https://ilt.eff.org/index.php/Computer_Fraud_and_Abuse_Act_(CFAA). 24 April 2013. 27 January 2014. Fowler, Bree and Joe Mandack. http://news.yahoo.com/hackers-may-used-pa-company-hit-target-195942337.html.
Retrieved from http://www.justice.gov/criminal/fraud/websites/idtheft.html. Woolsey, B., Gerson, E. (2009). The history of credit cards. Retrieved from: http://www.creditcards.com/credit-card-news/credit-cards-history-1264.php
But one must question which would they prefer, a hacker gaining access to their bank information or paying a higher fee for a more secure credit card. You may not even be aware but credit card and payment fraud is happening around you everyday. “Payment fraud occurs when someone gains financial or material advantage by using a payment instrument, or information from a payment instrument, to complete a transaction that is not authorized by the legitimate account holder” (Sullivan). It is obvious in this definition that the lack of authorization is a key point in credit card fraud. It is not only the customers and card holders that face challenges, the card issuers and store own... ... middle of paper ... ...es in the future (Koprowski).
That individual ends up changing the mailing address on an account and they can run up a huge bill before the person whose identity has been stolen realizes there is a problem. With technology expansion, the Internet has definitely made it easier for an identity thief to use the information they've stolen because transactions can be made without having any personal interaction (Mathews, R. 2013). Identity theft impacts our society and people’s businesses. Identity thieves will use business owner’s personal information to open up new lines of credit, new accounts, and make large purchases. Unjustifiable accounts and unpaid purchases will result in collectors holding you personally accountable for the business debt until you can p... ... middle of paper ... ...sign up for a monitoring service that will alert you by email to changes in your credit report which is a helpful way to prevent identity theft (Gerstner, L. (2013).
(2013). Merchants Struggle Against an Onslaught of High-Cost Identity Fraud and Online Fraud. [Electronic Version]. Retrieved March 09, 2014, from http://lexisnexis.com/risk/downloads/assets/true-cost-fraud-2013.pdf
Because, in the online, there lacked face-to- face or voice interaction, and then it would provide an opportunity to the fraudster stole client’s account through anonymity ways (Balan and Popescu 2011). Furthermore, the first one is about email fraud. Although, many people who are usually use email will ignore and delete anonymous emails, but few people would like to open these anonymous emails, and then fraudsters will theft their personal banking information and even their passwords from credit card’s emails (Balan and Popescu 2011). The second one is about online banking, online banking usually lacking more supervision than the counter, so many fraudsters utilize its convenience to theft the individual’s credit car through sending viral code to the individual’s online banking. Therefore, the people who prefer to choose an online credit card should spend more time on managing their credit
(2013, August 1). Credit Card Skimming | Credit Card Skimmers - Consumer Reports News. Credit Card Skimming | Credit Card Skimmers - Consumer Reports News. Retrieved May 8, 2014, from http://www.consumerreports.org/cro/2013/08/credit-card-skimming-at-gas-pumps/index.htm
(2009).Crime Online: Cybercrime and illegal innovation. UK: Nesta. • Shaw E., (2013) How To Avoid Falling Victim To Online ID Fraudsters. The Independent [online]. Available at: [Accessed 21 May 2014].
Government documents were misused by identity thefts. Mostly immigrants were the people that had falsified documents like SSN and green cards. Common security measures were to avoid exposing social security number if possible and verifying websites before inputting credit card information that could jeopardize bank accounts. Identity theft can happen to anyone so always stay protected. Works Cited Identity Theft.