Identity Theft

Read Complete Research Material



Identity Theft

Abstract

The trend of identity theft in information technology has been on rise as the digital information use and sharing is becoming common, keeping in view this trend, the research aim to identify the risk, challenges and the prevention of theft in IT. The research uses mixed methodology. The literature search is facilitated by the online surveys with the online service providers as sample population. It is found that the major information technology identity theft is towards the privacy and infringement of data. Various software and applications are becoming increasingly available to curb these issues. Such preventive measure includes smart databases, and the security codes which safeguard and prevent identity theft. Despite, all these measures, it is yet challenging for IT to cope with theft as digital monitoring and control is complicated.

Table of Contents

Chapter 1: Introduction5

Problem Statement6

Purpose Statement6

Theoretical Framework7

Research Questions8

Key Definitions9

Theft9

Information Security9

Confidentiality, Integrity and Availability (CIA)10

Confidentiality11

Integrity11

Chapter 2: Literature Review11

Digital Identity Defined14

Prevention15

Availability17

Assuring Data Validity17

Information Security Management System18

Intrusion Detection18

Policies19

Kinds of Attack and Identity Theft21

Future Anticipated Problems23

Chapter 3: Methodology25

Research Design25

Literature Search Criteria25

Sample Design26

Instrumentation27

Data Collection28

Ethical Concerns29

Data Analysis30

Chapter 4: Analysis33

The risks33

Identity Theft Considerations34

Preventive Measures36

Chapter 5: Summary and Conclusion38

References42

Identity Theft

Chapter 1: Introduction

Victimization in society results from many types of harmful behaviors committed by individuals or groups against other people. Behaviors considered negligent or abusive, or that otherwise are considered criminal in a particular place, often depends on the amount of harm inflicted, the technological means employed, and existing laws that forbid specific activities. Technological means used to commit cyber offenses refers to a combination of networked systems, hardware devices, software tools, and methods that people use on the Internet. Modern information technology (IT) hardware like computers, personal digital assistants (PDAs), cellular phones, and gaming devices can be used offline (in standalone mode), online, or wirelessly, from private or public places, in ways that are not easily recognized as illegal and that transcend more the one geopolitical or legal jurisdiction. In addition, illicit use of computing devices can facilitate many forms of traditional in-person crimes (Schatz,2007).

To fully understand cyber and Internet offenses, it is necessary to consider (1) the ways in which computerized devices and telecommunications systems came to be increasingly used for illicit purposes, (2) the myriad forms of online abuse and crime now taking place in our interconnected world, (3) the categories of people and organizations likely to fall prey to online forms of abuse and crime, (4) the social and economic impact of cyber and Internet offenses, and (5) what is being done to help prevent cyber offenses and provide services to victims of cybercrime. The large number of procedures, guidelines, practices, developed in the field of cyber crime should not surprise anyone, considering that, on the one hand, there are many organizations (international, regional or national), regardless of whether they are law enforcing authorities involved in cybercrime prevention, and, on the other hand, the methods to commit such crimes is “improved” at a very rapid pace, which is a real challenge for those who should prevent them ...
Related Ads
  • Identity Theft
    www.researchomatic.com...

    Identity Theft , Identity Theft Essay w ...

  • Identity Theft
    www.researchomatic.com...

    Identity theft is a crime with severe consequ ...

  • Identity Theft
    www.researchomatic.com...

    Identity theft has become the most rapidly in ...

  • Identity Theft
    www.researchomatic.com...

    There is no single accepted definition of identit ...

  • Identity Theft
    www.researchomatic.com...

    Identity theft is one of the fastest growing ...