Premium Essay

Identity Theft in Online Business

In: Business and Management

Submitted By AmberH
Words 2731
Pages 11
Table of Content
Exclusive Summary………………………………………………………………..1
1. Introduction………………………………………………………………….…...1
2. Theory and Concept……………………………………………………….…. .3
3. Key Findings……………………………………………………………………..4 3.1 Issues of Online Identity Theft …………………………………………...4 3.2 Trends of Online Identity Theft……………………………………………5
4. Case Study………………………………………………………………………..7 4.1 Background…………………………………………………………………..8 4.2 Analysis……………………………………………………………………….8
5. Recommendations and Conclusions……………………………………..…9

Executive Summary
Identity theft make a lot of customers and organisations suffer serious loss both financially and emotionally. It is necessary to build acknowledge of identity theft to protect the interest of customers and organisations. This report finds the different methods and trends of identity theft and gives some advices for protection. A case study of TJX breach case shows the harm of identity theft in an organisation.

1. Introduction
The internet technology has greatly changed the world in which human live since 1990s. Nowadays, internet has gone deep into people’s daily life and its high productivity, efficiency and convince make people deeply rely on it. Online business and social network have become the most important contributions of internet. As the growth of e-commerce and number of users of social networking websites, the target of identity theft has broadened. In e-commerce, identity theft threats not only the customers’ information and property safety but also the interest of corporate. On the social networking websites such as Facebook, users usually use their real e-mail address, education background and friends. When these details are used by attacker to target and spam (Bilge, Strufe, Balzarotti, Kirda., 2009). The identity theft is a big threat of information safety.

According to the…...

Similar Documents

Premium Essay

Identity Theft

...IDENTITY THEFT NAME: INSTITUTION: IDENTITY THEFT Identity theft refers to a situation where a person uses information used to identify another person, such as their name, credit card number or social security number without their permission, in order to commit fraud or other crimes. In other words, it is stealing the identity of a certain person and pretending to be that person by assuming their identity, usually so as to access their resources or to obtain recognition and other profits in their name (Cheney, 2005). There are many forms of crime related to identity theft. Some identity thieves rent apartments or get credit cards or phone accounts in the names of their victims. These victims may not learn out about it for some period of time, until they notice some charges they did not make, or are contacted by a person or people claiming that they owe them. It may sometimes cost them hundreds or thousands of dollars and a lot of time while trying to undo the damage (Keith, 2005). Identity theft could ruin an otherwise spotless reputation. It could also lead to much suffering if the victims are held responsible for the thief’s actions. TYPES OF IDENTITY THEFT Identity theft can be divided into the following categories: • Criminal identity theft, that is, pretending to be another person when arrested for an offense • Child identity theft. • Financial identity theft, that is, using the identity of......

Words: 1923 - Pages: 8

Free Essay

Identity Theft

...Rasmussen College | Identity Theft | The long term issue | | Caden Ross | 2/17/2013 | Author's Note: This research is for Professor Rob Paixao B234/BUL2241 Section 01 Business Law Course written by Caden Ross on 02/17/2013. | Jeffrey Gerald Jackson, otherwise known as Troy Lee Evans, was arrested on September 4,2012 for identity theft. Mr. Jackson used the identity of Troy Lee Evans to gain employment at Credit Concepts Inc. Mr. Jackson had worked at Credit Concepts Inc. under this false ID for six years. Through his job there he had access to important personal information that allowed him to obtain several loans using other people's identities. Police uncovered at least six separate incidents in which Mr. Jackson used other peoples information to obtain loans for himself. His bail was set at $45,000.00 and police are asking for anyone to come forward with any additional information about other crimes he may have committed. [ (Bella, 2012) ] Identity Theft is a heinous crime with long term repercussions for it victims. Mr. Jackson's case shows how much a person can do with identity theft. He not only used other people's information to obtain loans but he lived as someone else for six years and worked as this person. This means that for six years income was reported to the IRS and Social Security as Mr. Evans when it was not his income. Any bills that Mr. Jackson has taken out in Mr. Evans name like utilities or rent can show up on Mr. Evans credit if......

Words: 976 - Pages: 4

Free Essay

Identity Theft

...Abstract Culprits of identity theft are the modern day con artists that are able to convince and persuade people out of their money by promising their victims a portion of wealth which will never come to be. This paper will describe what is classified as identity theft, how people become victims of this crime and how people can avoid being becoming a victim to this popular means of deception in the electronic world. On the average one hundred thousand people are affected by identity theft in the United States per year and over two billion dollars in revenue is stolen as shown in the surveys that were conducted in 2003 -2006 (Anderson, Durbin & Salinger). Because of this threat the consumer becomes skeptical of online transactions which cause loss of business to many retailers as they are based solely on internet sales. For the retailer to make sure that the consumer is protected from fraudulent transactions and the possibility of their personal information to be at risk of being intercepted by others, the retailers need to incorporate special systems onto their site and have special programs that could make the purchasing of items from their business complicated for the consumer and will also raise the price of the goods to offset their loss on the security measures. The way people are committing the crimes of identity theft are only limited by the imagination of the person that commits these types of crimes. The source can be from......

