Annotated Bibliography on Identity Theft
VerifiedAdded on 2023/06/13
|5
|1128
|453
AI Summary
This annotated bibliography provides sources and solutions to combat identity theft. It includes articles on cybercrime, phishing, and legislation related to identity theft. The sources are valuable for researching ways to overcome phishing and thefts. The articles contain effective measures that can be utilized while fighting identity theft.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ANNOTATED BIBLIOGRAPHY
Annotated bibliography
Roselee Lopez
DeVry University
Annotated bibliography
Roselee Lopez
DeVry University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
ANNOTATED BIBLIOGRAPHY
Identity theft Annotated Bibliography
One of the prime causes for widespread emotional, social and financial destruction for the
customers in the market is Identity theft.
By means of sound supervision and by abiding the regulations by FACTA, the identity
theft can be avoided and eradicated. The FTC, Congress and the Department of Justice Offline
and Online Sensitive Information influence the regulatory policies.
In the bibliography, the sources that are outlined are monitored for the locating of the
various information and the arguments on the person who is responsible and the person who is
not in the cyber crime. According to the investigation it had been found that there is more than
one that are fully responsible for the occurrence of the theft. Moreover, it has also been found
that the FCT, the market place and the DOJ could have taken more action in order to curb the
situation.
Aticle 1: Rosenstein, R.J., & Fine, T. (2016). Identity theft: Coordination can defeat the
modern-day “King” and “Duke”. Retrieved from http://www.justice.gov/usao/priority-
areas/financial-fraud/identity-theft
The above article helps to obtain various informations about the technique of
identification of the theft that can have an devastating effect on the finance of the victims along
with their stability of emotion. The author of the article has presented various solutions to
eradicate the identity theft. In the process, a task force of group is created who are specialized in
the current issue and has knowledge regarding internet crimes. The group together finds out the
solution to eliminate the theft and the process in which the thieves can be attached are found out.
ANNOTATED BIBLIOGRAPHY
Identity theft Annotated Bibliography
One of the prime causes for widespread emotional, social and financial destruction for the
customers in the market is Identity theft.
By means of sound supervision and by abiding the regulations by FACTA, the identity
theft can be avoided and eradicated. The FTC, Congress and the Department of Justice Offline
and Online Sensitive Information influence the regulatory policies.
In the bibliography, the sources that are outlined are monitored for the locating of the
various information and the arguments on the person who is responsible and the person who is
not in the cyber crime. According to the investigation it had been found that there is more than
one that are fully responsible for the occurrence of the theft. Moreover, it has also been found
that the FCT, the market place and the DOJ could have taken more action in order to curb the
situation.
Aticle 1: Rosenstein, R.J., & Fine, T. (2016). Identity theft: Coordination can defeat the
modern-day “King” and “Duke”. Retrieved from http://www.justice.gov/usao/priority-
areas/financial-fraud/identity-theft
The above article helps to obtain various informations about the technique of
identification of the theft that can have an devastating effect on the finance of the victims along
with their stability of emotion. The author of the article has presented various solutions to
eradicate the identity theft. In the process, a task force of group is created who are specialized in
the current issue and has knowledge regarding internet crimes. The group together finds out the
solution to eliminate the theft and the process in which the thieves can be attached are found out.
2
ANNOTATED BIBLIOGRAPHY
The assignment: the author has presented information relevant to the topic. Two prime
categories of the theft had been identified. The first category includes the victims who have been
fraudulently utilized by the criminals and the other category includes the ones who are induced
to rely upon the false representations to grant benefits and extend the credit.
Article 2: Swire, P. (2009). No Cop on the Beat: Under enforcement in E-Commerce and
Cybercrime. Journal on Telecommunications and High-tech Law, 107. Retrieved
fromhttp://www.jthtl.org/content/articles/V7I1/JTHTLv7i1_Swire.PDF
Being an expert in cyber law and privacy and a member of the National Security Agency,
a review group of President Obama, Swire is the first and the only individual to gain the
responsibility for privacy law in the US government. The article by him contains well-organized
reasons for cyber crime and E- commerce cases. It presents various information, issues and
forensic issues and solutions for cyber crimes.
The assessment: In the article, the author has pointed out that the internet a crime goes far
beyond the Department of justice for cybercrime and FTC consumer protection.the identification
of the theft and the crimes should be decided by the federal enforcement. When the suspect is
outside the jurisdiction, there should be new structures constructed and local authors must be
involved. The article is considered as relevant as it contains a set of the solutions to the cyber
crimes.
Article 3: Jakobsson, M., Myers, S. (2006). Phishing and Countermeasures: Understanding the
Increasing Problem of Electronic Identity Theft. Wiley Interscience. Google Books.
Retrievedfrom http://books.google.com/books?
ANNOTATED BIBLIOGRAPHY
The assignment: the author has presented information relevant to the topic. Two prime
categories of the theft had been identified. The first category includes the victims who have been
fraudulently utilized by the criminals and the other category includes the ones who are induced
to rely upon the false representations to grant benefits and extend the credit.
Article 2: Swire, P. (2009). No Cop on the Beat: Under enforcement in E-Commerce and
Cybercrime. Journal on Telecommunications and High-tech Law, 107. Retrieved
fromhttp://www.jthtl.org/content/articles/V7I1/JTHTLv7i1_Swire.PDF
Being an expert in cyber law and privacy and a member of the National Security Agency,
a review group of President Obama, Swire is the first and the only individual to gain the
responsibility for privacy law in the US government. The article by him contains well-organized
reasons for cyber crime and E- commerce cases. It presents various information, issues and
forensic issues and solutions for cyber crimes.
