scholarly journals Identity Theft and Older Adults: How Minorities and the Poor Suffer the Worst Consequences

2021 ◽  
Vol 5 (Supplement_1) ◽  
pp. 324-324
Author(s):  
Marguerite DeLiema ◽  
David Burnes ◽  
Lynn Langton

Abstract Society’s growing reliance on technology to transfer and store private information has created more opportunities for identity thieves to access personal data. Prior work using data from the National Crime Victimization Survey (NCVS) Identity Theft Supplement (ITS) showed that baby boomers were significantly more likely than Millennials to be victims of identity theft and that older people and minorities experience more severe economic and psychological consequences. This study examines how socioeconomic status, demographic characteristics, and incident-specific factors relate to how much money is stolen during identity theft, the likelihood of experiencing out-of-pocket costs, and emotional distress among identity theft victims age 65 and older. Using combined data from the 2014 and 2016 NCVS-ITS, this study examines the correlates of financial and psychological consequences of identity theft among 2,307 victims age 65 and older. Older Black victims are more likely to have greater amounts of money stolen and are more likely feel distressed than older non-Latino white identity theft victims. The most disadvantaged older adults living at or below the federal poverty level are nearly five times as likely to suffer out-of-pocket costs. The length of time information is misused and the hours spent resolving identity theft are significantly associated with emotional distress. More than one-third of older victims experience moderate to severe emotional distress following identity theft, and those who can least afford it suffer out-of-pocket costs. Greater advocacy and psychological support are needed to help older adults recover, in addition to tools to protect their personal information from misuse.

2021 ◽  
Author(s):  
Marguerite DeLiema ◽  
David Burnes ◽  
Lynn Langton

Abstract Background and Objectives Society’s growing reliance on technology to transfer private information has created more opportunities for identity thieves to access and misuse personal data. Research on identity theft specifically among adults age 65 and older is virtually nonexistent, yet research focusing on victims of all ages indicates a positive association between age, minority status, and more severe economic and psychological consequences. Research Design and Methods Identity theft measures come from a sample of more than 2,000 self-reported victims age 65 and older from the nationally representative National Crime Victimization Survey Identity Theft Supplements administered in 2014 and 2016. Regression was used to examine how socioeconomic status, demographic characteristics, and incident-specific factors relate to how much money is stolen, the likelihood of experiencing out-of-pocket costs, and emotional distress among older identity theft victims. Results Older Black identity theft victims were more likely to have greater amounts of money stolen and were more likely feel distressed by the incident than older White victims. The most disadvantaged older adults living at or below the federal poverty level were significantly more likely to suffer out-of-pocket costs. The length of time information was misused, experiencing subsequent financial problems and problems with friends/family, and the hours spent resolving identity theft were positively associated with emotional distress. Among those age 65 and older, age was not significantly associated with losses or emotional distress. Discussion and Implications Older adults living in poverty need more resources to assist with recovery and reporting identity theft to law enforcement. Limiting the extent of losses from identity theft and reducing the length of time information is misused may reduce the emotional toll of identity theft on older victims.


2020 ◽  
Vol 4 (Supplement_1) ◽  
pp. 31-31
Author(s):  
Marguerite DeLiema ◽  
Lynn Langton ◽  
David Burnes

Abstract Although financial exploitation and fraud targeting older adults have been the focus of increasing academic attention, research on identity theft among older adults is virtually nonexistent. Identity theft refers to an intentional, unauthorized transfer or use of a person’s identifying information for unlawful purposes (Federal Trade Commission 1998). Society’s growing reliance on technology to transfer and store private information has created increased opportunities for financial predators to access and misuse personal data. Results from the most recent Bureau of Justice Statistics’ Identity Theft Supplement show that nearly 1 in 10 adults aged 65 or older experienced identity theft in the past year, with financial losses totaling $2.5 billion. Given the high frequency and cost of identity theft among older Americans, more research is needed to guide prevention efforts and interventions that support recovery. This paper examines the risk factors, protective factors, costs, and consequences of identity theft victimization among older adults, focusing on differences between those aged 65-74 and those 75 or older. Findings suggest that the prevalence of identity theft is lower among those 75 or older (6.6% versus 10.3%), but those 75 or older experienced higher average losses per identity theft incident ($155 vs $96). Compared to those aged 65-74, a lower percentage of adults aged 75 or older engaged in online shopping, thereby reducing their risk of identity exposure (48% versus 24%). However, they were also less likely to engage in protective behaviors such as checking credit reports, changing passwords, checking account statements, and using security software.


Author(s):  
Ranaganayakulu Dhanalakshmi ◽  
Chenniappan Chellappan

Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. In spite of the different possible attacks discussed in later chapters, this chapter can focus on phishing attacks – a form of indirect attacks– such as an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. Phishing attacks use ‘spoofed’ e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, et cetera. The vulnerabilities on various phishing methods such as domain name spoofing, URL obfuscation, susceptive e-mails, spoofed DNS and IP addresses, and cross site scripting are analyzed, and the chapter concludes that an integrated approach is required to mitigate phishing attacks.


Author(s):  
Irene Chen

The story describes how three school institutes are grappling with the loss of private information, each through a unique set of circumstances. Pasadena City Public Schools discovered that it had sold several computers containing the names and Social Security numbers of employees as surplus. Stephens Public Schools learned that personal information about students at one of its middle schools was lost when a bag containing a thumb drive was stolen. Also, Woodlands Public Schools accidentally exposed employee personal data on a public Web site for a short period of time. How should each of the institutes react?


