Abstract
This article discusses the growing identity theft problem in cyberspace, focusing specifically on phishing attacks. Victims of identity theft and phishing attacks suffer direct financial losses, though the real price these crimes exact is in the time and money spent trying to rebuild a victim’s credit and good name. Society also suffers through business losses, generally passed on to consumers through higher costs for goods and credit, and, more importantly, through loss of consumer confidence in conducting business online.Section II presents an overview of identity theft through a discussion of associated costs, laws, and stakeholders. Section III presents facts and statistics on the phishing problem. Section IV sets up a structure for analyzing identity theft crime control methods based on primary, secondary, and tertiary responses to crime. The primary level includes victim self-help measures, the secondary level involves private-party architecture solutions, and the tertiary level includes public law enforcement efforts. The article then discusses recent developments in fighting identity theft at each level, focusing on new laws and services that help consumers secure their identity, advances in private-party methods to detect and prevent fraud, and new and proposed changes to criminal laws used in the battle against identity theft. It will discuss the effectiveness of these new developments on phishing attacks and critically examine who is best equipped to combat the phishing problem. The article concludes that no single crime control method alone will be enough to combat phishing. Only a combined approach, incorporating strategies from each level, will diminish the phishing problem.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.