Sign In
Not register? Register Now!
You are here: HomeEssayLaw
Pages:
3 pages/≈825 words
Sources:
4 Sources
Level:
APA
Subject:
Law
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

The Threat of Fraud: Close Relationship With Crimes (Essay Sample)

Instructions:

You are the director of Worldwide Security for a Fortune 500 credit agency, a certified fraud examiner (CFE), an active member of the Association of Certified Fraud Examiners (ACFE), and you have in excess of twenty fraud investigators. You make presentations to universities throughout the country as well as at professional conferences about the dangers and true occurrences of fraud. You were just asked to review a case of identity theft of university professors, which started out as a couple professors receiving unexplained bills.Within a month, fifteen professors from all of the different departments started noticing unexplained charges and credit accounts on their credit reports.The new accounts took the form of credit cards, revolving credit accounts, car loans, school loans, and so forth. You were asked for your help because you are an expert in the field.
Please post an answer to 5 of the following 7 questions. Support your answers with academic or real life criminal justice examples to accentuate your point.
In your opinion, what would be your plan to review the case of identity theft toward the university professors? Why?
Do you think identity theft can be controlled? How would you propose to control it or at least slow it down?
How would you protect the college professors from any fraudulent acts against them after the identity theft has been discovered?
How would you identify all of the victims of identity theft? How would identifying all of the victims help you in your investigation?
What are some of the investigative methods that you would use to identify the perpetrators of the identity theft crimes?
If you were requested by the president of the college to create a loss prevention education workshop for the staff and professors, what would you include in the workshop? How would you evaluate the success of the lessons being presented in the workshop?
What punishment do you think the perpetrator should receive for his or her crime?
Comments / Note
https://www.consumer.ftc.gov/articles/0005-identity-theft#signs
https://www.ftc.gov/node/119459
http://www.ncsl.org/research/financial-services-and-commerce/identity-theft-state-statutes.aspx

source..
Content:

Identity theft
Name
Institutional
The threat of fraud
There exist various component behaviors of identity theft, and that has a close relationship with crimes. In my opinions, I would take two of the most common steps of researching identity theft towards the university professors. First I would break the identity theft crime into different sequences of behaviors (Xiaodong, 2008). Secondly, I would identify the possible opportunities offered by the offenders within the new environment of the information age. The main reason for using the two techniques is the fact that several case studies that have dealt with such situations have been able to identify the Internet as the significant criminogenic element and primary leader of the information age. Through this, it is possible to get little information from the perpetrators on how these crimes are carried out as well as identifying their commission opportunities. In addition, my approach will be an insight o future ways that might be used by the offenders to detect a weakness and exploit in the information environment (Pons, 2009).
Through the direct involvement of organizations and agencies rather than criminal justice system can relatively reduce the rate of identity theft. For example, the police’s effort is little to influence the national marketing practices of issuing of credit cards. However, the involvement of government interventions and other agencies can be complex thus producing a serious research (Swartz, 2005). Experience from other spheres such as car security, safety, and environmental pollution can also be incorporated in the process of identifying the best way to handle identity theft.
On a daily basis identify perpetrators make it difficult to protect the practice of identity theft to the members of the public. Current, no well-known method be used to protect identity theft fully from reoccurring even after it has been detected. However, it is possible to make it difficult for identity perpetrators to continue with offensive crime through taking some precautions on a daily basis. First, it is important for everyone who had ever been a victim of identity theft or not to ensure that his or her virtual identity is well protected. Whether you are bidding, chatting, or even purchasing a new cloth online, you should make sure that your identity is always protected. This should always be practiced regardless of the social relation with friends or relatives. Computer , through online communication, is the easiest and fastest way of con-artist getting hold of one's identity than any other way (Biegelman, 2009). The other way that the identity theft perpetrators get into individuals' accounts is through the bank and credit accounts. While spending using credit cards, it is important to ensure that personal information does not fall into wrong hands since this would result in identity theft crimes. The activity does not only happen to online clients but also is practiced by those behind the counters and who are responsible for taking customer's orders. It is important therefore to ensure that these documents are never out of your sight during spending, and the best way to handle this is by making sure that they are only used in trusted places. The other protection method that could be applied is ensuring that you can monitor your credit card. Identity theft is much worse than having a criminal take your credit card and run away. When the victim of identity theft is registered with a credit monitoring program, it is possible for the victim to receive alerts during card application and thus can take a step of stopping the thief before any damages occur (Biegelman, 2009).
After the signing of the identity theft act in 2004 was a great achievement since it changed the degree of identity theft from being a mere slap to actual imprisonment. The action enabled the identity theft victims actually to get the bittersweet justice they required. The law increased the period of imprisonment from 3-5 years. Additional phishing punishment was also included to those found guilty of identity theft by adding two more years jail sentence. To the list of known identity theft crimes, aggravated identity t...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

Need a Custom Essay Written?
First time 15% Discount!