scholarly journals Counteracting Identity Fraud in the Information Age: The Identity Theft and Assumption Deterrence Act

1999 ◽  
Vol 13 (2) ◽  
pp. 183-192 ◽  
Author(s):  
Kurt M. Saunders ◽  
Bruce Zucker
2019 ◽  
Vol 27 (4) ◽  
pp. 609-628
Author(s):  
Adekemi Omotubora

This article critically analyses the provisions on identity theft and identity fraud in the Nigerian Cybercrime Act passed in 2015. The objective of the article is to provide answers to three pressing questions: What was the law on identity crimes before the Cybercrime Act? How has the law addressed the peculiar challenges of identity theft and identity fraud online? Are the provisions of the law adequate and if not how should the law otherwise respond? This article provides an in-depth legal analysis of the relevant provisions of the law and highlights the gaps in the law through comparative analysis with UK and US laws. While the article proposes amendments to make the Nigerian law more effective in combatting identity crime, it also invariably pushes for harmonisation and consistency in the approach of national laws to the crime.


Author(s):  
Donna M. Schaeffer ◽  
Patrick C. Olson

In the past several years, the general public has had concerns about hacking and identity theft. Headlines in news media include computer system breaches at popular and respected companies like Target and universities like The University of California at Berkeley. This paper explores options available for providing the general public with the benefits of the information age while mitigating against the security risks. We begin with a discussion of it is reasonable for the general public to expect organizations engaged primarily in commerce to provide for their cybersecurity. We then look at how electronic transactions are currently secured. We conclude with a consideration of the “protocols” or “institutions” that might provide for security for consumers.


2006 ◽  
Vol 30 (9) ◽  
pp. 553-556 ◽  
Author(s):  
Bert-Jaap Koops ◽  
Ronald Leenes

Author(s):  
Reggie Becker ◽  
Mark B. Schmidt ◽  
Allen C. Johnston

The information age is characterized by unprecedented levels of information sharing, connectivity, and convenience. Along with the expediency afforded us by electronic commerce (e-commerce), online banking, e-mail reminders, and electronic government (e-government) services comes a degree of dependence on the information technology that drives these processes. Moreover, these processes are inherently insecure, thereby generating an unparalleled level of concern for computer security and identity theft, in particular. This article will discuss identity theft techniques and describe how readers can avoid it.


2009 ◽  
Vol 43 (5) ◽  
pp. 4
Author(s):  
MARY ELLEN SCHNEIDER
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document