Assignment: Managing Information Systems - Final Project Specifications
Creating a New Identity (How Far Can You Go?)
Creating a new identity explains in detail how people use the borrowed identity for fraud. There are fundamentally three types of identities (other than the one you're born with); Created, Forged, and Stolen.
• With created identities, you establish the paperwork needed to make the identity legal, and from that point on you are essentially that person.
• With forged identities, you create the minimal IDs, instead of applying through the state or government.
• With stolen identities, you take over another person's ID (lving or deceased)nir order to abuse their specific credit.
1) From the point you transfer his or her identity to you, you are that person. This process is more complicated if you have a criminal record (and thus have fingerprints on ecord). This can be problematic if caught with the stolen identity, since the authorities think they have someone else.
2) Provide a step-by-step checklist for someone to follow (which will prove how easy this process is for identity thieves).
3) List the type of information you can find on any person you are searching for on the Internet.
4) Detail your findings by compiling a list of websites that you used to gather personal data on your target.
5) Compile a list of data broker agencies/sites that collect data on citizens.
Format your assignment according to the following formatting requirements:
1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.
3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.