Tuesday, April 30, 2019
Personal Identity Theft Dissertation Example | Topics and Well Written Essays - 5000 words
Personal Identity Theft - Dissertation ExampleIn delineate this terminology, Blair (2011) identifies three steps undertaken by such criminals essay to obtain another(prenominal) persons information, trying to misuse the obtained information and finally, executing the crime with the intention of victimising the target. Recovery from this crime could be frustrating, expensive and metre consuming for the victim. The objective of paper is to come up with a sensitization framework of educating the public on identity element theft and to establish ways of preventing the crime. To achieve this, this paper will give a place setting of the crime, articulating the forms in which it could be executed. Determining the prevalence of the crime would be important in forming the basis of countersign on prevention measures and the public awareness. Guided by the findings from the secondary sources, the review will finally root on effective public education strategies. The paper is divided into two sections. The first section focuses on the previously published papers that have discussed the identity theft background and history. Various forms of identity theft including corporeal forms and technology-based forms will be discussed in this section. In the second section, the paper seeks to develop a sensitization political program that would appropriate in enabling the society to deal with the cyber crimes in the most effective way. PART 1 LITERATURE REVIEW Early approaches to identity theft Despite the newness of the piss identity theft, the phenomenon is old with the archaean forms adopting the simple forms of impersonation. Impersonation refers to the imitation of another person so as to defraud others, usually for individualised gains (Hoffman & McGinley 2010). The early imposters imitated... Despite the newness of the name identity theft, the phenomenon is old with the early forms adopting the simple forms of impersonation. Impersonation refers to the imitation of another person so as to defraud others, usually for personalized gains (Hoffman & McGinley 2010). The early imposters imitated the talking, dressing and behaviour of others, which with cadence became ineffective as other more effective personal identification theft forms emerged. Stolen, fictitious and uncollectible identification documents together with financial account information catalysed identity theft. Today, technology has transformed the usage, collection and remembering of personal information making identity theft a more complex crime. Hoffman and McGinley (2010) cite the biblical story of Jacob who masqueraded as Esau so as to receive his fathers blessings as among the early forms of identity theft. This was propagated by Rebecca, the mother, who was determined to ensure that her son Jacob and not Esau receives her husbands blessings. With the fathers lamentable visibility due to old age, Esaus dressing was used to disguise his smell and application of goatskin to spread out the touch of the hairy Esau. In the Middle Ages, the 1450 Cades rebellion gives a story of John Aylmer who changed his name several times, organised a rebel army, all in an attempt to overthrow the England King enthalpy VI (Hoffman & McGinley 2010). Despite his failure, John has been widely considered as an opportunist motivated by the desire for personal glorification.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.