Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Impacts of identity theft
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Impacts of identity theft
This research paper looks at the issues today surrounding identity theft and consumer fraud in the banking industry. It looks at how biometrics, or fingerprint recognition specifically, can help strengthen the security that banks provide for the safeguarding of the personal information of their customers. Because of banks being targets both online and offline for identity theft and consumer fraud, this paper discusses how business is done today and how their security may be enhanced with the implementation of fingerprint recognition software. The paper will discuss fingerprint recognition software, how it works, and how it can be beneficial in the banking industry. It will demonstrate how this software can be beneficial to banks and their customers doing online and offline business transactions. The advantages and possible disadvantages of fingerprint recognition software will be discussed and how it is increasing in the world today. The paper will demonstrate how business has changed towards an E-commerce environment and with that, how security risks online have increased. It discusses the importance of banks providing customers with online and mobile access to their accounts in the society we live in today. There are various methods utilized by thieves today for obtaining personal information online and offline. The paper will discuss a few of these methods and what consumers and banks can to do the help minimize their risk. The purpose of this paper is to show fingerprint recognition software as a development that can help reduce the number of identity thefts and consumer frauds that are occurring today.
Keywords: identity theft, consumer fraud, banking, fingerprint recognition, security, customer, personal informati...
... middle of paper ...
...lle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems.IBM Systems Journal, 40(3), 614-634. Retrieved from http://search.proquest.com/docview/222418906?accountid=12085
Saleh, Z., PhD. (2013). The impact of identity theft on perceived security and trusting E-commerce. Journal of Internet Banking and Commerce, 18(2), 1-11. Retrieved from http://search.proquest.com/docview/1449792093?accountid=12085
Tassabehji, R., & Kamala, M. A. (2012). Evaluating biometrics for online banking: The case for usability. International Journal of Information Management, 32(5), 489. Retrieved from http://search.proquest.com/docview/1093900138?accountid=12085
Venkatraman, S., & Delpachitra, I. (2008). Biometrics in banking security: A case study. Information Management & Computer Security, 16(4), 415-430. doi:http://dx.doi.org/10.1108/09685220810908813
It is easy to think of biometrics as the future science technology are always happened in some fictions, associated with solar car and clones together. In fact, it has long history that people understood the basic principle and application of the biometric. Thousands of years ago, the people of the Nile basin used the biometric in everyday transactions (such as scarring, skin tone, eye color, height, etc.) for identification. Of course, they had no any automatic electronic identification system, or computer network, but the principle is similar.
Identity theft has been a major issue of privacy and fraud. In the data breach analysis from the Identity Theft Resource Center (2013), the number of data breaches from the year 2005 to 2012 increased. In 2012, there had been 49% where the data breach exposed people Social Security Number. The data breach of 2012 has a rate of 27.4% caused by hackers. These breaches were commonly from 36.4% businesses and 34.7% health and medical (Identity Theft Resource Center 2013). The number of identity theft varies from physical possession to digital possession. At least one-fifth of trash cans contains papers listing people’s credit card number and personal information. People that throw away their trash mails contain much personal information that is useful to steal someone's identity (Davis, 2002). Technology becomes a need where people use it daily and as a result it has also become a use for identity theft as well. Throughout the years as technology develops so does identity theft. This paper shows the types, methods and technique used for identity theft, and it also examines possible risk of identity theft from current technology.
Identity theft is an increasing epidemic. Some of the ways a person can commit identity
I’ve decided to write my research paper on the issue of identity theft. Identity theft has occurred all throughout history in various ways and forms. Today, it is one of the fastest growing crimes occurring all over the world. Data suggests that identity theft accounts for roughly $50 billion stolen each year from citizens and businesses in the U.S. I believe that more attention should be targeted towards identity theft because of the detrimental effects it can have on a single victim and on our nation’s economy. Topics I will discuss include statistics about the crime, laws that protect the victims of the crimes, and what we are doing to prevent future attacks from happening.
In the fall of 1998, the rampant rise in electronic credit card fraud led congress to pass the Identity Theft and Assumption Deterrence Act. This act prohibits, “ knowingly transfer[ring] or us[ing], without lawful authority, a means of identification of another p...
Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.
When Maxwell Smart first whipped out his shoe phone in 1965, everyone saw an act of pure movie magic. Back in the mid to late 1900s everybody had the same idea of the future. Everyone pictured the future as talking robots (Siri), computerized pocket-sized dictionaries (smart-phones), hovering devices (drones), and much more. Today, everyone thinks of these technologies as commonalities. Most of these current devices have a valuable impact, while few create debatable issues. The company NGI has a system that will revolutionize the field of biometric facial recognition. In the article titled Embracing Big Brother: How Facial Recognition Could Help Fight Crime, author Jim Stenman says, "The mission is to reduce terrorist and criminal activity by improving and expanding biometric identification as well as criminal history information s...
Biometrics is a preset method to recognize a person based on a physiological or behavioral attribute. The present features are face recognition, fingerprints, handwriting, hand geometry, iris, vein, voice and retinal scan. In the early years of the 21st century, we find ourselves persistently moving further away from the stipulation of physical human interface playing a major part of basic everyday tasks. Striding ever closer to an programmed society, we interact more habitually with mechanical agents, unsigned users and the electronic information sources of the World Wide Web, than with our human counterpart. It is therefore possibly sardonic that identity has become such an important issue in the 21st century. Face recognition has been related as the divine Grail of biometric recognition systems, due to a number of noteworthy advantages over other methods of identification.
Saleh, Z. (2013). The impact of identity theft on perceived. Journal of Internet Banking & Commerce, 18(2), 1-11. Retrieved from http://www.arraydev.com/commerce/jibc/
Biometrics has really been a captivating part of watching new age movies and futuristic stars bring in the 21st century. Yet, most regular people don’t even know what is behind these alluring “tricks”, and what really classifies as a part of the Biometrics field. Something as simple as a pin number you use for an ATM machine would qualify as part of this realm. Other behavioral characteristics can be things such as a voice print, or a signature. Biometrics can also become so technologically advanced that they can use video surveillance to scan who goes in and out of an area...
Have you ever received a credit card bill at the end of the month with a ridiculous amount of money needed to be paid that you never spent? This is because of identity theft. The FTC estimates that each year, over 9 million people are affected by identity theft. According to Sally Driscoll, this is because almost anyone with a computer and a slight bit of computer knowledge can pull off identity theft. Experts also claim that identity theft is the fastest-growing crime in the world. Identity theft is a global problem that cannot be stopped without effective measures. The problem is, effective measures are very hard to come by when dealing with identity theft because almost any security protocol can be by-passed.
III. Thesis Statement: Identity Theft is rapidly becoming a national issue because anyone of us could be a victim of identity theft. How we protect our self, keep our information private, identify any signs of identity theft, and report and repair our credit is up to each one of us. We have to be vigilant about our protecting ourselves from criminals.
“The term -information security- means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction” (United States Code, 2008). In order to ensure the identity of who is trying to access the information, the concept of “Biometric Technology” has been developed in the last years. This essay will start explaining this concept and the characteristics of its development through the time. Then, the essay will offer a brief explanation of biometric systems operation and a description of different biometric systems developed until now. Finally, this research analyzes the current and future applications and the issues that surround it.
Lenard, Thomas I. “Identity Theft Is a Declining Problem.” Cyber Crime. Ed. Louise I. Gerdes.
Rayne, PB, Kulkarni, P, Patil, S & Meshram, BB 2012, ‘Authentication and Authorization:Tool for Ecommerce Security’, Engineering Science and Technology: An International Journal, vol. 2, no. 1, pp. 150-157.