keyboard_arrow_up
A Review of Cybersecurity as an Effective Tool for Fighting Identity Theft across United States

Authors

Oloyede Adekunle1, Ajibade Idris1, Obunadike Callistus1, Phillips Adeniyi1, Shittu Olayemi1, Taiwo Esther1, Kizor-Akaraiwe Somto2, 1Austin Peay State University, USA, 2University of Washington, USA

Abstract

The study is focused on identity theft and cybersecurity in United States. Hence, the study is aimed at examining the impact of cybersecurity on identity theft in United States using a time series data which covers the period between 2001 and 2021. Trend analysis of complaints of identity theft and cybersecurity over the years was conducted; also, the nature of relationship between the two variables was established. Chi-Square analysis was used to examine the impact of cybersecurity on identity theft in United States. Line graphs were used to analyze the trend in the variable. Time series data was used in the study and the data was obtained from secondary sources; Statista.com, US Federal Trade Commission, Insurance Information Institute and Identitytheft.org. Result from the study revealed that consumers’ complaints on identity theft were on the increase every year. Total spending of the economy (both private and public sector) on cybersecurity was on continuous increase over the years. More than 100% of spending in 2010 was incurred in 2018. The Chi-Square analysis revealed that cybersecurity does not have significant impact on identity theft. The study recommended that the government increase the level of public awareness to ensure that members of the public protect their personal and other information to ensure that they are not compromised for fraud or identity theft. Organizations also need to invest more in the security system and develop policies that will support the security system. At the country level, international treaties and collaboration should be encouraged to prosecute the fraudsters hiding behind national borders.

Keywords

Cybersecurity, Identity theft, Crime Prevention, Information Assurance and Security