Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?
Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace..
Medienart: |
E-Artikel |
---|
Erscheinungsjahr: |
2015 |
---|---|
Erschienen: |
2015 |
Enthalten in: |
Zur Gesamtaufnahme - volume:18 |
---|---|
Enthalten in: |
Potchefstroom Electronic Law Journal - 18(2015), 2, Seite 68-110 |
Sprache: |
Afrikaans ; Deutsch ; Englisch ; Niederländisch |
---|
Beteiligte Personen: |
Fawzia Cassim [VerfasserIn] |
---|
Links: |
dx.doi.org [kostenfrei] |
---|
Förderinstitution / Projekttitel: |
|
---|
PPN (Katalog-ID): |
DOAJ020255136 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ020255136 | ||
003 | DE-627 | ||
005 | 20230502074238.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230226s2015 xx |||||o 00| ||afr c | ||
035 | |a (DE-627)DOAJ020255136 | ||
035 | |a (DE-599)DOAJef902df9519b490cbc6a99f4d7497de0 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a afr |a ger |a eng |a dut | ||
050 | 0 | |a K1-7720 | |
100 | 0 | |a Fawzia Cassim |e verfasserin |4 aut | |
245 | 1 | 0 | |a Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves? |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace. | ||
650 | 4 | |a Identity theft | |
650 | 4 | |a fraud | |
650 | 4 | |a theft | |
650 | 4 | |a cybercrime | |
650 | 4 | |a personal information | |
650 | 4 | |a data | |
650 | 4 | |a Internet | |
650 | 4 | |a cyberspace | |
650 | 4 | |a right to privacy | |
650 | 4 | |a computer users | |
650 | 4 | |a law enforcement agencies | |
650 | 4 | |a businesses | |
650 | 4 | |a legislation | |
650 | 4 | |a South Africa | |
650 | 4 | |a United States of America | |
650 | 4 | |a United Kingdom; India | |
650 | 4 | |a United Kingdom | |
650 | 4 | |a India | |
653 | 0 | |a Law in general. Comparative and uniform law. Jurisprudence | |
773 | 0 | 8 | |i In |t Potchefstroom Electronic Law Journal |d North-West University, 2008 |g 18(2015), 2, Seite 68-110 |w (DE-627)DOAJ000144606 |x 17273781 |7 nnns |
773 | 1 | 8 | |g volume:18 |g year:2015 |g number:2 |g pages:68-110 |
856 | 4 | 0 | |u http://dx.doi.org/10.4314/pelj.v18i2.02 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/ef902df9519b490cbc6a99f4d7497de0 |z kostenfrei |
856 | 4 | 0 | |u http://www.nwu.ac.za/sites/www.nwu.ac.za/files/files/p-per/issuepages/2015volume18no2/2015%2818%292Cassim%28ART%29.pdf |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/1727-3781 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a SSG-OLC-PHA | ||
951 | |a AR | ||
952 | |d 18 |j 2015 |e 2 |h 68-110 |