Identity Theft

Read Complete Research Material



[Identity Theft]

By

Acknowledgement

I would first like to express my gratitude for my research supervisor, colleagues, peers & family whose immense & constant support has been a source of continuous guidance & inspiration.

DECLARATION

I [type your full first names & surname here], declare that the following dissertation/thesis & its entire content has been an individual, unaided effort & has not been submitted or published before. Furthermore, it reflects my opinion & take on the topic & is does not represent the opinion of the University.

Signature:

Dated:

Abstract

This research aims at finding out the ways that how the criminals steal personal information of others & how they misuse that information to get benefits & give a great loss to organisations or companies or people or country & this research aims at providing various ways to be used as a precaution to be saved from the identity theft. It has been found out from the literature that how old is the identity theft & what ways were used in the past for such kind of thefts. A mixed research methodology has been chosen in order to analyse the past literature & learn from it as well as learn from the actual victims of identity theft & how it shaped their behaviour from the past experiences. It is concluded that there exist various methods for the thieves for stealing the identity information very easily like mails, computer servers & government records etc. It has been learned that we need to be precautious about how we could become the victims of identity theft. There are several proposed ways to avoid identity theft & how to react if someone's identity has been stolen.

TABLE OF CONTENTS

ACKNOWLEDGEMENTII

DECLARATIONIII

ABSTRACTIV

CHAPTER 1: INTRODUCTION1

Background of the Research1

Problem Statement1

Rationale1

Aims & Objectives2

Significance3

Research Question/Hypothesis3

Ethical Concerns3

CHAPTER 2: LITERATURE REVIEW6

What is Identity Theft?6

Fraud7

Ways of Identity Theft7

Cases8

Identity Theft9

Identity Theft: A 21st Century Version of Theft14

Why one cannot prevent identity theft18

How in the virtual world of identity theft19

How to use your personal identity thieves20

An excuse used by identity thieves to capture your information21

Identity theft in the real world22

Gold identity theft breeder documents23

CHAPTER 3: METHODOLOGY24

Research Strategy24

Reliability and Validity25

Generalisability26

Time Scale27

Week First (13th September to 19th)28

Week Second (20th September to 26th)28

Week Third (27th September to 3rd October)29

Forth Week (4th October to 10th)29

Fifth Week (11th October to 17th)30

Sixth Week (18th October to 24th)30

CHAPTER 4: RESULTS31

Interview31

Limitations34

Delimitations35

CHAPTER 5: DISCUSSION OF FINDINGS36

Victims of Identity Theft36

Identity Theft in the Computer World37

Effects of Identity Theft39

Techniques to obtain personal information42

Individual Identity Protection43

Identity protection by Organizations44

CHAPTER 6: CONCLUSION & RECOMMENDATIONS46

Learning46

Recommendations48

How to avoid Identity Theft48

How to react if someone has stolen your Identity50

What is identity fraud?51

How fraudsters do they get the personal information of their victims? (Kocherlakota 2008 289)51

What could I do to protect myself?52

Directions for Future Research55

REFERENCES56

BIBLIOGRAPHY63

APPENDIX - A67

CHAPTER 1: INTRODUCTION

Background of the Research

Although identity theft is often heralded as a new crime threat, the phenomenon itself is by no means unique to the information age. All over the history, the criminals have been using the false identity for committing any sort of crimes & thefts. Identity theft has emerged as the fastest growing criminal ...
Related Ads
  • Identity Theft
    www.researchomatic.com...

    Identity Theft , Identity Theft Essay w ...

  • Identity Theft
    www.researchomatic.com...

    Identity theft is a crime with severe consequ ...

  • Identity Theft
    www.researchomatic.com...

    Identity theft has become the most rapidly in ...

  • Identity Theft
    www.researchomatic.com...

    There is no single accepted definition of identit ...

  • Identity Theft
    www.researchomatic.com...

    Identity theft is one of the fastest growing ...