Identity Theft

Improved Essays
Identity Theft, a Real Issue.
In recent years, the technological revolution has allowed humans to simplify their daily life. And that is almost because of the discovery and the improvement of the internet. In fact, previously, people had to fulfill a number of tasks to accomplish a particular duty. For instance, to buy clothes, food, or to book concert tickets, they had to go to the place of sale to get served, even though the distance was far away. But today, it’s no longer necessary. With just a simple click, all our orders can be placed online. Using online payment functions, financial transactions become increasingly easier. People may also receive important messages from their friends, acquaintances, or from other professional fields directly
…show more content…
In fact, some hackers are using their skills for fun, to play trick on people, to show their capacities or to use their abilities in a good way without any bad intention behind their heads. For instance, in the article,” United Pays Millions Pays Miles to Hacker Who Spotted IT-System Flaw” published by the New York Times, the author reports that,” two hackers have scored a million frequent-flier miles each on United Airlines for finding security holes in the airline’s computer system.” In other words, the two hackers used their computer knowledge and skills for the benefit of the United Airlines Company, and because of that valuable act, were awarded a prize. But, as the community has grown and the flow of sensitive information across the web has increased, hackers have also used their abilities for malevolent purposes. For with all those data that can be access through the internet, they can get someone’s password and access his different online accounts like emails or Facebook; can make money and doing business transactions easily by using someone else money or identity. For example, they can purchase goods, emptying the bank account or credit card of a victim; they can open a new line of credit or loan; and can even sell or buy a house without the knowledge of the owner. Due to these particular reasons all related to money, identity theft rate is increasing year by year. In fact, “The Information Security University of Virginia” states in their article that,” according to Javelin Strategies, a prominent research firm that often reports on identity theft, incidences of the crime increased by 11% from 2009 to 2010, altering the lives of eleven million Americans (“Identity Theft”). This article shows how in only one year identity theft has got to a higher level, distressing citizen’s lives. So, as some of the reasons of

Related Documents

  • Improved Essays

    There were many negative and positive effects that came from 9/11. Some of these effects only lasted for a short period of time to help protect and defend the American public. However, there were also many effects that have lasted for a long time. One of those effects is how the attacks have changed America's surveillance on their citizens. The Foreign Intelligence Surveillance Act (FISA), which was put into place in 1978 and allows the government to tap into citizen's electronics and monitor them for foreign intelligence information, has changed drastically since the events of 9/11.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Identity Theft Schemes and Methods There are many different types of schemes and methods that identity…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction: Technology has definitely changed the last century. However, the last 10 years technology has made a dramatic change. In just 10 years, our nation has gone from house phones to smart phones. Our smart phones can almost do as much as our laptops. Social networking has become the rage to the way we communicate with each other.…

    • 606 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The recent computer advancements and Internet technologies have enabled people to conduct financial activities and store personal information on their computers. However, many cyber criminals can conduct hacking activities to access the private information, use the information to harm the victim or achieve financial gains, and this technological trend has caused the rates of identity theft crimes to increase exponentially in the recent years. The identity theft crimes often entail offenders using the information of victims to commit criminal activities or fulfill financial transactions, the victims are often confronted with severe losses and legal complications, and the offenders can be punished with financial penalties or prison sentences. As a result, people should avoid placing private information on risky Internet websites and diligently check their information to maximize the security of their personal data and minimize their vulnerability to becoming victimized by identity…

    • 1439 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    It is said that an identity is stolen online every three seconds. A persons identity can be stolen false applications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    The 21st century has added a new weapon to the arsenal of persecutors. Credit card companies can lower a customer 's credit limit based solely on where they’ve shopped. An employer can make his or her decision on hiring an employee using just social media footprints. Lori Andrews presents frightening information in her essay “Facebook Is Using You”. Through the use of statistics, anecdotal evidence, and appeals to the audience 's sense of fear, she successfully convinces the reader that there is a need for a Do-Not-Track law.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Identity Theft

    • 241 Words
    • 1 Pages

    Discussion Question 1: Discuss how identity theft meets the elements of theft. How has the internet changed criminalizing theft? Identity theft is “theft by using someone else’s Social Security number or driver’s license to obtain goods” (Chamelin, 2012, p. 162). Although a person’s identity is not a tangible object, it fits the definition of theft.…

    • 241 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Miller, J. and J. Miller., (2009). 21st Century Criminology: A Reference Handbook. 1st ed.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    The Dangers of Cyberspace: Identifying the threats on the web in Charles Koppelman’s Zero Days The documentary Zero Days, directed by Charles Koppelman, studies computer exploits and cyber-espionage that are conducted over cyberspace. This 2015 documentary interviews multiple professional computer hackers to explain what hacking skills they rely on in order to conduct either legal or illegal activities across the web. Whereas the scholars in this discipline focus on studying the psychology of hackers along with their communication skills used to deceive users online.…

    • 1542 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In his article entitled “Internet Access Is Not a Human Right” published on the website of The New York Times on 4 January 2012, Vincent G. Cerf, a vice president and chief Internet evangelist for Google, presents his perspective on a controversial issue regarding access to the Internet. He argues that access to the Internet should not be accepted as a human right, “it’s just a tool to achieve those rights.” According to Internet World Stats (2014), over a third of the world’s population are accessing the Internet as a part of their everyday life. This proves that the Internet plays numerous significant roles in society. It makes our lives easier and more convenient than in the past, by providing information, education, communication, business, and freedom of expression.…

    • 1148 Words
    • 5 Pages
    Improved Essays

Related Topics