0% found this document useful (0 votes)
159 views6 pages

Week 4 Assignment 1 Running Head: WEEK 4 ASSIGNMENT 1

The document is a paper on identity theft and cybercrime. It discusses three main types of identity theft: financial identity theft, non-financial identity theft, and criminal record identity theft. It also discusses how identity theft involves using someone's personal information like their name, social security number, or bank account number to commit crimes. The document also provides an overview of cybercrime and discusses how governments work to prevent hacking and intellectual property theft online.

Uploaded by

leabeverly
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views6 pages

Week 4 Assignment 1 Running Head: WEEK 4 ASSIGNMENT 1

The document is a paper on identity theft and cybercrime. It discusses three main types of identity theft: financial identity theft, non-financial identity theft, and criminal record identity theft. It also discusses how identity theft involves using someone's personal information like their name, social security number, or bank account number to commit crimes. The document also provides an overview of cybercrime and discusses how governments work to prevent hacking and intellectual property theft online.

Uploaded by

leabeverly
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

Week 4 Assignment 1

Running head: WEEK 4 ASSIGNMENT 1

Week 4 Assignment 1

Sylbern Edwards

Ashford University

Introduction to Computer Literacy

INF 103

Harold Fisher

Jan 25, 2011


Week 4 Assignment 1

Identity theft is when someone uses, without permission, your personal information in

order to commit any frauds or crimes. Identity theft is a felony that is becoming more and more

common. That is because some of us are not very careful with personal information, making

the job easier for those trying to steel our identity. We should always be careful with

information like Social Security number, credit card number, birth date, employment

information, driver's license number, etc., because if they enter into the wrong hands the

consequences can be very serious. People that have experienced identity theft spend months

trying to repair what others have damaged, and in the meantime they cannot get a loan or lose a

job opportunity or, sometimes, they can get arrested for something they didn't do.

` If you have the slightest suspicion that someone has gained access to your personal

information, acting quickly is a must. First of all, you should get in touch with the fraud

department of the credit bureau where you have your accounts and request them to initiate a

credit alert on your accounts. This way the creditors are obligated to contact you before taking

any actions regarding your accounts. At the same time you should close the accounts you

believe that are corrupted. The second step would be filing a police report and keeping a copy

of it so to have a proof of the crime.

Cyber crime is defined as crimes committed on the internet using computer as a tool

and we innocents are the target. There are various forms of cyber crime like Spamming. I am

sure all of us have encountered unwanted product advertisements. PIRACY is also a serious

threat that involves illegal reproduction and distribution of software applications, games,

movies and audio CDs which is causing a huge monetary loss to entertainment industry world

wide. However, the government has implemented laws to prevent hackers from using your
information along with heavy fines to those caught and convicted to theft through hacking and

others intellectual property violations. The government does a lot in our economic systems and

protecting people against cyber crime. The economic functions of our government are divided

into four categories. They provide public facilities and services. They provide us with public

well-being. They also regulate economic activity and ensure economic stability.

One of the four functions the government provides us with is public facilities and

services. National defense, education, and some health care are included in the public facilities

and services. Other services include police and fire protection, public transportation, highways,

bridges, and hospitals. This is very important for our public well-being. National defense is the

only one provided by the federal government. General welfare of the citizens is another

function the government provides us with. In order for the government to provide public

services they collect taxes from the citizens. Taxes are the monies the government collects from

both individuals and businesses.......

According to the USDOJ, this act prohibits:


Knowingly transfer[ing] or us[ing], without lawful authority, a means of
identification of another person with the intent to commit, or to aid or abet,
any unlawful activity that constitutes a violation of Federal Law, or that
constitutes a felony under any applicable State or local law (USDOJ Website).

Identity theft may be broadly defined as the unlawful acquisition and/or use of any

aspect of an individual’s personal information to be used for the commission of some form of

criminal activity (Hoar, 2001; LoPucki, 2001; Slosarik, 2002). This definition is intended to

encompass all forms of crime that fraudulently utilize a victims name, social security number,

address, bank account number, credit card number, etc. (Federal Trade Commission, 2004).

However, a more in-depth examination of the literature on identity theft provides a description

that consists of three basic categories for identity theft. According to Perl (2003), the major
categories include financial identity theft, non-financial identity theft, and criminal record

identity theft.

Perl (2003) notes that the category of financial identity theft represents crime based on

the illegal acquisition of financial means through the abuse of a victim’s personal information.

For this form of identity theft, the offender may open a false bank account in the victim’s name,

open new credit card accounts or even file for bankruptcy in the victims name (Perl). The

author also states that non-financial identity theft occurs when the offender uses the victim’s

information to open fraudulent utilities accounts, including basic utilities and

telecommunications accounts. Criminal records identity theft involves the offender using the

victim’s personal information for the purpose of avoiding legal sanctions (Perl). The above

noted categories of identity theft offenses will be used as a basis for the development of a more

in-depth typology and exploratory analysis.


References

Bowles, M.D. (2010). Introduction to computer literacy [electronc version]. E. Evens, et. al (Ed),

The digital society, Computing, information, and the law; Privacy (pp. 192). San Diego:

Bridgepoint

Buba, N. M. (2000). Waging war against identity theft: Should the United States borrow from

the European Union's battalion? Suffolk Transnational Law Review, 23, 633.

Cloward, R. A. (1959). Illegitimate means, anomie, and deviant behavior. American Sociological

Review, 24, 164-176.

Cornish, D. B., & Clarke, R. V. (1987). Understanding criminal displacement: An application of

rational choice theory. Criminology, 25, 933-947.

Federal Trade Commission (2004). Understanding identity theft. Retrieved March 24, 2004,

from United Stated Federal Trade Commission Web Site:

http://consumer.gov/idtheft/understanding_idthtml#1

Federal Trade Commission (2003). Federal Trade Commission - Identity theft survey report.

Washington, DC: U.S. Government Printing Office.

Federal Trade Commission (2002). National and state trends in fraud and identity theft.

Washington, DC: U.S. Government Printing Office.

Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford: Stanford

University Press.
Hatch, M. (2001). The privatization of big brother: protecting sensitive personal information

from commercial interests in the 21st century. William Mitchell Law Review, 27(3),

1457-1502.

Hoar, S. B. (2001). Identity theft: The crime of the new millennium. Oregon Law Review, 80,

1423.

Identity Theft Resource Center (2003, summer). Identity theft: The aftermath 2003. : Identity

Theft Resource Center.

Lanier, M. M., & Henry, S. (2004). Essential criminology (2nd ed.). Boulder, CO: Westview

Press.

You might also like