Journal of Law and Conflict Resolution |
Dear Colleague,
We received a Book Review titled: An Analysis of Identity Theft: Motives, Related Frauds, Techniques, and prevention.
I wish to inquire if you could find time to review the manuscript and send it to us within 7 days.
Please find the abstract below:
ABSTRACT
Identity (ID) theft is unauthorized obtaining to others confidential information in order to misuse it. ID theft is one of the major problems that impose billions of dollars annually on people and businesses across the globe. In 2008 only, 9.9 millions of Americans were victimized which show a 22% increase in compared to 2007.
Analyzing four major factors -political, economic, social, and technological- reveals that social and technological factors are the significant origins of ID theft. Social engineering is a technique for thieves by which social engineers take advantage of people’s behaviors in social networks such as Facebook to steal individuals’ key information.
This report examines different types of frauds that are the major outcomes of ID theft. The frauds as the results of ID theft comprise ID fraud, financial fraud, tax fraud, medical fraud, resume fraud, mortgage fraud, and organized crimes such as money laundering, terrorism, and illegal immigration.
Moreover, the various techniques that thieves use to attack individuals and organizations are discussed. The different techniques are divided to two major ones, physical and technological. Physical techniques include several traditional ways such as mail theft and insider theft. It is crucial for organizations’ managers to know that despite new technology-based techniques, more than 70% of ID theft occurs by insiders. In addition, it will be shown how thieves apply both technology-based techniques such as phishing and social engineering to steal personal information.
Finally several effective prevention techniques will be provided for individuals and organization to protect key data and information against identity theft. Usually, thieves attempt to bypass security systems through human elements. Therefore, the recommendation significantly emphasizes developing individuals’ awareness through public and organizational training.
Key Words- Identity,Theft,Fraud, Prevention,Personal Information.
Please acknowledge the receipt of this mail.
Best regards,
Prof. Christiena Maria Van Der Bank
Editor,
Journal of Law and Conflict Resolution
E-mail: submit.jlcr@gmail.com
ISSN 2006-9804
Nenhum comentário:
Postar um comentário