Author(s):  
Ioannis Iglezakis

In this chapter, a specific issue is addressed that concerns the protection of privacy vis-à-vis the efforts to combat identity theft and protect personal identifying information. There are, in particular, measures undertaken by legislators that involve penal sanctions and the introduction of new technological means for identity verification. Also, identity management schemes are introduced, which are utilized by service providers, mainly in the e-business sector, in order to support controlled access to resources. The solutions undertaken to protect identity are seen as measures enhancing privacy, which is endangered by identity theft. Personal information is largely available in the information society and its collection by identity fraudsters is also possible. Therefore, an effective protection of information protection should also include the protection of identity. The downside of the identity protection approach is that identity management actually presents risks to privacy, since the processing of personal data takes place in this context and it is argued that there are certain implications concerning the lawfulness of the processing. The use of electronic authentication through electronic cards or biometrics on passports and identity cards pose privacy issues, too. Subsequently, the legislation concerning identity theft and identity related crime is outlined. This is followed by specific analysis of privacy issues concerning identity management and identity verification methods, with particular reference to biometrics.


Author(s):  
Татьяна Пинкевич ◽  
Tat'yana Pinkevich ◽  
Андрей Нестеренко ◽  
Andrey Nesterenko

The article deals with the problematic issues related to the use of Big Data technology, as well as the positive and negative factors of the Big Data influence on the personal life of citizens. The authors come to the conclusion that in the absence of the law on the regulation of Big Data, the main obstacle to the abuse of private information of citizens is the Law on personal data. However, legitimate consent to the processing of personal data, their depersonalization, enshrined in the law, do not provide adequate protection of personal data from use by third parties. Therefore, serious study is required on the introduction of criminal liability for the use of personal information of individuals, using the technology of Big Data, which led to the violation of privacy.


Author(s):  
J. B.D. Joshi

E-government systems aim to transition traditional paper-based systems to “paperless” digital information systems to automate and streamline government operations and services. This transformation to digital form raises daunting challenges related to protecting identity and privacy of the citizens. Electronic fraud and identity theft are among the biggest risks to an e-government system that may potentially undermine its success. The CSI/FBI 2005 (Gordon, Loeb, Lucyshyn, & Richardson, 2005) Computer Crime and Security Survey reports more than $30 million in losses attributed to theft of proprietary information and more than a $31 million dollars loss related to unauthorized accesses. According to the data collected by the Consumer Sentinel and Identity Theft Data Clearing House, identity theft accounts for almost 40% of the fraud complaints (FTC, 2005). It is estimated that billions of records are available in both private and government databases describing each citizen’s finances, interests, and demographics. For instance, personal healthcare information about the diseases and health cases inflicting the general population are available in different places including insurance companies and pharmacies. While accessing such data is important for detecting epidemics and bio-terrorism, such accesses can easily encroach into citizen privacy. This demands a balancing act in dealing with issues related to privacy, accountability, national security, and/or good governance. Because of the heterogeneity of an e-government system, the task of protecting identity information as citizens interact with different sub-systems becomes exacerbated. Users typically may need to maintain multiple identities or complete anonymity while interacting with multiple interoperating systems raising severe privacy and identity management problems. For an e-government system to be reliable, and hence successfully deployed, the privacy and identity management issues need to be properly addressed and incorporated in its infrastructure design. Privacy may be defined as “the right of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated” (Jajodia, 1998). Thus, unlike security, which is organization-centric, privacy is a person-centric concept and refers to the control that an individual has over the use of his or her personal information. One aspect of the privacy problem is the anonymity of the users, which is aimed at protecting the identity of the users. The identity of an individual is a collection of personal data associated with the individual that uniquely identifies him or her. Associated with each identity is a set of attribute-value pairs, also known as credentials, typically representing a user’s qualifications and personal attributes including sensitive personal information such as name, age, and social security number. The capability to identify entities (subjects, objects, and resources) is essential in order to know what to protect from whom. Depending upon the context, a subset of the identity may be used to signify an individual. Such a “partial identity” is typically bound to the individual with a pseudonym (Köhntopp & Berthold, 2000), and may or may not uniquely identify the individual. Typically, multiplicity of identities for individual entities becomes necessary because of the requirements of anonymity, personal data protection, and controlled access to resources in multidomain e-government systems. Moreover, the notion of privacy and identity is inherently complex and may often be contradictory; furthermore, each stakeholder could have a different perspective on them. In large multidomain e-government system, identity management would typically aim towards providing mechanisms that ensure identity dependability to build and maintain trust and confidence between the interacting entities.


Author(s):  
Sopna A/P Sinnathamby Sehgar ◽  
Zuriati Ahmad Zukarnain

Online identity-based theft is known to be one of the most serious and growing threats to victims, such as individuals and organizations, over the last 10 years due to the enormous economic damage these crimes have caused. The availability of personal information on the Internet has increased the chances of this cyber-crime. Online identity theft crime is the result of a combination of cyber-crimes on the one hand and lack of awareness and training of users on the other hand to protect personal data on the other. Education and awareness, which also contributes to early detection, is the strongest tool for consumers to safeguard themselves from online identity fraud. This paper provides a comprehensive explanation of online identity theft, the various approaches that thieves use to attack individuals and organizations and the types of fraud involved in this cyber-crime. The aim of this research is to evaluate the need for a reformulation of the concept of identity theft in order to be compatible with the evolution of behaviors and fraud.


2013 ◽  
pp. 1346-1348
Author(s):  
Irene Chen

The story describes how three school institutes are grappling with the loss of private information, each through a unique set of circumstances. Pasadena City Public Schools discovered that it had sold several computers containing the names and Social Security numbers of employees as surplus. Stephens Public Schools learned that personal information about students at one of its middle schools was lost when a bag containing a thumb drive was stolen. Also, Woodlands Public Schools accidentally exposed employee personal data on a public Web site for a short period of time. How should each of the institutes react?


Sign in / Sign up

Export Citation Format

Share Document