Cyber Identity Theft

Cyber Identity Theft

Lynne D. Roberts
Copyright: © 2012 |Pages: 16
ISBN13: 9781613503232|ISBN10: 1613503237|EISBN13: 9781613503249
DOI: 10.4018/978-1-61350-323-2.ch103
Cite Chapter Cite Chapter

MLA

Roberts, Lynne D. "Cyber Identity Theft." Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 21-36. https://doi.org/10.4018/978-1-61350-323-2.ch103

APA

Roberts, L. D. (2012). Cyber Identity Theft. In I. Management Association (Ed.), Cyber Crime: Concepts, Methodologies, Tools and Applications (pp. 21-36). IGI Global. https://doi.org/10.4018/978-1-61350-323-2.ch103

Chicago

Roberts, Lynne D. "Cyber Identity Theft." In Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 21-36. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-323-2.ch103

Export Reference

Mendeley
Favorite

Abstract

Information and communication technologies (ICTs) provide substantial benefits to governments, organizations and individuals through providing low cost, instantaneous, global communication capabilities. However, an unintended consequence of these new technologies is their use for criminal purposes. The technology can be used as the mechanism for organizing and committing criminal activity and as a means of protecting criminals against detection and punishment. Cyber identity theft is an internationally recognized problem resulting from the introduction of new information technologies. This chapter provides an overview of cyber identity theft and related fraud, describing the impact of cyber identity theft on governments, organizations, law enforcement agencies and individuals. Methods currently being used, or proposed, to combat cyber identity fraud are outlined and the potential impact of these examined. The tension between using technological solutions to reduce cyber identity theft and privacy and civil liberties concerns is explored.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.