123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Online Discussion Subject

Profile Picture
By Author: sherry roberts
Total Articles: 99
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

(1) Describe the methodology and sources of data that Bureau of Justice Statistics (BJS) has been employed to analyze the victims of identity theft in 2012.
The methodology being used by the Bureau of Justice Statistics is secondary research as they use the data from another source to accomplish their research. The source of data for the research is the 2012 Identity Theft Supplement to the National Crime Victimization Survey. The data is from the victims who had experienced identity theft for the previous 12 months preceding their interview.
(2) Describe (or highlight) the study’s findings on subject matters, such as the prevalence of identity theft, its victims, and the characteristics and effects of this crime.
The study discovered that about seven percent of persons aged 16 years and above had been affected by identity theft in the year 2012. The findings also demonstrated that the majority of the incidents entailed the fraudulent use of information of the existing account like that of the credit card or bank. The victims with personal information that they used to open a new account or for fraud had ...
... a higher likelihood compared to the victims of existing account fraud to be affected by financial, credit, as well as relationship issues and severe emotional distress. About 14 percent of the victims experienced out-of-pocket losses, whereas about 36 percent of the identity theft victims showed moderate to severe emotional distress resulting from the incident.
(3) Describe statistics in Table 1 a Person of age 16 or older who experienced at least one identity theft incident in the past 12 months, by type of theft, 2012.
Table 1 demonstrates that identity theft involving an existing account was 84.6%, that involving a credit card 40.3, bank 37.3, other 7.0, new account 4.1%, personal information 3.8%, and multiple types 7.6% (existing account was 5.0% while other was 2.6%).
(4) Describe graphical illustration (see Figure 2) Most common ways victims discovered identity theft, by type of theft, 2012.
From Figure 2, most of the identity theft involving existing accounts was reported by the concerned financial institutions after they detected suspicious account activities. 20% of the identity theft victims with existing account noticed fraudulent charges on their account. Ten percent of victims of existing account misuse noticed money missing from their accounts, five percent were contacted by informed by a company of agency, 6% percent were contacted by a financial institution, 5% noticed credit card decline, and three percent received a bill or were contacted about an unpaid bill.
(5) Describe graphical illustration (see Figure 8) Length of time spent resolving financial and credit problems associated with identity theft, by type of identity theft, 2012.
From the graph, resolving the financial and credit problems associated with identity theft on existing account was the quickest at 50% for a day or less. The resolving of problems associated with multiple types took the longest time of more than six months at 2 percent. Those issues resolved for a day or less in order of the resolution percentage included a problem with existing account, personal information, new account, and multiple types with resolution percentages of 55, 42, 41, and 36 respectively.
(6) Describe statistics in Table 5: Persons age 16 or older who experienced identity theft at any point in their lives, type of identity theft they experienced outside of the past years, and ongoing problems from identity theft that occurred outside of the past year 2012.
The table shows that at least every person interviewed had experienced at least one incident of identity theft. Also, according to the findings, 7.3 percent of the interviewees experienced one incident or more of identity theft outside the past 12 months. The type of identity theft experienced with unresolved problems included existing account (4.0%) new account (16.1%), personal information (14.9%), and multiple types (20.6%).
(7) Describe statistics in Table 6: Actions victims and non-victims took during the past 12 months to reduce the risk of identity theft, by whether the action was taken in response to the theft, 2012.
The table shows that 84.6 percent of the victims took action independently concerning the identity the in the past year. The percentage of those who checked their credit report was 38.1%, those who changed passwords on their financial accounts was 31.7%, those who purchased an identity theft insurance or a credit monitoring service was 6.1%, and those who destroyed documents containing personal information was 66.8%.

Carolyn Morgan is the author of this paper. A senior editor at Melda Research in Reliable Essay Writing Service if you need a similar paper you can place your order for a custom research paper from Trustworthy Custom Essay Writing Service.

More About the Author

Author is associated with MeldaResearch.Com which is a global Custom Essay Writing and Term Paper Writing Company. If you would like help in Research Papers and Term Paper Help you can visit Custom Writing Service

Total Views: 195Word Count: 784See All articles From Author

Add Comment

Education Articles

1. Study Ms In Uk For Indian Students For 2024-25 Intake
Author: Transglobal Overseas

2. Top Land Survey And Transportation Design Courses To Boost Your Career
Author: Alaikha

3. Charting Your Course To Cbap Certification: A Comprehensive Guide
Author: Myank

4. Jaipur's Finest: Ranking The Best Nda Coaching Institutes For 2024
Author: Richard

5. Azure Devops Online Training In Hyderabad | Azure Devops Course Online
Author: Renuka

6. Arena Animation Tilak Road - Pune's Premier Animation Institute
Author: Arena Animation Tilak Road

7. Project Management Software
Author: Sangita Samal

8. Lunch Box
Author: nehashah

9. Docker Online Training | Docker And Kubernetes Training
Author: Teja

10. Working With Files In Python: A Comprehensive Guide
Author: Ferilion labs

11. Fostering Creativity In Children's Education: Approaches And Benefits
Author: hussanisoyat

12. Harness The Power Of Machine Learning: Research Proposal Development In Abuja, Nigeria
Author: elaine

13. Empowering Learners: The Evolution Of Education In Dubai's Schools
Author: faizalkhan1393

14. The Importance Of Early Preparation: Securing Admission To Your Dream School
Author: anwarkhan45314

15. Unleash The Power Of Digital Marketing For Your Small Business
Author: Unleash the Power of Digital Marketing for Your Sm

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: