Research Proposal Outline on Identity Theft
In today’s world that is defined by advancement in technology and increase in impersonal electronic transactions, identity theft has become prevalent. The main objective of this research is to explore identity theft in terms of how it occurs, what methods or techniques are used by offenders to commit identity theft crimes or frauds, what makes it possible for people to fall victims to identity theft, the consequences of identity theft on victims and strategies of preventing and curbing identity theft.
The section will provide general information that addresses the need for individuals and organizations to treat identity theft seriously and why they should protect their personal information, bank accounts, cards and online profiles from identity theft. Moreover, the purpose of this research which is to find suitable and amicable ways of preventing identity theft and mitigating its risks and effects will be reiterated in this section.
Background and Literature Review-research Proposal Outline on Identity Theft
This research depends on information and statistics provided by studies conducted by other scholars and surveys carried out by various institutions such as the Federal Trade Commission (FTC) in the United States so as to determine how identity theft is perpetrated by offenders, its extent, trends and issues relating to identity theft, as well as, ways of mitigating or preventing identity theft. The findings of research by scholars such as Manap, Rahim and Taji (2015), Anderson, Durbin and Salinger (2008), Betz (2012), Copes, Kerley, Huff and John Kane (2010), Finklea (2014), Hedayati (2012), Holm (2014), Hoofnagle (2007), Lindberg (2011) and Solove (2003) will be discussed in this section so as to get an overview of identity theft, how it is conducted, its impacts and preventive measures against identity theft. The literature review will also include reports by researchers such as Foley (2017) and companies such as Revere Bank (2016).
The research methodology will entail the use of qualitative research design data being collected from primary sources and secondary sources. The primary source of data will be surveys undertaken by people, that is, victims of identity theft, as well as, surveys undertaken by companies, organizations or institutions who have reported incidents of identity theft. The secondary source of data will be from articles, journals and books about identity theft written by various scholars, as well as, reports and statistics on identity theft provided by institutions.
Results-research Proposal Outline on Identity Theft
Based on the surveys undertaken by different victims of identity theft and companies who have reported incidents of identity theft or experienced identity theft attempts, the results or findings will determine the various motives of identity theft, ways through which identity theft occurs, impacts of identity theft on victims and how people and organizations can prevent identity theft.
The results or findings of research will be discussed based on motives of identity theft, ways through which identity theft occurs, impacts of identity theft on victims and how people and organizations can prevent identity theft. Motives of identity theft that will be discussed in this section include using victims personal information to open novel bank accounts or take over existing ones, compromise credit card payment systems and compromise medical insurance and facilitate unauthorized immigration and terrorism. Some of the methods of identity theft that will be discussed in this section include pharming, vishing, hacking, using malware to gain access to individuals’ identifying information, phishing, smiShing, fake job advertisements and preying on people through social media platforms.
Conclusion-research Proposal Outline on Identity Theft
This section will summarize the findings discussed in this research and how they affirm the objective of the study and the statement.