2015
DOI: 10.4314/pelj.v18i2.02
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Personal Information in the Era of Identity Theft: Just how Safe is our Personal Information from Identity Thieves?

Abstract: Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
3

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 0 publications
0
5
0
3
Order By: Relevance
“…12 However, the penalties imposed are not strong enough in deterring the cybercriminals from committing the crimes in cyberspace that there is a constant rising of cybercrime cases around the world. 13 Cybercrimes relating to integrity, confidentiality and accessibility of computer systems are mostly regarded as specific cyber offenses in many jurisdictions, whereas offences such as fraud, breach of privacy and identity offences are regarded as general cyber offences. 14 Those countries which impose criminal penalties or criminalise cybercrime use different methodology in application such as Finland regulates cyber offences via the new chapters of penal code.…”
Section: Stage 3 Extracting and Synthesising Datamentioning
confidence: 99%
“…12 However, the penalties imposed are not strong enough in deterring the cybercriminals from committing the crimes in cyberspace that there is a constant rising of cybercrime cases around the world. 13 Cybercrimes relating to integrity, confidentiality and accessibility of computer systems are mostly regarded as specific cyber offenses in many jurisdictions, whereas offences such as fraud, breach of privacy and identity offences are regarded as general cyber offences. 14 Those countries which impose criminal penalties or criminalise cybercrime use different methodology in application such as Finland regulates cyber offences via the new chapters of penal code.…”
Section: Stage 3 Extracting and Synthesising Datamentioning
confidence: 99%
“…If one look at the Indian Penal code and read carefully the sections 24 and 25 , one would see that the terms dishonestly and fraudulently have been defined there. After carefully reading it with the newest addition in the IT Act , 15 it can be suggested that the identity theft is an intentional act on part of the perpetrator . This act can be anything and can include using the victim's electronic signature, password, or any other unique identification feature with the purpose of causing deliberate harm to the victim either by any of the following measure like downloading, extracting, or copying it.…”
Section: Identity Theft As Per It Act 2002mentioning
confidence: 99%
“…Hierdie inligting is waardevol vir kuberdiewe omdat identiteitsdiefstal daarmee gepleeg kan word. Cassim (2015)…”
Section: Figuur 15 Persoonlike Inligting (Pi) Wat Aanlyn Gedeel Wordunclassified