Words: 1459 - Pages: 6

Free Essay

Identity Theft

...Alec Dohm Economics Period 1 Identity Theft is a vast problem that grows with the years and the tough economic times. Identity theft affects nearly 5% of the world’s adult population. In 26 % of all cases, the fraud victim knew the person who stole their identity, and most often it is a family member who rips you off. The best way to protect yourself is to buy and use a paper shredder and a safe. Also the only organization you are legally required to give your Social Security Number is your employer and financial institutions, like a bank. The economic effect of identity theft is more than what people may think. Check fraud alone rose to 5.5 billion dollars in 2003. Because that money was taken from others instead of made legally, the economy shows a loss. The annual cost of identity theft to businesses is 53 billion dollars because if somebody gets the I.D of a business owner then they can funnel money out of that person’s business as well as their personal bank accounts. The American Bankers Association reported 677 million dollars of losses in 2003, which is a slight decline from 2001. Being that the article is a few years old, I would say that those numbers have gone way up since then. If somebody steals your identity, it could affect you in countless ways. All of a sudden your credit card will start being declined for insufficient funds. When you go home and check your bank account online, your money will have magically disappeared. A person could......

Words: 349 - Pages: 2

Premium Essay

Identity Theft

...Identity Theft Introduction Today, the United States is facing an ever-growing number of identity theft crimes. According to the Federal Trade Commission (FTC), nearly 10 million Americans suffered the consequences of this crime in 2004, and the commission received more than 5,000 telephone calls per week related to identity theft in 2005. According to the FTC(2006) most victims of identity theft are quite unaware of how their personal information was obtained. Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can wreak havoc with your finances, credit history, and reputation and can take time, money, and patience to resolve. (Identity Theft/ Consumer Information). The sharing of information on transaction identities is necessary for operation of these payment systems. However, this information sharing can facilitate fraud in the form of identity theft. Information sharing can also create conflicts of interest that may not be easily resolved through the operation of the marketplace. Thoughtful public policy should be aimed at resolving these conflicts. The ultimate goal of regulation should not be absolute privacy of consumers or complete suppression of identity theft, but instead the promotion of efficient confidentiality of personal information . Too much white space. What is Identity Theft? Identity theft is a crime when someone without permission uses of another......

Words: 1740 - Pages: 7

Free Essay

Identity Theft

...Lab 10: Identity Theft Identity theft is on the rise every day and we do not even know when it happens. Identity theft occurs when someone wrongfully obtains another’s personal information without their knowledge to commit theft or fraud (Federal Bureau of Investigation, n.d.). Identity theft crimes include credit card fraud, internet fraud, mail fraud, and many others. Anybody is at risk of identity theft; nobody is safe. As beginning IT students, it is important to learn the basic way to protect ourselves right now. Working on the Internet exposes your identity to many people. When a person uses your information without your consent and causes any type of harm is considered identity theft. Along with names, Social Security numbers and dates of birth, fraudsters also use Medicare numbers, addresses, birth certificates, passport numbers, financial account numbers (bank account or credit card), passwords (like mother’s maiden name, father’s middle name), telephone numbers, and biometric data (like fingerprints, iris scans) to commit identity theft (Federal Bureau of Investigation, n.d.). As you can see there are many types of information that can be used to steal your identity. Once your identity is stolen the restoration process is long and tedious. Beginning IT students should be aware of what precautions to take when handling important information. Knowing the facts will prevent or minimize the percentage of becoming an identity theft victim. Clear your logins and......

Words: 479 - Pages: 2

Premium Essay

Identity Theft

...NO ONE IS IMMUNE Identity Theft Gabriela Medina Post University ​ Credit card fraud is identity theft in its most simple and common form. It can be accomplished through various scenarios. An example of one can happen when your pre-approved credit card offers fall into the wrong hands. All a person has to do is get these out of your mailbox (or trash can) and mail them in with a change of address request and start spending. Someone can even apply for a credit card in your name if they have the right information. You won't know a thing about it until the credit card company tracks you down and demands payment for the purchases "you" have racked up. Think about the types of information you have to provide in order to get a credit card or a loan or lease a car. There is very little additional information that is needed in order to get that loan. Imagine finding out that someone had gotten a mortgage in your name. Clearing that up with the bank and getting it off of your credit history would be quite a battle. You are left with the time-consuming task of repairing your credit and getting your finances back on track. Your personal information can be found in many places. It can be dug out of trash cans and dumpsters, known as "dumpster diving", memorized or copied by sales clerks and waiters, removed from your mailbox in the form of tax notices, financial account statements and other bills before you have a chance to get them or even know they are there. ......

