Running Head: Identity Theft 1, 4, And St

Running Head Identity Theft1identity Theft 4identity Theftstuden

Although there have been high rates of cases of the identity theft very little amount of information is known about the people who indulge in this type of crime. This paper has been researched to provide some information on the people who engage in this type of crime. To be able to accomplish this, various people have been evaluated and evaluated on their views regarding identity theft. The individuals who were interviewed have received sentencing and are serving their time in prison. The outcome has indicated that identity theft includes different people which include the low-level and the high-level people.

The motivating factor which was singled out from the assessment is that the people engaging in identity theft were driven by the quick need of cash. They were able to use a different kind of techniques to be able to have access to the information which they were able to convert it to cash. For example, they were able to buy information, steal the information, or even being able to access it from those individual people who own the specific information (Andringa et al., 2018). Through the development of different skills in computer science and computer technology; for example the computer system skills, the fraudsters on identity theft were able to accomplish their mission with success. Through the findings of this paper, it can be recommended that having well tested situational crime prevention methods can be very effective through the process of trying to reduce the identity theft through the process of trying to increase the employed efforts.

However, also through the findings in this paper, this method may become ineffective at some point, due to the fact that new way can be discovered by the crime offenders. Having an assessment from the crime offenders and basing that information, this sample has been developed which is purposed at trying to do away with the excuses which may result to the few cases of having identity theft. In the United States of America, identity theft has been able to grab the attention of the country as it has sort to become a very common economic an computer crime. Through the statistical analysis which have previously been conducted, there are many cases of people who have been complaining and have gone ahead to report the crimes.

Although so many cases have been filed regarding the identity theft in a computer with the police, not much has been done for the purposes of trying to identify the how this fraud can be controlled with more effective computer methods. For this reason, I have come up with a research that is meant for the examination of those people who have engaged in identity theft to try and understand their own perspective why they do that. The main goal and purpose if provide information on how the process identity theft is conducted and how those people think about the crimes which they commit. This will be essential in trying to build system policies which will be able to prevent identity theft and also for the purposes of guiding future research (Sullins, 2017).

The computer crime on identity theft has become the main criminal issues in the current society. It has also been projected that it could remain to be a big issue in the future. This because the statistics which continue to be recorded are rising each day due to the fact that it has proven to be a big problem in being able to prove and find the people who commit these crimes. I think that the best way to avoid this kind of problem is being very careful with a lot of personal information even when on the internet. The final results of this paper indicate that identity theft includes multiple types of people which are motivated due to the fact that they want quick money through the identification of identity theft.

References

  • Andringa, M., Glau, L., & Slaton, J. (2018). U.S. Patent No. 9,996,880. Washington, DC: U.S. Patent and Trademark Office.
  • Sullins, L. L. (2017). “Phishing†for a solution: domestic and international approaches to decreasing online identity theft. In Computer Crime (pp. 73-110). Routledge.
  • Ghani, N., et al. (2014). Assessing the Security of Internet-Connected Critical Infrastructures. Security & Communication Networks.
  • Smith, J. (2020). Cybersecurity and Identity Theft Prevention Strategies. Journal of Digital Security, 12(3), 45-60.
  • Johnson, R., & Lee, M. (2019). Analyzing Criminal Profiles in Cybercrime. Journal of Criminology, 45(2), 134-150.
  • Federal Trade Commission. (2022). Data Breach and Identity Theft Statistics. Retrieved from https://www.ftc.gov
  • Williams, T. (2021). Computer Security Measures for Preventing Identity Theft. Cybersecurity Journal, 8(1), 22-38.
  • Brown, L., & Davis, K. (2017). Psychological Motivations Behind Cybercriminal Activities. Journal of Cyber Psychology, 14(4), 306-321.
  • International Telecommunication Union. (2020). Cybersecurity Report 2020. Geneva: ITU.
  • FBI. (2022). Internet Crime Complaint Center (IC3) Annual Report. Federal Bureau of Investigation.