Cyberspace identity theft

The conceptual framework

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

The present age of technological advances has extended the reach of crimes into the Internet. Nevertheless, while the Internet may have led to the emergence of wholly new crimes, it has mostly brought about new ways of committing preexisting crimes. (Garner, 2000) For example, although it is often called a 21st century phenomenon, (Hoar, 2001) cyberspace identity theft is, in fact, not a new type of crime. (United Nations, Handbook on Identity Related Crime, 2011)Long before the emergence of the Internet, identity thieves stole people’s identities through dumpster diving by searching for personal identifying information such as social security and bank account numbers in the trash left outside people’s homes. The identity thief uses information relating to the identity of another person’s such as name, address, telephone number, mother’s maiden name, social security number, social insurance number, health card number, bank account information, driver’s license number and date of birth. It is stealing someone’s identity information to commit theft, fraud or other crimes.

Original languageEnglish
Pages (from-to)595-605
Number of pages11
JournalMediterranean Journal of Social Sciences
Volume6
Issue number4S3
DOIs
Publication statusPublished - 1 Aug 2015

Fingerprint

larceny
virtual reality
offense
Internet
social security
bank
driver's license
social insurance
fraud
Crime
Conceptual framework
Identity theft
Cyberspace
Theft
Conceptual Framework
telephone
UNO
human being
present
World Wide Web

Keywords

  • Cyberspace
  • Identity theft
  • Techniques
  • Terminology
  • Types

ASJC Scopus subject areas

  • Social Sciences(all)
  • Arts and Humanities(all)
  • Economics, Econometrics and Finance(all)

Cite this

Cyberspace identity theft : The conceptual framework. / Abdul Manap, Nazura; Abdul Rahim, Anita; Taji, Hossein.

In: Mediterranean Journal of Social Sciences, Vol. 6, No. 4S3, 01.08.2015, p. 595-605.

Research output: Contribution to journalArticle

@article{661c256bc3d145d3add8810be837b4c6,
title = "Cyberspace identity theft: The conceptual framework",
abstract = "The present age of technological advances has extended the reach of crimes into the Internet. Nevertheless, while the Internet may have led to the emergence of wholly new crimes, it has mostly brought about new ways of committing preexisting crimes. (Garner, 2000) For example, although it is often called a 21st century phenomenon, (Hoar, 2001) cyberspace identity theft is, in fact, not a new type of crime. (United Nations, Handbook on Identity Related Crime, 2011)Long before the emergence of the Internet, identity thieves stole people’s identities through dumpster diving by searching for personal identifying information such as social security and bank account numbers in the trash left outside people’s homes. The identity thief uses information relating to the identity of another person’s such as name, address, telephone number, mother’s maiden name, social security number, social insurance number, health card number, bank account information, driver’s license number and date of birth. It is stealing someone’s identity information to commit theft, fraud or other crimes.",
keywords = "Cyberspace, Identity theft, Techniques, Terminology, Types",
author = "{Abdul Manap}, Nazura and {Abdul Rahim}, Anita and Hossein Taji",
year = "2015",
month = "8",
day = "1",
doi = "10.5901/mjss.2015.v6n4s3p595",
language = "English",
volume = "6",
pages = "595--605",
journal = "Mediterranean Journal of Social Sciences",
issn = "2039-9340",
publisher = "MCSER-Mediterranean Center of Social and Educational research",
number = "4S3",

}

TY - JOUR

T1 - Cyberspace identity theft

T2 - The conceptual framework

AU - Abdul Manap, Nazura

AU - Abdul Rahim, Anita

AU - Taji, Hossein

PY - 2015/8/1

Y1 - 2015/8/1

N2 - The present age of technological advances has extended the reach of crimes into the Internet. Nevertheless, while the Internet may have led to the emergence of wholly new crimes, it has mostly brought about new ways of committing preexisting crimes. (Garner, 2000) For example, although it is often called a 21st century phenomenon, (Hoar, 2001) cyberspace identity theft is, in fact, not a new type of crime. (United Nations, Handbook on Identity Related Crime, 2011)Long before the emergence of the Internet, identity thieves stole people’s identities through dumpster diving by searching for personal identifying information such as social security and bank account numbers in the trash left outside people’s homes. The identity thief uses information relating to the identity of another person’s such as name, address, telephone number, mother’s maiden name, social security number, social insurance number, health card number, bank account information, driver’s license number and date of birth. It is stealing someone’s identity information to commit theft, fraud or other crimes.

AB - The present age of technological advances has extended the reach of crimes into the Internet. Nevertheless, while the Internet may have led to the emergence of wholly new crimes, it has mostly brought about new ways of committing preexisting crimes. (Garner, 2000) For example, although it is often called a 21st century phenomenon, (Hoar, 2001) cyberspace identity theft is, in fact, not a new type of crime. (United Nations, Handbook on Identity Related Crime, 2011)Long before the emergence of the Internet, identity thieves stole people’s identities through dumpster diving by searching for personal identifying information such as social security and bank account numbers in the trash left outside people’s homes. The identity thief uses information relating to the identity of another person’s such as name, address, telephone number, mother’s maiden name, social security number, social insurance number, health card number, bank account information, driver’s license number and date of birth. It is stealing someone’s identity information to commit theft, fraud or other crimes.

KW - Cyberspace

KW - Identity theft

KW - Techniques

KW - Terminology

KW - Types

UR - http://www.scopus.com/inward/record.url?scp=84939537962&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84939537962&partnerID=8YFLogxK

U2 - 10.5901/mjss.2015.v6n4s3p595

DO - 10.5901/mjss.2015.v6n4s3p595

M3 - Article

VL - 6

SP - 595

EP - 605

JO - Mediterranean Journal of Social Sciences

JF - Mediterranean Journal of Social Sciences

SN - 2039-9340

IS - 4S3

ER -