Identity Theft Research Paper by write123

Identity Theft
This paper discusses the management of the risk of identity theft, both online and offline.
# 106397 | 1,140 words | 3 sources | MLA | 2008 | US

$19.95 Buy and instantly download this paper now


In this article, the writer notes that according to the Federal Bureau of Investigation (FBI), identity theft is the fastest growing form of white collar crime, costing American consumers and businesses approximately $50 billion in the United States in 2006. The writer discusses that the ever-increasing use of the Internet presents more targets of opportunity, particularly among new computer users unfamiliar with high tech information theft scams. However, the common perception that on-line activity is the greatest threat to personal information security is inaccurate; actually, more identity theft results from traditional off-line consumer transactions, especially those whose procedures typically involve relinquishing physical possession of a credit card to an employee who leaves the presence of the card's owner, such as in restaurants. The writer maintains that the most important method of protecting one's personal information on-line is through the use of passwords. Passwords should never be based on personal information like birth dates, because these are easily deduced by identity thieves with access to that information, which many people divulge in on-line personal profiles. The writer concludes that likewise, one's wireless connection should have all security features enabled and all software updates, especially anti-virus software.

Introduction - Understanding the Problem
Protecting Private Information Off-line
Protecting Private Information On-line
General ID Information Safety

From the Paper:

"One of the easiest sources of other people's private information is household trash. Therefore, it is essential to use a cross-cut paper shredder to destroy any papers containing personal information such as financial accounts, credit card statements, credit card applications and loan offers, and medical records, which often include Social Security numbers within patient billing information.
"With your Social Security number, identity thieves can obtain drivers licenses in your name, as well as open bank accounts and lines of financial credit which they can exhaust, leaving you the debtor of record. In many instances, thieves may submit fraudulent change-of-address forms at the post office enabling them to redirect your mail to an alternate address. Therefore, any apparent disruption, reduction, or delay in mail should be reported to the local post office for confirmation of your address on record and any recent change requests."

Sample of Sources Used:

  • Ballezza, R.A. The Social Security Card Application Process: Identity and Credit Card Fraud Issues. Federal Bureau of Investigation Law Enforcement Journal. Vol. 76 No. 5 (May/07).
  • Consumers Union. Cyber Insecurity: Viruses, Spam, Spyware. Consumer Reports. Vol. 71 No. 9 (Sep/06)
  • Consumers Union. Net Threats: Why Going On-line Remains Risky. Consumer Reports. Vol. 72 No. 9 (Sep/07)

Cite this Research Paper:

APA Format

Identity Theft (2008, July 31) Retrieved April 17, 2024, from

MLA Format

"Identity Theft" 31 July 2008. Web. 17 April. 2024. <>