Words: 1125 - Pages: 5

Free Essay

Identity Theft

...Technology help Criminals Commit Identity Theft? Identity theft is becoming one of the fastest growing criminal offenses in the United States. Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name (Kiesbye). It is important for one to know that identity theft is not just a financial crime. It is a serious crime that can cause havoc on finances, credit history, and reputation. Identity theft can go unnoticed and can take time, money, and patience to resolve. Technology is constantly evolving making identity theft an easier crime to commit (Kiesbye). There are several ways in which technology plays a major role in assisting criminals commit identity theft (Knight Ridder/Tribune Business News). Some ways include computer hacking, telephone bugging, and old-fashioned stealing. Identity theft has become a very serious business for criminals (Knight Ridder/Tribune Business News). . Identity theft has been around for a number of years. The term identity theft was coined in 1964 however it does not mean to steal an identity but rather to impersonate another individual to commit fraud or deception (Vacca). Identity theft is not easily detectable by the individuals. Someone can steal or misappropriate personal information without the individual knowing then commit identity theft using the stolen......

Words: 1341 - Pages: 6

Premium Essay

Identity Theft

...Identity is yours and only yours “But he that filches from me my good name/Robs me of what not enriches him and makes me poor indeed” --- Shakespeare Crimes are not always on the rise; with tough and stringent laws and hard work of excellent law enforcement agencies the rate of crime can always be controlled. For example the crime rate in the New York City went down considerably in the beginning of this decade, with the introduction of new policies by the new government. There is one type of crime, which has consistently grown every year in the last decade, and also has been the fastest growing crime. It is a neither gun crimes nor the use and abuse of certain drug; it is identity theft. When searched for fastest growing crime on google.com the unanimous answer turned out to be identity theft. This crime basically proves that there is no doubt in the fact that there is something going wrong when dealing with identity theft. It seems like there is a piece of the puzzle which is missing. The main focus of this paper is to put some light on the issues concerning with identity theft, how it takes place in various manners and what are the current laws in place to act against identity theft. The role of credit card companies to deal with identity theft is also mentioned. Identity theft and identity fraud are words used to refer to all degrees of crime in which someone wrong fully acquires and exploit individual private information in numerous ways that engage scam or......

Words: 1086 - Pages: 5

Premium Essay

Identity Theft

...NT1110 Computer Structure and Logic Assignment: Research Project Identity Theft Technology has become a big part of our lives, making it difficult for people to function outside of it. This is why we are so used to doing daily functions of life with technology. Even though this can make it very convenient for us by saving both time and money, there is a negative outcome in which, on average, 11.5 million people have been a victim of in the last eight years (appendix A). Identity theft, is when an individual steals certain information by hacking your computer, stealing your wallet, or even stealing your mail and uses it to his advantage by using your information to pretend he is another person to gain access to his/her financial status. Thus, in this essay, I will be explaining how this growing crime relates to the topics taught in class. Next, I’ll be going over the things I have learned while doing research on this specific topic. Lastly, I’ll use this information to show which direction this phenomenon is heading in the future. In this course, I’ve learned the basic components and functions/purpose that a personal computer needs as well as computer math and measurements or what I like to call it “computer code”. Computer codes as in 0’s and 1’s are the language of any computer. What makes computers so special is the speed in which the processor (along with other components) can solve......

Words: 831 - Pages: 4

Premium Essay

Identity Theft

... The Two Mrs. Jane Does Diana Sours DeVry University The Two Mrs. Jane Does Identity theft, it can and will catch you off guard if you are not careful with your information, and it can have a devastating effect. “Another pre-screened credit offer?” thought Mrs. Jane Doe, as she walked back up to her house from checking her mail. She quickly realized that was not the case at all, as she opened the “offer” from Visa. Instead, what she was staring at was a bill addressed to her, that she had no recollection of making. She was now faced with the probability of being a victim of identity theft. Identity theft, in short, is using someone else’s personal information for one’s own financial gain. Identity theft laws need to be improved because this crime costs businesses money, costs credit card companies money, and financially hurts ordinary consumers. In 2006, “U.S. companies average identity theft-related costs of $182 per compromised record. While that figure averaged $660,000 per company in notification expenses and indirect costs, the total estimate, including lost business, tops $2.5 million. This staggering amount also includes costs and fees associated with legal expenses, fines, investigation, auditing, class action litigation, public relations damage control, and setting up monitoring, remediation practices, and a dedicated customer support phone number.” (Identitytheft.lifetips.com, 2014) Some of this cost is passed along to the credit card companies in the form of......

