翻訳と辞書
Words near each other
・ Idgah (short story)
・ Idgah Bus Stand
・ Idgah railway station
・ Idgah, Uttar Pradesh
・ IDH
・ IDH1
・ IDH2
・ IDH3A
・ IDH3B
・ IDH3G
・ Idha
・ Idham Chalid
・ Identity provider
・ Identity Registration Protocol
・ Identity score
Identity theft
・ Identity Theft (film)
・ Identity theft in the United States
・ Identity Theft Resource Center
・ Identity theorem
・ Identity theorem for Riemann surfaces
・ Identity theory
・ Identity Theory (webzine)
・ Identity Thief
・ Identity token
・ Identity tourism
・ Identity transform
・ Identity Unknown
・ Identity Unknown (1945 film)
・ Identity Unknown (1960 film)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Identity theft : ウィキペディア英語版
Identity theft

While use of a pseudonym or alias is not necessarily unlawful, identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name,〔Synthetic ID Theft (Cyber Space Times )〕〔Hoofnagle, Chris Jay, Identity Theft: Making the Known Unknowns Known. (Harvard Journal of Law and Technology, Vol. 21, Fall 2007 )〕 and perhaps to the other person's disadvantage or loss. The person whose identity has been assumed may suffer adverse consequences if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
The term ''identity theft'' was coined in 1964.
"Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained," and identity theft is not always detectable by the individual victims, according to a report done for the FTC.〔Federal Trade Commission – 2006 Identity Theft Survey Report, p.4〕 Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A US Government Accountability Office study determined that "most breaches have not resulted in detected incidents of identity theft". The report also warned that "the full extent is unknown". A later unpublished study by Carnegie Mellon University noted that "Most often, the causes of identity theft is not known," but reported that someone else concluded that "the probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%". More recently, an association of consumer data companies noted that one of the largest data breaches ever, accounting for over four million records, resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached.
An October 2010 article entitled “Cyber Crime Made Easy" explained the level to which hackers are using malicious software. As one security specialist named Gunter Ollmann said, “Interested in credit card theft? There’s an app for that.” This statement summed up the ease with which these hackers are accessing all kinds of information online. The new program for infecting users’ computers is called Zeus; and the program is so hacker friendly that even an inexperienced hacker can operate it. Although the hacking program is easy to use, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do to a computer and the user. For example, the article stated that programs like Zeus can steal credit card information, important documents, and even documents necessary for homeland security. If the hacker were to gain this information, it would mean identity theft or even a possible terrorist attack.〔Giles, Jim. "Cyber Crime Made Easy." New Scientist 205.2752 (2010): 20-21. Academic Search Premier. EBSCO. Web. 3 Oct. 2010.〕
== Types ==
Sources such as the non-profit Identity Theft Resource Center sub-divide identity theft into five categories:
* Criminal identity theft (posing as another person when apprehended for a crime)
* Financial identity theft (using another's identity to obtain credit, goods and services)
* Identity cloning (using another's information to assume his or her identity in daily life)
* Medical identity theft (using another's identity to obtain medical care or drugs)
* Child identity theft.
Identity theft may be used to facilitate or fund other crimes including illegal immigration, terrorism, phishing and espionage. There are cases of identity cloning to attack payment systems, including online credit card processing and medical insurance.〔, World Privacy Forum〕

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Identity theft」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.