Verified Document

Publicized Crimes In America Today Research Paper

The prosecuting of identity thieves has proven difficult. Although there has been a rapid increase in the number of statutes addressing the situation on both the state and federal level, the nature of the crime, the anonymous aspect of it, and the time parameters make apprehension and prosecution quite difficult (Pastrikos, 2004). Nevertheless, there has been an aggressive effort on both the state and federal levels to increase their efforts and successes.

The best approach to defeating identity theft is prevention. Potential victims should be cautious about sharing personal information with anyone not possessing a legitimate need for such information. In today's society where business transactions are done more frequently over the telephone and computer this is particularly important. Additionally, and most importantly, the use of one's social security number should be limited to those situations for which it was originally intended, that is, for employment and financial relationships.

Other prevention measures include scrupulous protection on one's wallet, purse, checkbook, and credit cards. If any of these items are lost or stolen, immediate report of such action should be initiated....

Limiting the exchange of information by way of the computer or cell phone is extremely important as is the disposal of information that may emanate from one's home.
The reality is that there is no failsafe method for protecting personal information but the results of having one's identity stolen warrant the exercise of extreme caution. Identity theft will not fade away soon and the only way of avoiding falling victim is to protect one's personal information. Failing to do so can be disastrous.

References

Berghel, H. (2000). Identity Theft, Social Security Numbers, and the Web. Communications of the ACM, 17-21.

General Accounting Office. (2009). Identity Theft: Governments have acted to Protect Personally Identifiable Information, but Vulnerabilities Remain. Washington, D.C.: General Accounting Office.

Pastrikos, C. (2004). Identity Theft Statutes: Which Will Protect Americans the Most? Albany Law Review, 1137-1157.

Identity Theft

Rubina Johannes, et al. 2006 Identity Fraud Survey Report, Javelin Strategy & Research (2006).

Identity Theft and Assumption Deterrence Act, Public Law 105-318, 112 Stat. 3007 (1998).

Sources used in this document:
References

Berghel, H. (2000). Identity Theft, Social Security Numbers, and the Web. Communications of the ACM, 17-21.

General Accounting Office. (2009). Identity Theft: Governments have acted to Protect Personally Identifiable Information, but Vulnerabilities Remain. Washington, D.C.: General Accounting Office.

Pastrikos, C. (2004). Identity Theft Statutes: Which Will Protect Americans the Most? Albany Law Review, 1137-1157.

Identity Theft
Cite this Document:
Copy Bibliography Citation

Related Documents

Citizen Participation and Solving Serious Crime
Words: 727 Length: 3 Document Type: Research Paper

Enhancing Citizen Participation for Solving Serious Crime The Presentation Includes The need of involving communities in crime controlling activities The stake of community The approach of the crime stoppers Greg MacAlesse, 1976 Enhancing Citizen Participation and Solving Serious Crime: A National Evaluation of Crime Stoppers National Evaluation 1984 The research work THE NEED OF INVOLVING COMMUNITIES IN CRIME CONTROLLING ACTIVITIES Communities form a major portion of the society, the fact can therefore not be neglected that with the active involvement

Child Welfare Rev America's Child
Words: 2430 Length: 5 Document Type: Research Proposal

A consequence has been the increasingly common act by states and cities of slashing budgets which either eliminate child welfare agency resources or even the agencies themselves. Today, in the anticipated aftermath of the rash of scandals pockmarking the Bush Administration's oversight in this area, many agencies are simply fighting to stay alive. And today, in so many state venues, there is a justified fear of the budget axe.

Administration Responsibility Spotting and Bringing Up Leaders in...
Words: 2157 Length: 7 Document Type: Term Paper

Recruitment and Training of Religious Ministry Theology, a definition. What does it take to recruit and train qualified members of the ministry today? Description of Message: A hands-on approach that encourages growth of mind and spirit will provide lay people with a well-rounded vision and the knowledge absolutely necessary to be successful in the church. No two-year or four-year academic program alone can provide lay people with the insight they need to

Governmental Crime and Corruption
Words: 1096 Length: 4 Document Type: Essay

Corruption Within the Criminal Justice System Although the American system of criminal justice and jurisprudence is widely regarded as a model for democratic nations across the globe to emulate, with its guarantee of due process and protection from illegal search and seizure standing as pillars of liberty, glaring defects still exist which warrant further improvement. From the disturbing trend of disproportionate arrest and sentencing among minorities, to the inability of courts

Nils Christie's Book Crime Control As Industry Towards Gulags Western...
Words: 3079 Length: 10 Document Type: Term Paper

Nils Christie in his book Crime Control as Industry: Towards Gulags, Western Style, a person has difficulty knowing who are the worst criminals -- the men and women prisoners or the individuals who run the penal industry. The book details how the United States relies on the criminal justice system to enrich business interests by following the model of corporate America. The disciplinary system is supposedly designed to control

Cyber Crime and Technology Crime
Words: 4865 Length: 14 Document Type: Research Paper

Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now