Identity theft is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss. The person whose identity has been assumed may suffer adverse consequences, especially if they are held responsible for the perpetrator’s actions. Identity theft occurs when someone uses another’s personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964.
What is ‘Identity Theft’
Identity theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person’s name or identity to make transactions or purchases. Identity theft is committed many different ways. Some identity thieves sift through trash bins looking for bank account and credit card statements; other more high-tech methods involve accessing corporate databases to steal lists of customer information Once they have the information they are looking for, identity thieves can ruin a person’s credit rating and the standing of other personal information.
Explaining ‘Identity Theft’
Types of identity theft include criminal, medical, financial and child identity theft. In criminal identity theft, a criminal misrepresents himself as another person during arrest to try to avoid a summons, prevent the discovery of a warrant issued in his real name or avoid an arrest or conviction record. In medical identity theft, someone identifies himself as another person to obtain free medical care. In financial identity theft, someone uses another person’s identity or information to obtain credit, goods, services or benefits. This is the most common form of identity theft.
High-Tech Identity Theft
Identity thieves increasingly use computer technology to obtain other people’s personal information for identity fraud. To find such information, they may search the hard drives of stolen or discarded computers; hack into computers or computer networks; access computer-based public records; use information gathering malware to infect computers; browse social networking sites; or use deceptive emails or text messages.
Identify Theft Protection
Many types of identity theft can be prevented. One way is to continually check the accuracy of personal documents and promptly deal with any discrepancies. Lots of businesses provide products that help people avoid and mitigate the effects of identity theft. Typically, such services provide information helping people to safeguard their personal information; monitor public records, as well as private records such as credit reports, to alert their clients of certain transactions and status changes; and provide assistance to victims to help them resolve problems associated with identity theft. In addition, some government agencies and nonprofit organizations provide similar assistance, typically with websites that have information and tools to help people avoid, remedy and report incidents of identity theft.
- How much is the public willing to pay to be protected from identity theft? – www.tandfonline.com [PDF]
- Examining risks and protective factors of on-line identity theft – www.tandfonline.com [PDF]
- Examining identity theft: Empirical explorations of the offense and the offender – www.tandfonline.com [PDF]
- The consequences of identity theft victimization: An examination of emotional and physical health outcomes – www.tandfonline.com [PDF]
- The crimeware landscape: Malware, phishing, identity theft and beyond – www.tandfonline.com [PDF]
- The impact of adoption of identity theft countermeasures on firm value – www.sciencedirect.com [PDF]