Methods Identity Theft Takes Place Research Paper

Total Length: 696 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

Identity theft is a kind of theft that involves someone stealing the identity of someone else by assuming that person's identity (Lai, Li, & Hsieh, 2012). This is usually a method of gaining access to the person's resources like credit cards and other things in the person's name. This is considered a white-collar crime and it has gained popularity amongst criminals. Identity theft does not involve any physical theft. Therefore, the victim might not realize the theft until significant damage has occurred. Identity thieves make use of a variety of methods, and not all of them are computer based. Thieves can go through the person's trash or mail searching for bank and credit card information, statements, and tax information. The information stolen can then be used to commit crimes like accessing credit under the person's name and using their details. Another method used to steal information is stealing the person's credit cards, identification, and bankcards from their purse or wallet. Stealing the person's identification and credit cards would allow the thieves to pose as the person and obtain credit using the person's identity. Thieves can also redirect the victim's mail by completing a change of address form, which allow them to receive the victim's mail and personal information.

Stuck Writing Your "Methods Identity Theft Takes Place" Research Paper?

Posing as a property owner or someone else who is authorized to obtain a credit report, the thieves can acquire a person's credit report. Thieves can also use a contactless credit card and bankcard reader to obtain personal information. The readers have the ability to acquire data wirelessly from the RFID cards. When this method is used, the victim would not be aware that the theft has occurred unlike the physical stealing of purses, or wallets.

Other computer-based methods can be used to commit identity theft like phishing, hacking, brute force attack, and exploiting computer breaches. Using the phishing method, the thieves will create a look-a-like website of a genuine website in order to trick victims to submit their personal information. The thieves will send emails to potential victims requesting or informing them that they need to change or update their personal information (Tajpour, Ibrahim, & Zamani, 2013). The link provided within the link directs the victims to the fake website, and if they submit any information, the thieves will use it to commit fraud. Hacking involves forcefully accessing computer networks, databases, and computer systems in order to steal the information being….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Methods Identity Theft Takes Place" (2015, November 16) Retrieved May 21, 2025, from
https://www.aceyourpaper.com/essays/methods-identity-theft-takes-place-2161224

Latest MLA Format (8th edition)

Copy Reference
"Methods Identity Theft Takes Place" 16 November 2015. Web.21 May. 2025. <
https://www.aceyourpaper.com/essays/methods-identity-theft-takes-place-2161224>

Latest Chicago Format (16th edition)

Copy Reference
"Methods Identity Theft Takes Place", 16 November 2015, Accessed.21 May. 2025,
https://www.aceyourpaper.com/essays/methods-identity-theft-takes-place-2161224