Matches in SemOpenAlex for { <https://semopenalex.org/work/W234684342> ?p ?o ?g. }
Showing items 1 to 73 of
73
with 100 items per page.
- W234684342 startingPage "237" @default.
- W234684342 abstract "I. INTRODUCTION For centuries, philosophers have considered concept of human identity, (1) notion that refers to an individual's sense of self and distinguishes one individual from another. In modern society, not only does one's identity--and ability to prove it--serve to distinguish one person from another, but it also plays an obvious role in many of today's commercial and personal transactions. Doctors need to disclose medical records only to their patients; buyers of real estate need to know that persons signing deed really are ones who own property; vendors need to know that person purporting to purchase product on behalf of company really is employee authorized to do so; governments need to know that person claiming benefits is person entitled to them; and police need to know who they are actually arresting. Identity theft has been described as one of fastest growing crimes in nation, (2) and the crime of new millennium. (3) If so, certainly there is need to understand what identity theft is and its legal underpinnings. Hence, this article is intended to explain what identity theft is, how it happens and legal responses to it. This article includes an extensive discussion of latest federal response, Fair and Accurate Credit Transactions Act of 2003 (FACT), as well as discussion of state statutory and common laws. Finally, article ends with suggestions for how to avoid identity theft. In one sense there is nothing new here given that determining with whom one is really dealing has always been important. However, making that determination becomes more complex when e-commerce is involved (4) because there is no interaction and documents, such as driver's license picture or handwritten signature, cannot be easily examined. Data can be collected that tends to identify person, such as social security number, telephone number, maiden name, birth date and like. However, laws increasingly restrict that collection, and some identifiers may be public information or discoverable with an ease that may make information of questionable use. This situation provides opportunity for illegal activity which can be exacerbated in electronic settings. The reality, however, is that opportunity for identity theft has always existed and that methods for illegal activities cannot be ignored. For example, 2003 Federal Trade Commission (FTC) survey indicated that a lost or stolen wallet or pocket book, or theft of victim's mail including lost or stolen credit checkbooks, and social security cards, were most commonly mentioned ways that an identity thief obtained information. (5) This was 25% of those who knew how their information was obtained; group which accounts for 51% of all victims (leaving almost half of victims not knowing how their personal information was obtained). (6) Identity thieves also include persons who give name of another person in order to delay or avoid being charged with crime. In fact, there is nothing more face-to-face or non-electronic than an arrest. The likely difference between now and yesterday is not difference between online and offline activities, but changes in technology which generally allow thieves to do more, online or off: At one time, not that many years ago, breeder document, such as driver's license, meant something; it could be used to establish person's identity with little or no question. Now, technology has enabled criminals to produce fraudulent documents, which can be used to procure additional fraudulent documents. Counterfeit documents, such as credit used to be easily detectable; now it is relatively easy to produce counterfeit hologram that usually passes for real thing..... Technology and ability of criminal element to adapt and defeat existing identification methodologies, predicated on breeder documents that are susceptible to counterfeiting, have made it necessary to develop different, more advanced identity authentication systems. …" @default.
- W234684342 created "2016-06-24" @default.
- W234684342 creator A5088329900 @default.
- W234684342 date "2004-06-22" @default.
- W234684342 modified "2023-09-28" @default.
- W234684342 title "Identity Theft: Myths, Methods, and New Law" @default.
- W234684342 hasPublicationYear "2004" @default.
- W234684342 type Work @default.
- W234684342 sameAs 234684342 @default.
- W234684342 citedByCount "7" @default.
- W234684342 countsByYear W2346843422013 @default.
- W234684342 countsByYear W2346843422016 @default.
- W234684342 countsByYear W2346843422017 @default.
- W234684342 crossrefType "journal-article" @default.
- W234684342 hasAuthorship W234684342A5088329900 @default.
- W234684342 hasConcept C108827166 @default.
- W234684342 hasConcept C121332964 @default.
- W234684342 hasConcept C144024400 @default.
- W234684342 hasConcept C144133560 @default.
- W234684342 hasConcept C158129432 @default.
- W234684342 hasConcept C17744445 @default.
- W234684342 hasConcept C199539241 @default.
- W234684342 hasConcept C24890656 @default.
- W234684342 hasConcept C2778355321 @default.
- W234684342 hasConcept C2779845782 @default.
- W234684342 hasConcept C2780495726 @default.
- W234684342 hasConcept C2780858551 @default.
- W234684342 hasConcept C41008148 @default.
- W234684342 hasConcept C522325796 @default.
- W234684342 hasConceptScore W234684342C108827166 @default.
- W234684342 hasConceptScore W234684342C121332964 @default.
- W234684342 hasConceptScore W234684342C144024400 @default.
- W234684342 hasConceptScore W234684342C144133560 @default.
- W234684342 hasConceptScore W234684342C158129432 @default.
- W234684342 hasConceptScore W234684342C17744445 @default.
- W234684342 hasConceptScore W234684342C199539241 @default.
- W234684342 hasConceptScore W234684342C24890656 @default.
- W234684342 hasConceptScore W234684342C2778355321 @default.
- W234684342 hasConceptScore W234684342C2779845782 @default.
- W234684342 hasConceptScore W234684342C2780495726 @default.
- W234684342 hasConceptScore W234684342C2780858551 @default.
- W234684342 hasConceptScore W234684342C41008148 @default.
- W234684342 hasConceptScore W234684342C522325796 @default.
- W234684342 hasIssue "2" @default.
- W234684342 hasLocation W2346843421 @default.
- W234684342 hasOpenAccess W234684342 @default.
- W234684342 hasPrimaryLocation W2346843421 @default.
- W234684342 hasRelatedWork W140009285 @default.
- W234684342 hasRelatedWork W1496194158 @default.
- W234684342 hasRelatedWork W1606429153 @default.
- W234684342 hasRelatedWork W1823830092 @default.
- W234684342 hasRelatedWork W188470225 @default.
- W234684342 hasRelatedWork W1994688294 @default.
- W234684342 hasRelatedWork W2018694710 @default.
- W234684342 hasRelatedWork W2019467685 @default.
- W234684342 hasRelatedWork W2035297307 @default.
- W234684342 hasRelatedWork W220027390 @default.
- W234684342 hasRelatedWork W2992806770 @default.
- W234684342 hasRelatedWork W3020957145 @default.
- W234684342 hasRelatedWork W3022578096 @default.
- W234684342 hasRelatedWork W3043431107 @default.
- W234684342 hasRelatedWork W3085558690 @default.
- W234684342 hasRelatedWork W3124197490 @default.
- W234684342 hasRelatedWork W312495362 @default.
- W234684342 hasRelatedWork W2295783868 @default.
- W234684342 hasRelatedWork W2403223031 @default.
- W234684342 hasRelatedWork W3015759786 @default.
- W234684342 hasVolume "30" @default.
- W234684342 isParatext "false" @default.
- W234684342 isRetracted "false" @default.
- W234684342 magId "234684342" @default.
- W234684342 workType "article" @default.