Identity Theft (Research Paper Sample)
This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper including using Word 2010/2013's citation tools. These skills will be valuable throughout students’ academic career. The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sources, and a Works Cited/Reference page. Three pages of content means 3 full pages, to the bottom of the third page with text on page 4. Two pages plus several lines on the third page will not suffice. Given a short, underdeveloped paper’s impact on several items in the rubric, a student submitting a paper less than three full pages is unlikely to score higher than a ‘C’ on this assignment.
A list of topics from which students can choose is provided below. Wikipedia and similar websites are NOT creditable sources. Blogs and discussion groups are not creditable sources. The course textbook cannot be used as a source for the research paper. No more than 10% of the paper may be in the form of a direct citation from an external source.
Writing Quality for the Research Paper
* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency should be without error.
*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it before submitting it. Read it out loud to yourself.
* Remember: there is not their, your is not you're, its is not it's, too is not to or two, site is not cite, and who should be used after an individual, not that. For example, "the person WHO made the speech" not "the person THAT made the speech."
* In a professional paper one does not use contractions (doesn't, don't, etc.) and one does not use the personal you or your. Use the impersonal as in the previous sentence. It is more business-like than saying, "Also in a professional paper you don't use contractions."
This is not a speech, it is a research paper. First and second person should NOT be used.source..
Identity theft has been in existence throughout history, whereby a dishonest person personates someone else. This is often because of some political, social or financial gain. For a person to falsely present himself as different person in order to deceive others, this violates the impersonated person’s rights and dignity. With the advancement of technology, identity theft is a widespread issue. With access to names, social security numbers and other personal information of other people, identity thieves can steal identities, leaving the victims suffering from the damages they have incurred. This is a serious problem that costs the victims and the government millions of dollars in terms of losses (Hedayati, 2012). In understanding the issue of identity theft, it is necessary to examine its meaning and patterns besides looking at how information technology has played a major role in promoting the vice. The paper further examines the various ways used by different parties to curb the problem.
Identity Theft Definition
Identity theft has become a common crime as more than ten million people fall victim of this crime (Identity Theft Journal, 2015). Identity theft transpires when someone uses another person’s personal information such as the name, social security number or credit card number, without permission. The term identity theft is often used to describe various crimes including counterfeiting, forgery, and auto theft using false documentation whereby individual personal information is used to commit fraud. The ordeal violates people’s basic liberties in that everyone has the right to own personality without impersonation or duplication. Identity theft violates people’s right to privacy because by gaining access to someone’s personal information, violates the individual’s privacy. Other ways of violating one‘s privacy include physically stealing a credit card, social security card or drivers license. Furthermore, malicious spyware and viruses that gain access to individuals’ computers without their authority violate the individuals’ privacy (Identity Theft Journal, 2015).
Overview of Identity Theft
Several research groups have identified several ways in which identity theft occur. According to Identity Theft Resource Center (ITRC), identity theft commonly occurs through the internet (Identity Theft Journal, 2015). A report released in 2007 estimated that approximately 8 million people have experience identity theft totaling to $16 billion, globally. It is not easy to ascertain the exact financial implication of this vice because the estimates vary. However, reports indicate that the costs are extremely high estimated at over $50 billion yearly (Identity Theft Journal, 2015).
The Victims and the Offenders
According to ITRC, consumers aged 25-54 years especially those with higher levels of income as high as $275,000 are the main target (Identity Theft Journal, 2015). Furthermore, households headed by women with more than three children and also consumers residing in the Pacific States are at greater risks of identity theft....
YOU MAY ALSO LIKE
- Plagiarism Essays
- Poems Essays
- Identity Essays
- Vaccination Essays
- Death penalty Essays
- Cold war Essays
- Song analysis Essays
- Animal cruelty Essays
- Kill a mockingbird Essays
- Homeless Essays
- Salem witch trials Essays
- Medicinal marijuana Essays
- The yellow wallpaper Essays
- Fear Essays
- Freedom of speech Essays
- Women rights Essays
You Might Also Like Other Topics Related to identity:
- Minorities in the American SocietyDescription: Explain how being a minority can shape one's identity in America. How are minorities treated, and how does this treatment affect how they see themselves?...5 pages/≈1375 words | 4 Sources | MLA | Literature & Language | Essay |
- My InfluencesDescription: It is often said that when one wakes up in the morning without an agenda, everybody else’s agenda becomes his or her agenda for the day...3 pages/≈825 words | No Sources | Chicago | Creative Writing | Essay |
- IRCA Responsibilities and Provisions for EmployersDescription: Conduct a literature and internet search of the Immigration Reform and Control Act of 1986...1 page/≈275 words | 2 Sources | APA | Law | Essay |