Answered You can hire a professional tutor to get the answer.

QUESTION

Create a 4 page essay paper that discusses The Evolutional View of the Types of Identity Thefts.Download file to see previous pages... The study concluded with brief statements on the implications of

Create a 4 page essay paper that discusses The Evolutional View of the Types of Identity Thefts.

Download file to see previous pages...

The study concluded with brief statements on the implications of the correlations between identity theft and the fast-growing Internet. Suggestions were given to improve the means of protection from online fraud and identity theft. Operational Definitions In general, Wang and Huang (2011) stated that fraud refers to the act of taking advantage of others, largely motivated by economic reasons, via varied deceptive means. Intuitively, online fraud is said to refer to those conducted and/or facilitated using the Internet. Although identity theft is the inception of many fraudulent and criminal activities, it does not necessarily mean that it is the start of all online frauds. Online fraudulent acts committed by methods of stolen identification, phishing, advanced-fee schemes, or other electronic transactions fall largely within the arena of computer-assisted crimes (McQuade (2006) and Wall (2007), as cited by Wang and Huang, 2011). Wang and Huang (2011) wrote that the term identity refers to the unique and stable characteristics associated with an individual, and the aspect of self is based upon the interior state of awareness. However, it is argued that the culture shaped by the modern information media alleviates the term from consciousness and associates with the body (Poster (2006) as cited by Wang and Huang, 2011). furthermore, it has been assumed that a shift in the perspective of identifying individuals may discard the psychological portion of identity, thereby reflecting an emerging culture in the digital era. There are three general principles of identity verification to protect users‘ access to their personal belongings in the virtual space (Crume (2000) and Foster (2005), as cited by Wang and Huang, 2011). The first principle requires that a specific user knows some information to access the system. A pair of username and password is the most visible example of such information. The second principle of identity verification is to have something in physical form. These objects may include such material things as a key, a document, or a smart card. The third principle depends on what users must be biologically. Biological characteristics, such as the individual's fingerprints, voiceprint, iris, odor, and hand geometry may be used to verify one's identity. Identity theft is said to occur when an individual obtains a piece of personal identifying information which belongs to another individual, and uses that information without the owner‘s knowledge or approval. "Identity fraud" occurs when that stolen information is used to benefit the thief in some way (Wang and Huang, 2011. Identity Hawk, 2012). The legal definitions of identity theft are usually more precise, but this varies from state to state. A well-recognized legal definition is the Identity Theft and Assumption Deterrence Act (TADA) of October 30, 1998, making identity theft a federal crime. Under TADA, anyone who knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable state or local law commits a federal offense.&nbsp.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question