Throughout our lives ever since we were born we needed protection. From the time we were just newborn babies to when we are older we seek protection. Even the world as we know it is designed for human safety. From the cars we drive which have seat belts to when we are conducting science lab experiments and have to wear goggles. The same type of protection is needed in the internet. One main problem we have in today’s society is concerning Identity theft, which is when someone uses your identity for their benefit.
Short History
Many people believe that identity theft began with the advent of the internet. But the truth of the matter is that Identity theft started before the advent of the internet.
Statistics say that identity theft is much more common now than it has ever been in the past. This is largely due to the advent and widespread use of the internet. However, identity theft did not begin over the internet.
📚
Coursework deadlines stacking up fast?
Module assignments, portfolio tasks, weekly submissions — our coursework writers know exactly what your tutors expect. Matched by subject, delivered on your deadline, fully referenced and properly formatted.
✓ Plagiarism-free · ✓ 100% human-written · ✓ Free revisions · ✓ Confidential
🔒 No payment to start · From $11/page
Before the Internet came along, identity thieves could steal your identity by searching your trash to find personal information on papers like your bills and other important documents.
Other ways they could find your personal information is through phone scams. For example, an identity thief could phone someone to inform them that they won a prize, and for them to receive it they would need to give some personal information, and then use it for their benefit in the way they choose.
Ever since the internet came along, with other new technologies, identity theft has become more consistent, easier to do, and safer to execute it without getting caught.
📄
Struggling with your research paper structure?
From thesis statement to references, our research paper specialists build evidence-driven arguments using peer-reviewed sources. APA, MLA, Harvard, Chicago — undergrad to doctoral, every discipline covered.
✓ Plagiarism-free · ✓ 100% human-written · ✓ Free revisions · ✓ Confidential
🔒 No payment to start · From $11/page
The rapid growth of identity theft
The fastest growing crime in the world is widely starting to be considered Identity theft. Increasing identity theft is caused by the many ways in which we live our lives and process information. All these processes make it easier for identity thieves to access our person identifying information and ultimately snatching our identities.
The internet is a bypass of giving out your personal information quickly and easily resulting in it being sometimes less secured. If we really think about it we access our credit cards online, pay our bills online, and shop and make credit card transactions online. All of these things are quick and convenient but at the same time can pose a rick toward us
Some identity thieves create programs called spyware that is installed when we try installing different programs from the internet. The installed spyware basically spies on what you’re doing. Every time you go on a website, type your password, transmit information, the spyware keeps track of it. The people receiving this data can either keep it for themselves or pass it on to another person for money. One type of spyware called “Trojan horse” allows their creator to access through remote the computer and hard drive.
✍️
Your thesis deserves more than a rushed draft.
Master's and doctoral thesis writing requires a defensible argument, rigorous methodology, and impeccable academic writing. Our thesis specialists have delivered 8,400+ model documents that passed committee review.
✓ Plagiarism-free · ✓ 100% human-written · ✓ Free revisions · ✓ Confidential
🔒 No payment to start · From $11/page
When people make online transactions, online retailers of the store save both our contact name and credit care information on their databases. Then Marketing agencies collect the information from our spending habits as well as contact information, which seem to be secure. But the people that work there sometimes tend to sometimes have access to this information and use it for their own benefit. They may sell it or may be bribed to give out other people’s personal information breaking company policy.
Some times credit card companies give promotional offers to customers and have their credit card numbers on them, and if not disposed properly with a shredder than identity thieves going through your garbage and can use your personal information for their own benefit.
Data about Identity Theft
The Identity Theft Resource Center which is a non-profit organization identifies that theft can be sub-divided into five categories: