a permanent change of identity, to obtain medical treatment, or for evading criminal prosecution. Identity theft is sometimes also referred to as â€Å"identity fraud† since the criminal personates rather than dele tes the victim’s identity. It is usually used to refer to credit card fraud, mortgage fraud and other kinds of financial frauds. Identity theft occurs in different ways, ranging from negligent sharing of personal information, to deliberate theft of wallets, mail, purses or digital information. For instance, in public places brigands engage in "shoulder surfing" observing you from a close location as you punch in your phone card or credit card number or listen in on your dialogue with somebody if you dictate your credit card number over the telephone. Inside your home, thieves may get information from your personal computer while you are on-line and they are secretly sitting in their own houses. Outside your home, thieves filch your mail, recycling, or garbage.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.