Identity Theft Definition

Superior Essays
Definition of Identity Theft

The National Crime Victimization Survey stated that, “there is no one universally accepted definition of identity theft as the term describes a variety of illegal acts involving theft or misuse of personal information” (As cited in Copes and Vieraitis, 2012). Therby, a commonly accepted definition of identity theft is known as the unlawful use, or possession, of someone else’s personal identifying information, which, can result in a criminal charge. Personally identifying documents, which, thieves often obtain include, an individual’s name’s, social security number, address, telephone, date of birth, driver’s license number, taxpayer identification number, government passport number, or any biometric information,
…show more content…
Identity theft, once considered to have a low crime rate, has emerged as one of the most prevalent and fast growing crimes since the beginning of the twenty first century. In order to substantiate the prevalence claims made by these federal agencies, Allison et. al noted that, “the U.S. General Accounting Office (USGAO) attempted to synthesize all published data and reports regarding identity theft” (2005, p. 21). In the conclusion of their findings, the U.S. General Accounting Office noted that although many agencies reported varying rates, it was evident that identity theft indeed was growing at a rapid rate. Presently, according to the National Criminal Justice Reference Service, identity theft complaints accounted for 14 percent, totaling to over two million of the overall complaints received during the year of …show more content…
Several studies have indicated similar findings when researching the correlates of victimization. For example, researchers have concluded that women are just as likely as men to be victims of identity theft each year; individuals pertaining to the Caucasian race were the most likely to fall victim to identity theft, where as, individuals of the African American race were the least likely to; the average age of the victims was much older, thus, putting individuals aged between 35 to 64 are at the most risk, where as, individuals aged between 16 to 24 and 65 or older possess the lowest rates of victimization; and households which possess an income of over $75,000 a year are indicated to be the most at risk to fall victim to this crime in comparison to those in lower income brackets (Allson et al. 2005; Harrell 2015). Research by Holt and Bossler (2009) Copes et al., (2010) has also indicated that, “In addition to demographic profiles, studies have suggested that people who engage in risky behaviors such as remote purchasing or Internet usage are more likely to be victims of identity theft” (As cited in Vieraitis and Shuraydi,

Related Documents

  • Improved Essays

    In most cases victims are unaware that they are even victims until it is too late to do anything about the theft and there is already a multitude of debt built up in our name. There are so many different ways that identity theft is done these days that the best line of defense is to stay visitant and keep a journal of all expenditures, and check your credit reports regularly. In this chapter we learn that Staying alert to our credit monitoring is like setting a home alarm system (Kapoor, Dlabay, L, & Hughes, 2014). If when checking through financial records and credit reports if there is anything that seems peculiar or out of place immediately dispute and investigate to make sure if it is as simple as a billing error or in fact your identity has been compromised. If you do find that your identity has been stolen immediately report to the appropriate agencies (Kapoor, Dlabay, L, & Hughes, 2014).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The first year to have statistical data on identity theft was 2005 which showed that 6.4 million residents were victims of identity theft to some extent (Bureau of Justice Statistics (BJS) Data Collection,…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Case Study: The All-American Girl Katie Jordon was the “all-American Girl Next Door” that got in way over her head when she turned to fraud to cover her bills in the midst of hard times (Wells, 2014). Like many who steal from their employer with intentions of paying them back, Katie became just another case of one bad decision that led to another (Wells, 2014). By the time she was caught, she had stolen over $65,000 (Wells, 2014). “What measures could have been taken to prevent the fraud committed by Katie Jordan or detect it earlier?”…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Dr. Wallace introduces the speaker, the director of the core text reader, states that it is used to enhance what were learning in class. Dr. Brad Busbee starts off by saying that we can learn a lot from a pre-modern case of identity theft. The big questions we wrestle with is “who are we” and “how do we know who we are”. People today know know who they are and what they look like because we have mirrors and pictures.…

    • 376 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    “In 2004, the government passed the Identity Theft Penalty Enhancement Act, which increased the severity of the punishment for identity theft crimes” (Crimes, 2006-2014). It brings a sense of relief to know that the criminals get what they truly deserve. Identity Theft is truly a selfish crime and the perpetrators should be penalized accordingly. According to the Identity Theft Penalty Enhancement Act, “The prison sentence for identity theft starts at up to five years, plus two more years for using the stolen identity in another crime. The prison sentence grows from there, depending on how many related crimes were committed” (Crimes, 2006-2014).…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    This book could be informative in my own research, providing an in-depth examination on how and why the crimes are performed, however, the source doesn’t provide information about cases which could be a limitation. Brody, R., Mulig, E. and Kimball, V. (2007). Phishing, Pharming and Identity Theft. Academy of Accounting and Financial Studies Journal, 11(3).…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Critical Review #2: Identity crime and misuse in Australia: Results of the 2013 online survey Behind the article: Koubaridis (2014, n.p.), a crime news reporter for News Limited, states that ‘1 in 5 Australians have been victims of identity crime [due to] computer hacking, [and] online banking and shopping [are] to blame’. Koubaridis (2014) based the article’s research on a study conducted by the Australian Institute of Criminology. Russell G. Smith and Alice Hutchings from the Australian Institute of Criminology conducted this study in September 2013 (Smith and Hutchings 2014). Research data embedded within the article: Within the media article, there were five components that directly related back to the published research.…

    • 1370 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Identity theft is a pervasive crime that requires cooperation among law enforcement agencies, the federal and state government, and citizens to develop a comprehensive and effective response. To reduce the impact of identity theft, an effective national strategy would…

    • 467 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Identity Theft Do you know what 343 million dollars looks like because that was how much money so many people lost from identity theft. Today I’m going to talk about how identity theft is bad thing by taking someone’s money to them just getting your house bills. Identity theft is one of the most corrupt crime in the us. Identity theft is the most growing problem in the usa. next couple of paragraph are going to be about how identity theft may not even be theft, how many people got targeted, and how much money was lost.…

    • 529 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Identity theft has been a growing situation. It is something that continues to grow and having many people being affected by having their identity stolen. Technology makes it easier for individuals to steal someone's identity and use it to their own advantage. It is important for people to take the right precautions and keep information secure to prevent any identity theft from occurring. Keeping Information Private…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The true name identity thief uses the victim’s information to set up new accounts such as credit cards, cell phones, or even checking accounts. The government is doing what they can do the combat the issue of identity theft. This is a crime that could be hard to…

    • 783 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Identity theft is a crime that involves a person/imposter taking control of yours or another person’s personal information for the purpose of impersonation. The information obtained by the other can be Social Security number or Driver’s license number which is used to use your identity as their own, also known as identity fraud. The fraud committed can involve making purchases using the victim’s credit card details, opening bank accounts using the victim’s name, conducting illegal businesses or take loans (USA.gov, 2015).…

    • 359 Words
    • 2 Pages
    Improved Essays

Related Topics