Identity Theft in the Philippines
Autor: Zef Añonuevo • March 9, 2015 • Lab Report • 1,214 Words (5 Pages) • 1,482 Views
AÑONUEVO, JOSEPH ANTHONY B. ENG501M/T04
MIT/11494824
Topic: Cybercrime: Identity Theft in the Philippines
Thesis Statement: This essay will explain how identity theft occurs, as well as the classification of identity theft, existing and recommended solutions to address identity theft in the Philippines.
Outline Topic:
1. How identity theft occurs
2.0. Classification of identity theft in the Philippines
2.1 Hacking
2.2 Skimming
2.3 Phishing
3.0 Existing solutions against identity theft in the Philippines
3.1 RA 10173 - Data Privacy Act of 2012
3.2 RA 10175 - Cybercrime Prevention Act of 2012
4.0 Recommended Solution to address identity theft in the Philippines
4.1 Visual Cryptography
4.2 Utilizing cutting edge technologies
4.3 Promoting precautionary guidelines against identity theft
AÑONUEVO, JOSEPH ANTHONY B. ENG501M/T04
MIT/11494824
Cybercrime: Identity Theft in the Philippines
Problem |
Identity theft takes place when criminals or someone steal and exploits personal credentials of other people to commit fraud or engage in other unlawful activities. [1] Identity theft is a fast growing problem not only in the Philippines but across the world. It seems that no matter how to protect personal information, there are criminals who manage to steal it. Likewise with the use of technology to disguise their identities and physical location our local law enforcers find it difficult to identify and capture online identity thieves.
There are three common classifications of identity theft in the Philippines; according to Chawki and Wahab [2]. Hacking is also called “cyber-trespass”. It allows hackers using a computer and network to gain access and steal individuals’, customers’ and even employees’ confidential information by evading and cracking system electronic security and password.
Skimming takes place when all the information on the original card has been captured and restored in the technology device called reader used by the thieves [3]. This scenario commonly happens in the restaurant and department store establishments wherein thieves set up their plan.
...