Verified Document

Securing Personal Information To Prevent Theft Essay

Identity theft is a kind of theft that involves someone stealing the identity of someone else by assuming that person's identity (Lai, Li, & Hsieh, 2012). This is usually a method of gaining access to the person's resources like credit cards and other things in the person's name. This is considered a white-collar crime and it has gained popularity amongst criminals. According to statistics, each year hundreds of thousands of people have their identities stolen. The thieves will use the person's personal information like bank account numbers, credit card numbers, social security numbers, and insurance information to purchase goods fraudulently. The Federal Trade Commission has reported that over 7 million people were victims of identity theft in the past year. This is quite a huge number, and it indicates identity theft is a growing in the United States. When someone manages to use another person's personal information to obtain credit, or make huge purchases, he or she will definitely use the same information repeatedly as a reference to other victims. The technological advances taking shape within the society have created a loophole that the thieves can use to steal and use the victim's personal information. There are different ways that a thief can employ to retrieve personal information. The most common method employed by the thieves is phishing. Using this method, the thieves would manage to trick the potential victim to insert their personal information into a fake website. Once they have the information they would proceed to use the information fraudulently mainly to acquire credit or make online purchases. Ethical issues

When a person steals another person's information and uses the information for fraudulent purposes, they are violating the person's basic liberties. Since a majority of the crime takes place online, it is quite difficult for the authorities to determine the identity of the...

The victims of identity theft do not realize they have been robbed until it is too late. Computers and technology have made it easy for people to transact and interact online, but this has also brought about security issues that the thieves have managed to abuse (Holt & Turner, 2012). The right to privacy is violated when identity theft occurs. With the information stolen, the thief is able to gain access to the victim's personal information like bank records, and financial information. The methods used by the thieves to gain access to this information violates the victim's privacy because they use malicious spyware or viruses to take the information from the victim's computer. Gaining access to a person's information without their consent results in the invasion of privacy. The thieves would make use of illegal methodologies in order to gain access to this information. The methodologies would violate the person's right to privacy and security. The information gathered or obtained by the thief should not in any be used or kept for reference purposes. However, technology has allowed for the storage of vast amounts of information and data. This means that the thieves can keep the information for as long as they need. They would then make use of the personal information as they deem fit.
The victim could be accused of a crime they did not commit. The thieves could use the victim's personal information to commit a crime, and this would result in a wrong conviction. Ethically speaking this is quite wrong and it violates a person's right to justice. The difficulty in proving one's innocence makes it hard to have a fair trial or judgment. The thieves would be taking and using something that is not rightfully theirs, which is wrong and unethical. Stealing of any kind should be discouraged and stealing personal information makes it even worse because the thief gains access to…

Sources used in this document:
References

Holt, T. J., & Turner, M. G. (2012). Examining risks and protective factors of online identity theft. Deviant Behavior, 33(4), 308-323.

Lai, F., Li, D., & Hsieh, C.-T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52(2), 353-363.

Saleh, Z. (2013). The Impact of Identity Theft on Perceived Security and Trusting E-Commerce. Journal of Internet Banking and E-Commerce, 18(2), 1-11.
Cite this Document:
Copy Bibliography Citation

Related Documents

Information System on Ethical and
Words: 6479 Length: 15 Document Type: Research Paper

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Challenges of Protecting Personal Information
Words: 2593 Length: 9 Document Type: Research Paper

Protecting Personal Information When considering the ever-changing and highly competitive global landscape of business today, large firms must be able to effectively globalize their operations in order to reach a greater potential client base, stay at the cutting edge of their respective fields and sustain profitability in the long-term. With the current exponential growth of technology and computerization of business and learning, consumers have become much more connected to the

Personal Security and the Internet
Words: 2573 Length: 8 Document Type: Term Paper

The responsibility to seek out and use the most appropriate form of protection for a particular system lies with its user. If a user does not regard these duties with the appropriate seriousness, the consequences could be dire indeed. Another very threatening form of computer crime is the phishing scam. Phishing Phishing involves email from an apparently legitimate source such as a bank or other place of business that requires the user

Information Technology Holds Great Promise for Improving
Words: 3297 Length: 12 Document Type: Term Paper

Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax payers, and businesses alike. It is therefore recommended for every particular government to develop digital services to streamline all its operations. One area where governments should enhance its key functions is the establishment of

Information Security Training Program
Words: 3414 Length: 12 Document Type: Research Paper

Federal Information Security Management Act (FISMA) The Federal Information Security Management Act places emphasis on the importance of training and awareness program and states under section 3544 (b).(4).(A), (B) that "security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency of- information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures

Information Protection Law and Privacy
Words: 4525 Length: 16 Document Type: Essay

protect the privacy of the individual via EU Directive for Protection of Personal Data The internet revolutionized the human life as we know it. It established a culture of liberty aided by not just ingenuousness but also standardized protocols. This was achieved by transmitting the essential products for business-related growth, adopting a model of governance with no formal existence of regulations along with free availability of abundant software packages. This

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now