Implications
Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only steal the information and enter into the security system of banks but when they are caught they also retaliate. They retaliate using computer viruses, "worms" and "logic bombs" that can destroy hard drives. While robbers of banks using guns and other such weapons can also steal big amounts but they could end up in prison and the amount looted could be recovered. In case of these hackers, the sleuths have new technological tactics to deal with. These criminals use technology to support their criminal intentions. "Jeffry Scheel, president and CEO with Vocent, Mountain View, Calif., points out that the rising tide of password theft with tools like phishing, pharming, and spyware has more than a few banks on the hunt for solutions with broad reach" (Bielski, 2005).
All the big companies own up to the fact that some hackers and crackers have accessed their computerized information through phishing & pharming. A number of these organizations, banks and financial institutions had to suffer losses due to computer frauds. In 1994, the hackers' activities made headlines when these computer savvy and technology driven criminal broke into "firewalls," or security systems of Citibank. Citibank had to revamp its security system to prevent any future problems but the technical expertise of these criminals cannot be checked. They might update their skills and get back with more vengeance and greater technological prowess.
Computer frauds and hacking activities have become a constant war with these intelligent criminals. There have been instances in which they have been able to capture the complete systems of Internet service providers and even threatened them to destroy their system and to distribute all the credit card information. In certain cases there have been employees who sabotaged the whole system. Internal employees having access to critical files have also caused trouble in certain cases. Dealing with an outsider as well an insider is a hard to juggle task. All the major banks and financial institution are deeply worried about electronic money, open-access World Wide Web sites, investment dealings world wide and the threat of those breaking into secure systems.
Individuals: People whose identities have been stolen can spend months or years cleaning the mess. Their hard-earned money is lost for no reason at all. Cleaning up the mess that the thieves have made by using good name and credit record is a Herculean task. In the meantime, victims may lose job opportunities, be refused loans, education, housing or cars, or even get arrested for crimes they didn't commit. A victim's losses may include not only out-of-pocket financial losses, but also substantial additional financial costs associated with trying to restore his reputation in the community and correcting erroneous information for which the criminal is responsible.
Correcting incorrect information about the financial or personal status, and trying to restore the good names and reputations are daunting tasks for the victims of identity theft and fraud. The damages done by the criminals take far longer to undo than it took the criminal to commit the crimes. Victims can suffer a lot once their identity has been stolen and abused. The hard-earned money of the person is lost for no reason at all. Apart from the financial aspect, peace of mind is also stolen along with the identity, as the victims have to go through a lot of trauma as a result of the crime. The proportion with which the crime has grown has also caused a dent on the economy. Some credit companies now keep a certain provision for the losses related to identity theft. Hence there are greater implications of the crime and the gravity of the situation is needed to be understood.
Solutions
Technological: Among many ways in which users can take care of the phishing, spyware, hacking and other such methods one method is also the use of technology. For example for spyware, anti-spyware software are available that identify and remove spyware from a user's computer. The issue again...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now