Date: 11/10/15
ENG 208: Public Speaking
Dr. Aghasi
Informative/Persuasive Speech Preparation Outline
Victims of Identity Theft
General Purpose: To inform.
Specific Purpose: To inform my audience of how you could become a victim of identity theft and ways in which you could prevent it.
Central Idea: If we learn more about identity theft we may be able to prevent it from happening, as there is a huge possibility that many of us are victims of identity theft and are still not aware of it.
Method of Organization: Causal (Problem-cause-solution)
INTRODUCTION
I. Gain attention and interest: Have you ever made any purchases online with your credit card? Have you ever filled in a form with your personal information on a random website? Have you ever left your wallet or …show more content…
handbag unattended?
II. Reveal the topic and link the attention grabber to said topic: If so, you are vulnerable to identity theft. According to the United States Department of Justice, identity theft is a term used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain (The United States Department of Justice, 2015).
III. Establishes Credibility: After looking through a high number of reports on identity theft on government websites and newspaper articles, as well as numerous journal articles identifying the different ways in which you could become a victim of identity theft, I realized the importance of it.
IV. Specific purpose statement (“thesis”) & Preview the body of the speech Reasons to listen: And so I would like to start with informing my audience about the problems one may face as a victim of identity theft. Then I would like to mention the causes that lead to those problems following a few strategies that could help prevent you from becoming a victim of it.
BODY
A. There are three major problems that individuals and even businesses face as victims of identity theft.
1. The first and worst-case scenario: You are held responsible for any damages or criminal acts that are made by the identity thief when he or she uses your name.
a. Thieves use the technique of hacking to get unauthorized access to computers in order to gain crucial information. This information could be your full name, date of birth, passport number or even your banking details.
i. For example: There was a case where the identity thief was a major drug dealer. He was also an expert in hacking and so managed to hack into the personal computer of a high tech company’s president. He then used the information to steal the president’s identity. Now, every time the president has to travel in and out of the country he has to carry a letter from the law enforcement that justifies he is not the drug dealer. This is because he is always pulled into secondary inspection (Hammond, 2003).
2. Another problem that occurs is the loss of thousands and millions of dirhams.
a. Recently, a businessman in Dubai lost 360,000 dirhams to an email hacker who had posed as one of his online suppliers. The hackers intercepted the real emails and so Hamid, the businessman, received made up invoices with the hacker’s banking details rather than the actual suppliers (“Dubai businessman loses”, 2013).
3. Cleaning up the mess of these problems, another problem occurs: victims spend a great deal of time and money to recover from an incident of identity theft.
a. In a journal article of a famous scholar and a professor at Southwestern Oklahoma State University, Passard Dean, mentioned that on an individual basis it may take up to 175 hours which is approximately 7 and a half days to 1) change any information that has been altered, 2) get reimbursed for the losses incurred and 3) receive protection to prevent identity theft from happening again (Identity Theft: A situation of worry, 2014)
Internal Summary: There are a number of other problems that individuals face, from which we now know about three.
Let’s go over these three, 1) being held responsible for the damages done by the criminal’s 2) loss of huge amounts of money and 3) that recovery may take a lot of time and money.
B. You might be thinking it is the criminal who steals the name, the criminal who steals someone’s banking details and so it is the criminal who causes identity theft to occur. But what if I told you; you may be the cause? Now I’m going to mention three causes of identity theft.
1. Individuals who do not keep their personal information secure due to lack of knowledge.
a. For example, how many of you have used an ATM machine? When doing so, if you do not secure the information you are entering into the machine, you are giving the thief a chance to “Shoulder surf”.
i. Shoulder surfing is a tactic when a person looks over another person's shoulder and attempts to see the information they are putting (Identity Theft: A situation of worry, 2014). For instance, your account number or your PIN number.
2. The second cause is the increase in reliance on the Internet for a number of
activities.
a. Criminals use the technique of phishing, which is an online process to get access to your personal information. This is done through bulk emails where the thief somehow induces the receiver to give out his or her personal information (Brodgy, 2007).
i. Suppose a criminal sends out thousands of emails that appear to be from Mashreq Bank, actual customers of Mashreq Bank will be willing to give out any information, due to the reliance on online banking. This information is what the thieves will further use to empty customer bank accounts.
3. Companies that give employees the authority to access crucial company databases.
a. Whether you walk into a library to get a book, a store to get some groceries or visit a website, a group of people or a software program stores all this information. Dishonest employees who have access to this information use it to steal customer identities.
i. A 28-year-old college dropout was found with stolen information of more than 130 million credit and debit cards. He got this information by accessing the customer databases of the convenient store he was working at (Roethlisberger, 2011).
Interval Preview: Now that we have examined the problems and its causes, I would like to talk about three strategies that could help prevent you from becoming victims of identity theft.
C.
1. Let’s start with the easiest step; increasing your knowledge on identity theft.
a. A study found that 72 percent of British students and 82.3 percent of Canadian students had very little or no knowledge of identity frauds (Anderson, 2008). Think about it, that’s approximately only four students amongst us who know about it.
2. Second strategy: Don’t let your mail sit in the mailbox.
a. Whether it is junk mail, bank statements, bills or even a conversation with your family or friends that is sitting in the mailbox, it all contains information that identity thieves use to impersonate you. (“Identity theft”, 2008)
3. Third strategy: Keeping a continuous check on stuff that carries any crucial information.
a. In order for businesses to keep their customer’s personal information secure they must make either weekly or monthly checks on their security systems.
b. However, individuals must regularly check their online bank accounts and emails to keep themselves secure at all times.
4. CONCLUSION
1. Signal the ending: Taking everything into account, we cannot ignore the threat of identity theft in our lives.
2. Reinforce the central idea and review the main points: However, we do have strategies that could help prevent us from becoming victims of it. As a whole, I hope you gained a clear understanding of what causes the problems of identity theft.
3. End on a strong note: And the next time you buy yourself something online, don’t forget that there is someone out there watching you.