The paper "Identity Theft - Trends And Issues For Online Customers" is a good example of marketing coursework. Identity theft has become the top legal setbacks in the current digital age since a host of a hacker as well as scammers steal people private data/information, driving license numbers, credit card numbers, and also bank account numbers. So, identity theft does impact not only victims but also companies like financial institutions that maintain their customers and workers private information. Moreover, compromised systems are still the key threat to internet security given that they are used to lift-off various security attacks like distributing malware, identity theft in addition to spamming.
This report draws on current literature and various other sources to evaluate what is known concerning identity theft as well as what can be done to prevent it. Conventionally, privacy infringement has been seen as offensive actions by certain transgressors who bring about direct harm to victims. Victims of privacy infringement often experience discomfiture, psychological suffering, or fill their reputations have been damaged. Traditionally, the law responded when the deepest secrets of a person were exposed, when repute was tainted, or home was attacked.
From the traditional point of view, privacy is everyone’ s’ right, and this is so in contemporary society where everyone has a right to privacy. The report is about Identity Theft, it offers an overview of trends and issues of identity theft for online customers, businesses, banks and governments. Fundamentally, as it will be evidenced in the report, the increased utilization of the internet offers various forms of manipulation opportunities like identity theft, where web accounts are accessed by hackers by means of the internet. Identity Theft Introduction Basically, privacy-protecting commences with its conceptualisation, so there is a need to comprehend the nature of privacy issues so as to resolve them.
As it will be argued in the report, to prevent identity theft, there is a need to architecturally understand emerging privacy as part of the bigger legal and social structure. Therefore, privacy protection has to concentrate not just on penalties as well as remedies, but also on shaping the architectures. Statistically, consumer identity theft in 2005 led to consumer and corporate losses of almost $56 billion U. S.
dollars with almost 30 per cent of identified identity thefts brought about by breaches of corporate (Romanosky et al. , 2008, p. 2). A data breach according to Munton and McLeod (2011, p. 161) takes place when individually recognisable information like the name as well as credit card or social security number is unintentionally lost or stolen maliciously. Such breaches may lead to losing lots of records, resulting in identity theft and associated felonies. Many countries have tried to reduce such felonies by espousing laws for data breach disclosure that need companies to inform clients when their private information has been stolen.
Increasing globalisation and non-existence of cyber borders offer a ripe setting for identity thieves to operate effectively both domestically and globally (Finklea, 2014, p. 1). Enforcement of federal law is, therefore, throwing down the gauntlet hackers who have several identities. The report critically analyses issues and trends of identity theft. Theory and Concepts Identity theft has turned out to be a serious problem in contemporary society costing organisations, people as well as governments lots of money in the prosecution, detection, control, and prevention.
Critical elements of a Government strategy for managing identity theft include regulation, public awareness and vigilance programs, management of identity, information protection, training and education, justice systems and law enforcement, alliances and collaboration, procedures of reporting, and support for the victims (Jamieson et al. , 2014, p. 1). The legislation enactment as an instrument of strategic policy to mitigate identity theft as well as an associated crime such as money laundering is an important feature of present and future governments’ strategies. With suitable legislation, companies such as government institutions can act with augmented confidence of laws and policy to help in remediation, recovery of lost data and prosecution of the criminals (Jamieson et al. , 2014, p. 1).
Normally, identity theft causes are not recognized, but it is a crucial consideration when assessing the maximum possible effect of laws regarding data breach disclosure. Persuasively, these laws cannot reduce or prevent identity thefts that are within the firm’ s control (Romanosky et al. , 2008, p. 8). In a randomized survey carried out for the Federal Trade Commission (FTC) by Synovate in 2007, it was established that 12 per cent of identity thefts took place because of interaction with companies, 56 per cent of the victims failed to understand the cause.
In a different survey of 505 victims performed in 2006 by Javelin Research, Romanosky et al. (2008, p. 8) cite that 16 per cent believed the theft was within the control of the companies. Boyer (2008, p. 35) posits that, once the hackers seize the private information, they utilize it differently; for instance, they can withdraw money from victim’ s bank accounts, or apply for new services.
Allison, S.F.H., 2003. A case study of identity theft. Graduate Theses and Dissertations. Florida: University of South Florida.
ALRC, 2009. Criminalising identity theft. [Online] Available at: http://www.alrc.gov.au/publications/12.%20Identity%20Theft/criminalising-identity-theft [Accessed 16 March 2015].
Boyer, A., 2008. The Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life. Atlantic Publishing Company.
ComLaw, 2005. Criminal Code Act 1995. [Online] Available at: http://www.comlaw.gov.au/Details/C2005C00524 [Accessed 16 March 2015].
Finklea, K.M., 2010. Identity Theft: Trends and Issues. Collingdale, PA: DIANE Publishing.
Finklea, K., 2014. Identity Theft: Trends and Issues. CRS Report. Congressional Research Service.
Jamieson, R., Land, L., Stephens, G. & Winchester, D., 2014. Identity Crime: The Need for an Appropriate Government Strategy. Forum on Public Policy. NSW, Australia: University of NSW University of NSW.
Lane, J., Stodden, V., Bender, S. & Nissenbaum, H., 2014. Privacy, Big Data, and the Public Good. Cambridge : Cambridge University Press.
Langton, L. & Baum, K., 2010. Identity Theft Reported by Households. [Online] Available at: http://www.bjs.gov/content/pub/ascii/itrh07st.txt [Accessed 16 March 2015].
Munton, J. & McLeod, J., 2011. The Con: How Scams Work, Why You're Vulnerable, and How to Protect Yourself. Lanham, Maryland: Rowman & Littlefield Publishers.
Office for Victims of Crime, 2010. Identity Theft and Financial Fraud: Growing Trends in Identity Theft. [Online] Available at: http://ojp.gov/ovc/pubs/ID_theft/growingtrends.html [Accessed 16 March 2015].
Romanosky, S., Telang, R. & Acquisti, A., 2008. Do Data Breach Disclosure Laws Reduce Identity Theft? Research Paper. Pittsburgh, PA: Heinz School of Public Policy and Management Carnegie Mellon University.
Schwartz, P.M. & Peifer, K.-N., 2010. Prosser's Privacy and the German Right of Personality: Are Four Privacy Torts Better than One Unitary Concept. California Law Review, vol. 98, no. 6, pp.1925-88.
Solove, D.J., 2003. Identity Theft, Privacy, and the Architecture of Vulnerability. HASTINGS LAW JOURNAL, pp.1-46.
Solove, D.J., 2004. The Digital Person: Technology and Privacy in the Information Age. New York: NYU Press.