Technology: Victims Of Identity Theft

Superior Essays
There are many types of computer crimes in which people came be a victim by the use of malware, phishing, social engineering, denial of service, and other used to commit identify theft, cyber stalking, fraud, and more. A popular computer crime these days is identify theft, in which an thief will use a person personal information to get money by opening credit cards and other types of accounts, may use health information to get medicines or medical equipment, or use the information for other malicious needs. The identify theft is a computer crime that victimizes a person and it can take years to recover. Today, society is more vulnerable to identity theft with the use of technology than before computers were as popular. There are ways to try …show more content…
According to Taylor (2011), identity theft is used to get a person personal information and use the information to allow the thief to pretend to be someone else, (p. 5). The victim of identity theft may not know it has happened until a few weeks or months later when the victim starts to get mails or phone calls about bill they did not agree …show more content…
It was harder for thieves to steal information about a person before the internet and networks were in place as they are today. To be able to steal a person identity, the thieves would have to go dumpster diving to steal mail with personal information on it. A theft may try to con a person out of information over the phone with social engineering. According to Easttom (2006), social engineering replies on human nature rather than technology to trick a user to offer up information needed to gain access to a system (p. 11). In some cases, the theft could be a friend or family that comes to the house all the time. Technology has changed a lot of the years and the internet has connected the world together which improved communication. However, this also makes it easier for thieves to use computers and internet to steal information needed for identity theft. A lot of personal information is stored in databases on servers of different companies such as credit card information in online stores or at retail stores in the city, health information in the doctor’s office or hospitals, and there are many other places personal information is stored on. Another location would be social media, people with public profiles may not realize the information they post can be used for identity theft. Even if a person does not store information on online stores or

Related Documents

  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Pros and Cons of the EMR System Across the United States, more and more medical practices have put into effect the use of the electronic health care record software. There are many companies that offer different programs. Privacy is the most important concern that comes into mind when using the electronic medical health records. While paper records can also make it easy to violate a patient’s privacy, the convenience of electronic records makes it easier to violate privacy and the convenience of entering in and accessing patient data. And with all the access to people hacking computers, it can sometimes be a bit worrisome.…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Almost a month after students and faculty at UCF were notified about a security breach causing 63,000 Social Security numbers to be stolen, Hack@UCF is offering advice on identity theft protection and mitigation. Their meetings are every Friday at 4:30 p.m. in Engineering 2 Room 102 at UCF’s Main Campus. Hack@UCF has stated that they will host a Town Hall meeting in cooperation with UCF on identity theft protection and mitigation. A date has yet to set.…

    • 808 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Laws help codify the values of a society, maintain order among the population, and protect citizens from being abused and harmed by dangerous criminals. However, recent technological trends have required the government to address the intensifying problem of identity theft. Because identity theft has become prevalent throughout the US society, many legal and criminal justice scholars have articulated the different types of identity theft and the consequences that the victims and offenders often experience. Identity theft relates to instances in which an offender steals and uses the information of a victim to fulfill criminal activities or acquire financial gains, the victims are often inflicted with detrimental financial losses and a damaged…

    • 1439 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Many people believe that they will never be a victim of identity fraud but everyone is vulnerable to it. Identity fraud is America’s fastest growing white collar crime. Identity fraud is a term used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. The most common forms of identity theft occur when someone obtains another person's social security number, driver's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false loans. Identity theft started to become a very popular crime in the late 1990s because of the increase of computer use.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    I found an article on identity theft that ruined a man’s life. David Crouse was a victim of identity theft. Like many people today, he frequently shopped and did his banking online (Waters, 2010). It is believed to be a keystroke malware that infected his computer while he visited online sites (Waters, 2010).…

    • 324 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Complete Name: Unit 4 Student Name: Donoho, Leslie ********************************************************************************************************** 1. Case Study: “Don’t Let Crooks Steal Your Identity: How to Protect Yourself-and Your Credit Rating” (p. 225) ********************************************************************************************************** 2. Provide several methods that crooks use to steal your identity. Student Answer: There are several ways that our identity can be stolen without our knowledge until we either start bouncing checks or recognizing charges that we never actually made (Kapoor, Dlabay, L, & Hughes, 2014). Thieves are lurking every where we turn hidden in plain sight.…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Identity theft has been a growing situation. It is something that continues to grow and having many people being affected by having their identity stolen. Technology makes it easier for individuals to steal someone's identity and use it to their own advantage. It is important for people to take the right precautions and keep information secure to prevent any identity theft from occurring. Keeping Information Private…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Security Breaching

    • 1830 Words
    • 8 Pages

    Have you ever been hacked? Not in the “Haha I took a funny picture on your account hacked,” but the scary moment when you realize your passwords have been changed and you can’t access your bank account anymore? If you haven’t, count yourself lucky, because Security Researchers state that almost half of the population of the United States has been hacked, or have had their private information leaked to the web. Many times you don’t even know it’s happened. Companies don’t like sharing information about breaches with the public, as it sheds “bad” light on them.…

    • 1830 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    My Field of Interest The field of interest I would like to pursue would be in the field of cybersecurity. I find this field important and interesting. In my field, I sometimes have to provide information to individuals who are or suspect they have been a victim of identity theft. It is a devastating and difficult situation to be in. Unfortunately, due to hacking and data breaches happening frequently, identity theft seems to be an ongoing problem.…

    • 683 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    You are buying milk from the grocery store. As you swipe your credit card, an ear-piercing beep sounds. You try again, but the same thing happens. The total was only $4.16, so you decide to just pay with cash but are still confused. A week later, you are at the airport getting ready to go to Paris.…

    • 474 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Identity theft is defined as “The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases” (Definition). It is one of those things that people believe could never happen to them. They don’t think it’s that big of a deal and then become careless when it comes to sharing personal information on and offline and when they are online shopping. However, identity theft is a very serious and very real thing that affects approximately 12,157,400 Americans annually (Identity Theft). The next few paragraphs will discuss how an identity can be stolen, how an individual should take action if they believe their identity has been stolen,…

    • 1168 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    How technology has changed society through identity theft Zaida Liciaga Turabo University Prof. Myra Velez Abstract Until not long ago, when a thief stole the wallet or briefcases, money was all he intended. That is changing, now the most valuable is the number of your credit card, debit cards, checks and other documents containing personal information. Currently this type of fraud are based on stealing confidential information through social networks. Identity theft is one of the fastest growing crimes in the nation. Social networks are easily exploited by criminals and because they offer great confidence to users, are getting used to a greater extent for identity theft attacks.…

    • 1419 Words
    • 6 Pages
    Improved Essays

Related Topics