there information is not as safe as they think. Identity theft is the unauthorized use of another person’s personal information to achieve financial gain.
It can be a stolen payment card to make a fraudulent payment. Anyone taking over someone’s account or falsely making a new one with another person’s information. There are many different kinds of identity theft ranging from bank account s to utility services. According to research reports there has been more than 12.6 million identity theft victims reported in the U.S. alone. Which is the main reason to add better security to internet sites that take payments over the web. The statistics are alarming, Nearly 21 Billion dollars has been reported stolen and not just over the internet but by thieves rummaging through garbage cans waiting to find a juicy piece of mail with personal information on it. By shredding mail and any other important papers that people don’t need or want to keep stops these predators from getting this vital information.
1 victim every 3 seconds is now the current rate of identity theft the second all-time high. In 2004, $47 billion dollars were reported stolen and the internet was not as invasive as it is now. With the huge popularity of the internet and social sites people can know way too much about one another. With social media never post extended vacations, this may invite unwanted guests. It would be a good idea to keep pages private so that only friends and family can see the posts. Always keep in mind that anyone can be a victim and anyone …show more content…
can be a predator. 1 in 6 people has had or has known someone that had their identity stolen. With the growing rate of identity theft it is also important to have good security on personal computers and laptops. The use of anti-spyware and malware will help deter the thieves from assessing files and credit card information from computers. Never open or answer to emails that you don’t know where it came from. There are programs made specifically to clone and steal information. Hackers use programs to breach the weaknesses of databases which hold important personal information, which can be used for identity theft. The main areas that these predators target are bank and financial information. Records of transactions from various people so they can get hold of large amounts of money. In the past, Identity Theft was paired the rich and upper class.
Now it has struck harder than ever around the world. The United States has many laws that try to prevent the act of identity theft but has yet to “crack down” on the crime. In 2009 The Ministry of Justice of the Netherlands started awareness campaigns. These campaigns where made to prevent their citizens from falling victim to these Cybercrimes. Within the campaign they introduced a Fictional character “Sandra” who’s information was displayed on a television for all to see. Of course “Sandra” looking shocked was supposed to depict the unawareness of each naïve citizen. These campaigns where straight to the point and should left a mark on the public (Between Awareness and Ability: Consumers and Financial Identity Theft. Communications and Strategies. (81), 23-44.Barbara: ABC-CLIO, 1998. Credo Reference. 2 Sept. 2008. Web. 11 Nov. 2013. Van der Meulen, N. S. (2011).). In the United States there should be straighter to the point campaigns to show people that they are not
safe.
Before digging into the behaviors that consumers might or might not do to potentially initiate the first stage of financial identity theft, we would first have to see all the factors and the players involved. The problem is that people don’t know anything about companies’ policies on identity theft. Since therefore not showing the depth of the seriousness of crime. First of all, the only effect consumers may utilize with respect to the companies of financial identity theft is in relation to the first stage, where the predators acquire the personal information needed to either commit true name fraud or account take over. The second stage, where the predators abuse the previously obtained personal information, is at the will of the public and the private division, through this means the authentication initially will proceed with or without verification. In here lye’s another problem. Even though the theft is reported there is a waiting period for the verification of the fraud. Within that time a number of things can happen including the sale of the identity or even other transactions.
Another problem that can arise is a decline in credit scores. Even though the Identity theft happened that will not stop the companies from reporting to the 3 credit bureaus. This should not be, there should be laws that state that if someone has a current identity theft claim then the account in question should be frozen for investigation not only to the company but to the credit bureaus. Yet another reason to hold important information dear. Identity theft can ruin your current finances but your future too.
Although online retail is relatively new, online purchases increased creating consumer confidence meaning they not only shopped once but time and time again. From these facts we can see that the more user there are the more the bigger the problem with fraud and identity theft becomes, because more users means more data, meaning more for fraudsters to access and steal, from when online shopping was new consumers had an open mind to the new shopping system and was willing to explore with caution, but as this system became more readily available it became easier for criminal to break into these systems through the weak spots. As the problem with identity theft and scams becomes widespread companies beginning to wise up, but by this time it is too late because most customers have lost trust in their security system, especially those small companies, as for the larger companies they implement more expensive security system in the hope to prevent any further attack so they can build back the B2C trust.
Customers and organizations both suffer a big lost in trust, and on the financial side of things it is fair to say the business suffer a greater lost once their system is penetrated by a fraudster, thus companies who can afford to implement more secure systems for their online sites, they can survive as for small business some would suffer bankruptcy and eventually lead to shutting down the business.
The strategy that an organization should adopt in order to prevent attacks to their database systems includes hiring third party security firms to monitor their systems daily routine transactions and implement more trusted software as an aid to boost the security level. Online customers must also take precautions when visiting any websites that they intent on give data about them self by using have anti-spy wear or virus software to safeguard any programs trying to gather their information.
In this wonderful world of technology we see the ups and the downs every day. But as people go on with their lives they must know that there are predators waiting to take what is there’s. Safe guarding information is a necessity now, and it is very hard to get an identity back after it has been compromised. It is important always to know who you’re giving your passwords, and codes to and what kind of computers you’re logging into in different places. It doesn’t matter where you are from, Identity theft is now an epidemic that has not showed any sign of fading.
References
Sanchez, M. (2012). The Role of the Forensic Accountant in a Medicare Fraud Identity Theft Case. Global Journal of Business Research, 6(3), 85-92.http://search.proquest.com/docview/416189523?accountid=458
Van der Meulen, N. S. (2011). Between Awareness and Ability: Consumers and Financial Identity Theft. Communications and Strategies, (81), 23-44.Barbara: ABC-CLIO, 1998. Credo Reference. 2 Sept. 2008. Web. 11 Nov. 2013. .
Sovern, J. (2004). Stopping Identity Theft. Journal of Consumer Affairs, 38(2), 233-243.Gale, 2001. 197-199. Gale Virtual Reference Library. Web. 10 Nov. 2013.http://go.galegroup.com/ps/i.do?id=GALE%7CCX3406000203&v=2.1&u=uphoenix&it=r&p=GVRL&sw=w&asid=774b905d1ecd90b4f798960b97b9db5c