Words: 855 - Pages: 4

Free Essay

Identity Theft

...Identity Theft: Fastest Growing Crime Tracy A. Baggett DeVry University Keller Graduate School of Management Identity Theft; Fastest Growing Crime Imagine waking up to news that you had accumulated hundreds of thousands in debt after someone used your identity for unauthorized purchases. This is exactly what happened to John Harrison, a Connecticut salesman. Jerry Phillips, the twenty year old who stole John Harrison’s identity went on a shopping spree that included purchases to Home Depot, JC Penny, Sears, Lowes and even bought two cars from Ford, a Kawasaki and a Harley. In just four months Jerry Phillips was able to accumulate $ 265,000 in purchases. Jerry Phillips was later arrested and imprisoned for three years. He even went as far as to apologize to John Harrison saying, “Sorry. You know, I wish I could make it up to you.” John Harrison felt that the nightmare was over with the criminal behind bars and even verbally acknowledging his regret over the crime. But despite all of this and a letter from the Justice Department confirming that John Harrison was a victim, he still found himself owing $140,000 to different creditors. How about waking up in the middle of the night realizing that federal agents just entered your home with guns pointed certainly qualifies as one of the most horrifying ordeals in anyone’s life. This is exactly what happened to Carlos Gomez, a UPS driver accused of being involved in a million dollar money laundering operation headed by a......

Words: 3754 - Pages: 16

Premium Essay

Ways to Prevent Online Identity Theft

...Ways to Prevent Online Identity Theft Danilo V. Alcantara Information Assurance – ISSC361 American Military University Gary Rogers - Instructor Ways to prevent online identity theft Identity theft rates one of the fastest growing crimes in America today and the Internet can make it even easier for some criminals to take someone’s good name and drag it through the mud (J. Edwards, 2010). It involves criminals stealing personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out someone’s bank accounts (J. Edwards, 2010). Through financial liability with owner’s credit cards maybe limited to $50 to $500, it can take years for someone to clean up the mess online identity thieves leave behind (J. Edwards, 2010). As with any crime, an ounce of prevention may just cause the would-be identity thieves to leave someone alone and move on to an easier target (J. Edwards, 2010). First Subtopic – Cyber Education Detail – Describe computing devices capable of connecting to World Wide Web Detail – Describe the world of internet Detail – Usefulness of internet Second Subtopic – Password Protection Detail – Never share password or pin to anyone Detail – Never write password Detail – Create passwords difficult to break Detail – Change password often Third Subtopic – E-mail Safety Detail – Never share personal information Detail – Do not open...

Words: 611 - Pages: 3

Free Essay

Identity Theft

...important in the online world, and identity-related crime is a growing problem related to this. This new category of crime is not restricted to high-profile instances of identity ‘theft’ or identity fraud; it is wide-ranging and complex, ranging from identity deletion to unlawful identity creation and identity ‘theft’. Commonly accepted definitions are lacking, thus blurring available statistics, and policies to combat this new crime are piecemeal at best. In order to assess the real nature and magnitude of identity-related crime, and to be able to discuss how it can be combated, identity-related crime should be understood in all its aspects. As a first key step, this article introduces a typology of identity-related crime, consisting of conceptual, technical, and legal categories. The conceptual categories are unlawful forms of identity deletion, identity restoration, and identity change; the latter category is subdivided in unlawful forms of identity takeover (‘identity theft’), identity delegation, identity exchange, and identity creation. The technical categories consist of 17 points of attack on identification. The legal categories distinguishes between identity-specific legal provisions, such as the US crime of identity theft, and identity-neutral legal provisions mainly used in Europe, subdivided in criminal, civil, and administrative provisions. This typology can be used as a comprehensive framework for future research, countermeasures, and policies related to......

Words: 1042 - Pages: 5

Free Essay

Identity Theft

...Identity Theft + Fraud= Identity Crime 20 December 2007 There is a thief that lurks around us everyday; this thief can attack in brad day light or in the darkest hour, and just about anywhere you may find yourself. This thief has the power to act in your name, make unlimited purchases, open up credit accounts and ruin your good name and credit all in the matter of seconds; if you are vulnerable enough, you might become his next victim. In many cases all he needs is your name and a social security number, and he has enough information to make you his next victim; if you don’t believe me then ask the millions of Americans that became victim’s, or just ask me. The thief that I am talking about is identity theft. Identity theft is a crime that is affecting many Americans, the costs are well in the millions every year, but with a little bit of knowledge and adaptive common practices, you can help fight back and minimize your chances of becoming the next victim of Identity theft. Identity theft is as predictable as a giant storm; you really don’t know what the damage will be until it passes and many victims don’t even see it coming until its already too late. So what is identity theft? According to the webpage article “about identity theft,” the Federal Trade Commission (FTC) (2007) writes that “identity theft occurs when someone uses your personal identifying information, like your name, SSN… without your permission to commit fraud or other crimes.” (para 1) All it takes...

Words: 3405 - Pages: 14