Survey of Research Literature in Information Technology Management Infrastructure
Abstract:
Identity theft is one of the fastest growing crimes in the United States. There are many definitions of identity theft, however this type of crime typically involves illegally utilizing somebody else’s personal information for both personal and or financial gain. Thieves acquire personal information through different methods ranging from stealing physical documents all the way to hacking into corporate databases. The consequence of such theft, range from monetary losses to stress, harassment by creditors, and even arrests for crimes that were committed by somebody else. Consumers can protect themselves from such attacks by utilizing caution in the digital world with firewalls, spyware software and credit reporting tools. Businesses can also utilize identity cards, RFID chips, encrypted databases and protection of identifiable information at all times.
Tables of Contents
Abstract ………………………………………………………………………………….2 Tables of Contents ………………………………………………………………………3 Introduction……………………………………………………………………………...4 What is Identity Theft…………………………………………………………………..5 Consumer…………….……………………………………………………………….....7 Business…………………………………………………………………………………13 Solutions……………….………………………………………………………………..16 Shortcomings of Systems in Place……………………………………………………..19 Conclusion………………………………………………………………………………21 References………………………………………………………………………………22
Introduction The field of Information Technology is one of the fastest growing fields in the world. Daily innovations and discoveries are flooding our lives. The continual strive for speed and efficiency make the world move faster into the new era of digital information. In addition to advances in computing, many other fields are forced to innovate and comply with the demands of the new 21st century consumer. However with all the convenience and access
References: “.. federal systems and sensitive information are at increased risk of unauthorized access and disclosure, modification, or destruction, as well as inadvertent or deliberate disruption of system operations and services.( Bertoni, D. 2009)”. “…there is a significant need to widely implement measures for tracking and tracing identity thieves and fraudsters once a breach has occurred. There are various means of doing so, whether electronic or physical (Gregory, A. 2008).