The assessment: In the article, the author has pointed out that the internet a crime goes far
beyond the Department of justice for cybercrime and FTC consumer protection.the identification
of the theft and the crimes should be decided by the federal enforcement. When the suspect is
outside the jurisdiction, there should be new structures constructed and local authors must be
involved. The article is considered as relevant as it contains a set of the solutions to the cyber
crimes.
Article 3: Jakobsson, M., Myers, S. (2006). Phishing and Countermeasures: Understanding the
Increasing Problem of Electronic Identity Theft. Wiley Interscience. Google Books.
Retrievedfrom http://books.google.com/books?
3
ANNOTATED BIBLIOGRAPHY
id=xxAbEcNlIwwC&printsec=frontcover&vq=electronic+identity+theft&ie=ISO-8859-
1&output=html
The article is produced by two authors, one is Jacobsson is a security researcher who
peruses interest in the application of security and the other one is Myers, who is an associate
professor in the computer science department at the university of Indian and a member of applied
Cyber security center. Both of them has provided with patents for assisting of the cyber crimes.
A book has also been written by them that can help in identification of the theft and the internet
crimes. The book also contains the solutions to the criminal issues and the counterattacks of the
problems. The good is electronically available in the internet on the Google books
The assessment: The book has a comprehend ways on how the consumers can avoid the cyber
crimes. It contains in details the process of counterattacking the crimes like the spoofing and
monitoring of the mails and other accounts of the internet. The sources that are obtained are
valuable for researching as it provides many evidences to overcome the phishing and thefts.
Article 4: Van Oorschot, P.C., Stubblebine, S. (2005). Countering Identity Theft through Digital
Uniqueness, Location Cross-Checking, and Funneling. Retrieved from
http://fc05.ifca.ai/p03.pdf
The article consists of discussion of the various statistics that helps in the identification of
the thefts, and the problems that are faced while identifying the thefts. The two authors named
Stubblebine and Oorschot proposes an authentication system that can help in the cross checking
of the physical location, claims and centralized verification of the process that can curb the
problem resulting the crime.
ANNOTATED BIBLIOGRAPHY
id=xxAbEcNlIwwC&printsec=frontcover&vq=electronic+identity+theft&ie=ISO-8859-
1&output=html
The article is produced by two authors, one is Jacobsson is a security researcher who
peruses interest in the application of security and the other one is Myers, who is an associate
professor in the computer science department at the university of Indian and a member of applied
Cyber security center. Both of them has provided with patents for assisting of the cyber crimes.
A book has also been written by them that can help in identification of the theft and the internet
crimes. The book also contains the solutions to the criminal issues and the counterattacks of the
problems. The good is electronically available in the internet on the Google books
The assessment: The book has a comprehend ways on how the consumers can avoid the cyber
crimes. It contains in details the process of counterattacking the crimes like the spoofing and
monitoring of the mails and other accounts of the internet. The sources that are obtained are
valuable for researching as it provides many evidences to overcome the phishing and thefts.
Article 4: Van Oorschot, P.C., Stubblebine, S. (2005). Countering Identity Theft through Digital
Uniqueness, Location Cross-Checking, and Funneling. Retrieved from
http://fc05.ifca.ai/p03.pdf
The article consists of discussion of the various statistics that helps in the identification of
the thefts, and the problems that are faced while identifying the thefts. The two authors named
Stubblebine and Oorschot proposes an authentication system that can help in the cross checking
of the physical location, claims and centralized verification of the process that can curb the
problem resulting the crime.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
ANNOTATED BIBLIOGRAPHY
The assessment: The article contains the effective measures that can be utilizes while fighting
the identity theft. The article is a capable source of the various strategies to reduce the theft.
Article 5: Linnhoff, S., &Langenderfer, J. (2004). Identity Theft Legislation: The Fair and
Accurate Credit Transactions Act of 2003 and the Road Not Taken. Journal of Consumer
Affairs, 38(2), 204-216.
In the article the authors presents several ways in which the identity thefts can be
attacked, Not the identity thieves but the head-on and the congress must be held responsible for
the crime. Due to under enforcement of FACTA the issue takes place.Another issue pointed out
is that there is lack of address of the issue of the social distribution of the member of the security
and sensitive data safeguarding. The authors are against the credit card companies and the poor
security systems. The only solution that the authors presented is the biometric system to combat
the crime.
The assessment: the article points out that congress cannot solely resolve the problem of theft
identity. The article would help in research in different in identification of the criminals
responsible for the identity theft.
ANNOTATED BIBLIOGRAPHY
The assessment: The article contains the effective measures that can be utilizes while fighting
the identity theft. The article is a capable source of the various strategies to reduce the theft.
Article 5: Linnhoff, S., &Langenderfer, J. (2004). Identity Theft Legislation: The Fair and
Accurate Credit Transactions Act of 2003 and the Road Not Taken. Journal of Consumer
Affairs, 38(2), 204-216.
In the article the authors presents several ways in which the identity thefts can be
attacked, Not the identity thieves but the head-on and the congress must be held responsible for
the crime. Due to under enforcement of FACTA the issue takes place.Another issue pointed out
is that there is lack of address of the issue of the social distribution of the member of the security
and sensitive data safeguarding. The authors are against the credit card companies and the poor
security systems. The only solution that the authors presented is the biometric system to combat
the crime.
The assessment: the article points out that congress cannot solely resolve the problem of theft
identity. The article would help in research in different in identification of the criminals
responsible for the identity theft.
1 out of 5
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.