The Identity Theft: Statistics and Research Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The phenomenon of identity theft has been a problem for a while, having mostly been known as faking signatures for most of its history. However, with the evolution of technology, identity theft has taken the form of stealing people’s personal information and using it to break into their bank accounts or hijack their financial data (Wadhwa & Arora, 2017). Although multiple tools have been developed to address the identified cybercrime, it remains a problem. Therefore, strategies for managing it need to be researched.

Reasons

Due to the lack of awareness of the drastic effects that the mismanagement of personal data may entail, people expose their personal information to cybercriminals quite often, which means that identity theft may become more common. Due to the challenges in locating the person who used one’s financial information, tracking down the perpetrator becomes incredibly complicated. Thus, research addressing possible prevention measures and management strategies are overdue.

Recommendations

It is highly advised that the problem of identity theft be researched by looking at some of the most common tools for preventing it and educating people about the significance of ensuring that their information is kept secure (Bressler & Bressler, 2017). Moreover, the sources of data leakage will have to be investigated in the course of research to define the approaches that will help to disseminate the knowledge about identity theft prevention among general audiences (Irshad & Soomro, 2018).

Summary

The problem of identity theft has become much more pronounced in modern society, where personal data has become highly vulnerable to criminals due to online exposure and gaps in online security. Therefore, both the problems in the current framework for keeping personal information safe and the promotion of technological awareness among the target audience have to be researched. Once the factors that facilitate the vulnerability of personal data are identified, methods for containing it in safer environments can be created.

References

  1. Bressler, L. A., & Bressler, M. S. (2017). Accounting for profit: How crime activity can cost you your business. Global Journal of Business Disciplines, 1(2), 21-30.
  2. Irshad, S., & Soomro, T. R. (2018). Identity theft and social media. International Journal of Computer Science and Network Security, 18(1), 43-55.
  3. Wadhwa, A., & Arora, N. (2017). A review on cybercrime: Major threats and solutions. International Journal of Advanced Research in Computer Science, 8(5). 2217-2221.
More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, January 17). The Identity Theft: Statistics and Research. https://ivypanda.com/essays/the-identity-theft-statistics-and-research/

Work Cited

"The Identity Theft: Statistics and Research." IvyPanda, 17 Jan. 2022, ivypanda.com/essays/the-identity-theft-statistics-and-research/.

References

IvyPanda. (2022) 'The Identity Theft: Statistics and Research'. 17 January.

References

IvyPanda. 2022. "The Identity Theft: Statistics and Research." January 17, 2022. https://ivypanda.com/essays/the-identity-theft-statistics-and-research/.

1. IvyPanda. "The Identity Theft: Statistics and Research." January 17, 2022. https://ivypanda.com/essays/the-identity-theft-statistics-and-research/.


Bibliography


IvyPanda. "The Identity Theft: Statistics and Research." January 17, 2022. https://ivypanda.com/essays/the-identity-theft-statistics-and-research/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1