U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Preventing Identity Theft Through Information Technology (From Perspectives on Identity Theft, P 151-167, 2008, Megan M. McNally and Graeme R. Newman, eds. -- See NCJ-223725)

NCJ Number
223732
Author(s)
Sara Berg
Date Published
2008
Length
17 pages
Annotation
This chapter applies eight techniques of situational crime prevention (SCP) in showing how information-technology (IT) strategies can be used to prevent identity theft.
Abstract
SCP is a strategy designed to reduce opportunities for crime by applying five main principles: increase the effort required for offenders to reach their target; increase the risks for offenders if they commit crime; reduce the rewards of a successful crime; reduce the provocations that may entice offenders into making greater efforts to commit crime; and remove the excuses for committing crime. IT offers a number of options for preventing identity theft. First, computer security methods harden potential targets and extend guardianship. Second, physical and digital controls can decrease offenders’ access to facilities. Third, validation of personal identity can deflect offenders. Fourth, firewalls conceal computing targets. Fifth, information markets can be disrupted. Sixth, login banners act as a means of posting a warning that unauthorized access is criminal. Seventh, training for commercial and financial employees will alert their conscience and increase their awareness about how to prevent identity theft. Eighth, individuals can harden their own computers based on education and training in mechanisms for preventing attacks on their individual computers. Although IT strategies may not fully prevent identity theft, some prevention is better than no prevention. Also, individuals must seek training that will acquaint them with the essential elements and continuing upgrades in IT security that can prevent unauthorized access to personal information that may be used to commit fraud against the individual and various businesses. 3 notes, 19 references