Friday, June 14, 2019

Personal Identity Theft Dissertation Example | Topics and Well Written Essays - 5000 words

Personal Identity Theft - Dissertation ExampleIn defining this terminology, Blair (2011) identifies three steps undertaken by such criminals trying to obtain another persons information, trying to misuse the obtained information and in the end, executing the plague with the intention of victimising the target. Recovery from this crime could be frustrating, expensive and time consuming for the victim. The objective of paper is to come up with a sensitization framework of educating the mankind on indistinguishability theft and to establish ways of preventing the crime. To achieve this, this paper will give a background of the crime, articulating the forms in which it could be executed. Determining the prevalence of the crime would be important in forming the basis of discussion on prevention measures and the public awareness. Guided by the findings from the secondary sources, the review will finally recommend effective public education strategies. The paper is divided into two sec tions. The first section focuses on the previously published papers that have discussed the individuality theft background and history. Various forms of personal identity theft including physical forms and technology-based forms will be discussed in this section. In the second section, the paper seeks to develop a sensitization program that would appropriate in enabling the society to deal with the cyber crimes in the most effective way. PART 1 LITERATURE REVIEW Early approaches to identity theft Despite the newness of the name identity theft, the phenomenon is old with the proto(prenominal) forms adopting the simple forms of impersonation. Impersonation refers to the imitation of another person so as to rip off others, unremarkably for personal gains (Hoffman & McGinley 2010). The early imposters imitated... Despite the newness of the name identity theft, the phenomenon is old with the early forms adopting the simple forms of impersonation. Impersonation refers to the imitatio n of another person so as to defraud others, usually for personal gains (Hoffman & McGinley 2010). The early imposters imitated the talking, dressing and behaviour of others, which with time became ineffective as other more effective personal identification theft forms emerged. Stolen, imitation and forged identification documents together with financial account information catalysed identity theft. Today, technology has transformed the usage, collection and storage of personal information making identity theft a more complex crime. Hoffman and McGinley (2010) cite the Biblical story of Jacob who masqueraded as Esau so as to receive his fathers blessings as among the early forms of identity theft. This was propagated by Rebecca, the mother, who was determined to ensure that her son Jacob and not Esau receives her husbands blessings. With the fathers poor visibility due to old age, Esaus dressing was used to disguise his smell and application of goatskin to fool the touch of the hai ry Esau. In the Middle Ages, the 1450 Cades rebellion gives a story of prank Aylmer who changed his name several times, organised a rebel army, all in an attempt to overthrow the England King Henry VI (Hoffman & McGinley 2010). Despite his failure, John has been wide considered as an opportunist motivated by the desire for personal glorification.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.