11.12.2012 Views

stock repurchase announcements: a test of market ... - Asbbs.org

stock repurchase announcements: a test of market ... - Asbbs.org

stock repurchase announcements: a test of market ... - Asbbs.org

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

e unique and known only by the individual it has been issued to, but once a criminal has access<br />

to that information, then the thief can virtually become that individual.<br />

Information on a driver’s license alone is usually enough for identity thieves to commit numerous<br />

acts <strong>of</strong> fr aud. The infor mation on a driver’ s license consists <strong>of</strong> the na me, address, date <strong>of</strong> birth,<br />

and license num ber <strong>of</strong> the individual it identifies. The driver’s license is pre ferred by criminals<br />

because it is the form <strong>of</strong> identification that contai ns an image <strong>of</strong> th e owner, according to Berghel<br />

(2006). Whe n a license h as been obtai ned, criminals only need t o replace the picture with their<br />

own to make the license appear credible. Cri minals also cr eate counterfeit licenses with either<br />

actual or fictitious information for the same purpose.<br />

Victims who knew how th eir information was stolen claim the identity thieves used si mple and<br />

common methods. These techniques include: lost or stolen wallets, mail intercepts, and thef t by<br />

individuals who had a relationship with the victi m (Cheney, 2003). At one time cri minals were<br />

even able to obtain information neede d to co mmit identity theft by purchasing an individual’s<br />

driving record from the Department <strong>of</strong> Motor Vehicles. However, this changed with the Driver’s<br />

Privacy Protection Act <strong>of</strong> 1994, which limited access to m otor vehicle records. We are now in<br />

the Information Age, where criminals have all the information needed to commit identit y right at<br />

their fingertips, courtesy <strong>of</strong> the Internet.<br />

The Internet has opened new avenue s for criminals that have made it easier to obtain personal<br />

information needed to commit identity theft. Online transactions have risen over the past dec ade,<br />

increasing the am ount <strong>of</strong> inform ation available to thieves. In 2002, the U.S. Depart ment <strong>of</strong><br />

Commerce claimed that In ternet sales grew at a r ate <strong>of</strong> 25 percent (Cheney , 2003). This means<br />

that more consumers are using the Internet to purchase items, leaving a trail for identity thieves to<br />

follow. Consu mers need to be aware that Intern et transactions pose threat s to their inf ormation<br />

due to computer hackers, cookies, and other forms <strong>of</strong> online theft (Milne, 2004).<br />

Consumers who do busine ss online become vulnera ble to identity theft because inform ation on<br />

their personal computer, as well as their business computer, may be accessed by criminals (Milne,<br />

2004). The reason for this vulnerabilit y can be attributed to the fact that while online, a<br />

consumer’s inform ation, if not properl y protected, is susceptible to theft. Consum ers provide<br />

credit card numbers and other personal inform ation when completing online transactions that can<br />

be easily intercepted or com promised due to l ackadaisical co mputer security . An easy way to<br />

improve security is to install a firewall and remove spyware frequently, as well as installing virus<br />

protection.<br />

Identification information is also at risk afte r an online transaction occu rs. Com pany’s records<br />

now contain customer information, where their own com puter sy stem is a t risk for theft.<br />

According to White (2005), “Intruders attack a typical US firm ’s co mputer security numerous<br />

times in a week” (p. 850) . A business’ s computers are just as susceptible to identit y theft as a<br />

personal computer, but they are required to have immense security measures in place to safeguard<br />

their custo mer’s personal identity information. Ho wever, data t heft by em ployees and thieves<br />

hacking into company databases, are more serious threats for identity theft to c ustomers (Milne,<br />

2004).<br />

Another concern with online transactions is th e lack <strong>of</strong> face-to-face co mmunication between the<br />

two parties involved . Th e supplier is placing c onfidence in the indivi dual purchasing goods <strong>of</strong>f<br />

the Internet. This raises the dilemma <strong>of</strong> custom er authentica tion. Wit hout the face-to- face<br />

contact, customer authentication becomes virtua lly unreliable. The absenc e <strong>of</strong> face-to- face<br />

communication gives identity thieves an open door to pose as another indivi dual. Simply stated,<br />

ASBBS E-Journal, Volume 4, No.1, 2008 48<br />

ID Theft

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!