Technology: Victims Of Identity Theft

Better Essays
There are many types of computer crimes in which people came be a victim by the use of malware, phishing, social engineering, denial of service, and other used to commit identify theft, cyber stalking, fraud, and more. A popular computer crime these days is identify theft, in which an thief will use a person personal information to get money by opening credit cards and other types of accounts, may use health information to get medicines or medical equipment, or use the information for other malicious needs. The identify theft is a computer crime that victimizes a person and it can take years to recover. Today, society is more vulnerable to identity theft with the use of technology than before computers were as popular. There are ways to try …show more content…
According to Taylor (2011), identity theft is used to get a person personal information and use the information to allow the thief to pretend to be someone else, (p. 5). The victim of identity theft may not know it has happened until a few weeks or months later when the victim starts to get mails or phone calls about bill they did not agree …show more content…
It was harder for thieves to steal information about a person before the internet and networks were in place as they are today. To be able to steal a person identity, the thieves would have to go dumpster diving to steal mail with personal information on it. A theft may try to con a person out of information over the phone with social engineering. According to Easttom (2006), social engineering replies on human nature rather than technology to trick a user to offer up information needed to gain access to a system (p. 11). In some cases, the theft could be a friend or family that comes to the house all the time. Technology has changed a lot of the years and the internet has connected the world together which improved communication. However, this also makes it easier for thieves to use computers and internet to steal information needed for identity theft. A lot of personal information is stored in databases on servers of different companies such as credit card information in online stores or at retail stores in the city, health information in the doctor’s office or hospitals, and there are many other places personal information is stored on. Another location would be social media, people with public profiles may not realize the information they post can be used for identity theft. Even if a person does not store information on online stores or

Related Documents

  • Decent Essays

    In criminalistics of computer forensics class I have learned all types of crimes from auction fraud, credit card fraud, cellular fraud and my absolute favorite topic which is identity theft. Everyone probably doesn’t think that identity theft is a real crime. Believe it or not identity theft is one of the topic crimes in America today. Identity theft is often in the news. It is sad because someone will profit off of another loses.…

    • 1648 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Hackers In Pop Culture

    • 1655 Words
    • 7 Pages

    For instance, anyone can acquire personal or financial information from documents that have been thrown away and not properly shredded. Cash register attendants could easily steal credit card information when they are ringing up a sale. In today’s society, people can gather a lot of information about a person on the Internet, but hackers should not always be blamed for identity theft or stolen personal information. Society feels that hackers are a bigger risk to their privacy than their personal security. A Pew study found that 86% of Internet and smartphone users have removed or masked their digital footprints for privacy and that Americans are more concerned with hackers violating their privacy than the government (Dredge).…

    • 1655 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    • Hacking into a person’s email or social media account • It is illegal to access someone’s emails, online instant messages or social media profiles using their password or login details without their permission. It is also against the law to change someone’s password or login details for a site without their permission. What are the consequences of Identity Theft? • If you have used or give away personal details (such as login details for social media) with the intention of committing a crime, you may be charged with identity theft and approximately three years in jail. • If you are in possession of personal details with the intention of committing a crime, you may also be charged with up to three years in jail.…

    • 1058 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    It's true that Macs used to be less of a target, simply because criminals used to go after the largest number of users - hat is Windows - but this is changing. Determined attackers are able to find new ways to exploit users on almost any platform. Two-step verification If your email or cloud service offers it - Gmail, Dropbox, Apple and Facebook do - take the trouble to set this up. In addition to entering your password, you are also asked to enter a verification code sent via SMS to your phone. So a hacker might crack your password, but without the unique and temporary verification code should not be able to access your account.…

    • 1448 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Social media, podcasting and online role-playing games have become a part of our life because Internet nowadays can easily access. We could not consider about the day without it. Unfortunately, Internet addiction affects many people’s lives involuntarily such as grades, school life, Jobs, responsibilities and relationships. However, there are two sides to every coin, there are perks of using Internet in many ways too. This essay will give a definition of the Internet and the social media addiction.…

    • 1471 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Identity theft can be considered as a cyber crime because the stolen personal information can include the person’s name, identity number, birthday and even credit card number. Identity theft is very common in American and the Federal Trade Commission estimates that as many as 9 million Americans experience some form of identity theft each year. The number though is subjected to fluctuation as both crime fighting tactics and the methods used by criminals evolve over time. Identity theft can be committed in a number of ways. One way that criminal commit identity theft is by sifting through trash bins to get enough information from old bills, financial statement etc.…

    • 1253 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    In the error that we live in the Internet isn’t a safe place to be. Hackers from all over the world can get you into your personal information and obtain the things they need. Your life can be ruined in a matter of seconds just because of this situation. Unknown purchases can be made, money can be stolen, and your identity can be at risk. Hacking and stealing information is a really serious crime that will possibly lead you to serious…

    • 1122 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber terrorism could be also considered to be using the web to inform people of a Terrorist group. For example, hacking into a government control centers important files. However, people can protect themselves against the use of cyber terrorism. People’s passwords for google should be unusual, instead, check venders for for any new upgrades, or could create a unique email address and make it unknown to anyone. Using cyber terrorism is a serious crime and should be stopped.…

    • 1184 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    The recent computer advancements and Internet technologies have enabled people to conduct financial activities and store personal information on their computers. However, many cyber criminals can conduct hacking activities to access the private information, use the information to harm the victim or achieve financial gains, and this technological trend has caused the rates of identity theft crimes to increase exponentially in the recent years. The identity theft crimes often entail offenders using the information of victims to commit criminal activities or fulfill financial transactions, the victims are often confronted with severe losses and legal complications, and the offenders can be punished with financial penalties or prison sentences. As a result, people should avoid placing private information on risky Internet websites and diligently check their information to maximize the security of their personal data and minimize their vulnerability to becoming victimized by identity…

    • 1439 Words
    • 6 Pages
    Decent Essays

Related Topics