<u>Identity Theft</u> occurs when criminals obtain personal information that allows them to impersonate someone else in order to use the person's credit to obtain financial accounts and make purchases.
<u>Explanation</u>:
Theft is an action of committing crime. Theft is also defined as taking someone’s property or things without their permission or knowledge.
<u>Identity theft</u> means stealing someone’s identity and using them to gain financial advantage. Identity theft can happen in many ways. Some of them are committing theft on financial identity, medical identity, insurance identity, driver’s license and social security identity. Identity theft can be reported to federal trade commission.
Transaction exposure deals with cash flows that result from existing contractual obligations.
The degree of uncertainty that businesses engaged in international trade must deal with is known as transaction exposure. It is also known as translation exposure or translation risk .
It is specifically the risk that exchange rates will change after a company has already committed to a financial obligation. These foreign enterprises are extremely vulnerable to changing exchange rates, which can result in significant capital losses.
Transaction exposure often carries only one side of the risk. The only company that might experience this vulnerability is one that completes a transaction in a foreign currency.
To learn more about transaction exposure click here :
brainly.com/question/27961879
#SPJ4
Answer:
Advantages
1. These data could improve response by helping first responders locate victims who need urgent help.
2. They are useful because updates are gotten from people who have first hand information.
Disadvantages
1. The information may not be totally accurate.
2. Such data tend to be biased
Explanation:
Crowdsourced social media data is simply the data gotten from social media based on reports made by citizens about locations and conditions of events or disasters in their community.
There are certain advantages and disadvantages when using such data in disaster response which are given above.