Increase Risk Of Identity Theft Due To Higher Levels Of Internet Use Research Proposal

PAGES
2
WORDS
749
Cite
Related Topics:

¶ … identity theft due to an increase in Internet usage Identity theft is on the rise. This research paper will explore how the increased use of the Internet has made identity theft (once a relatively rare crime) extremely common. It will hypothesize that the use of online technology by a wider pool of individuals has contributed to the explosion of identity theft and also that the integration of social networking websites has facilitated identity theft. In the most recent comprehensive study conducted by the federal government on the crime: "federal identity theft convictions increased 26% in 2007 from the year prior...According to the 'Identity Theft Task Force Report,' as many as 1,534 people were convicted in 2006, and a year later, 1,943 were convicted nationwide on various identity theft violations" (Kravets 2008).

The use of the Internet has become integral to the functioning of daily life, spanning from connecting with work for telecommuters, doing online banking, making payments, shopping, as well as basic communication with friends and family. The opportunity to gain access to personal data has likewise exploded. The interlinked nature...

...

One much-talked about article by Mat Honan, writer for Wired magazine recently revealed how the author became a victim. "In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook" (Honan 2012). Critical security flaws and carelessness create a perfect storm for users. Honan blames himself to some degree for the hacking: "My accounts were daisy-chained together. Getting into Amazon let my hackers get into my Apple ID account, which helped them get into Gmail, which gave them access to Twitter" (Honan 2012). However, if a writer for Wired magazine is easily 'hacked,' this begs the question: what hope is there for far less technologically-savvy Internet users? Moreover, identity theft is growing increasingly sophisticated. While some identity thieves are petty criminals or persons who merely want to use identity theft for 'lol'…

Sources Used in Documents:

References

Honan, Mat. (2012). How Apple and Amazon security flaws lead to my epic hacking. Wired.

http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/

Kravets, David. (2008).U.S. identity theft convictions increase 26%, feds Say. Wired.

Retrieved: http://www.wired.com/threatlevel/2008/10/us-identity-the/
http://www.wired.com/images_blogs/threatlevel/files/id_theft_report_2008_final_version.pdf
http://finance.yahoo.com/news/pf_article_108711.html


Cite this Document:

"Increase Risk Of Identity Theft Due To Higher Levels Of Internet Use" (2012, October 11) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/increase-risk-of-identity-theft-due-to-higher-108240

"Increase Risk Of Identity Theft Due To Higher Levels Of Internet Use" 11 October 2012. Web.18 April. 2024. <
https://www.paperdue.com/essay/increase-risk-of-identity-theft-due-to-higher-108240>

"Increase Risk Of Identity Theft Due To Higher Levels Of Internet Use", 11 October 2012, Accessed.18 April. 2024,
https://www.paperdue.com/essay/increase-risk-of-identity-theft-due-to-higher-108240

Related Documents
Identity Theft but He That
PAGES 10 WORDS 2933

In one case in 2000, two-20-year-olds hacked into the Lowe's credit card mainframe from a white Pontiac Grand Prix parked outside a store, synching a single laptop to the wireless system that was meant for employees to use to locate products. The hackers, obviously to blame for the crime, played on the flaws of a computer system that should not have allowed for a security breach. While the same hackers

The problem is that there is no protection against this issue. This is due to the newsfeed in the profile of each user. The argument of the company is that the news feed will ensure the users get to see more content from others. however, this means that there is no certainty of the next item that the user will see on the news feed. This is a serious

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Internet Media and Its Impact on Shaping Global Economy Internet Media its Impact Shaping Global Economy Internet Media is the means through which information is conveyed to people through cables that are linked together at a certain workstations. Today, Internet media is everywhere and it has become so difficult to avoid it. The use of Internet by people has revolutionized the consumer interacts and their businesses. The use of Internet has become

Trust alleviates the apprehensions of insecurity that crop up when the retailer is not known, or the way the company will deliver the goods or services purchased. Building trust in e-commerce necessitates a clear indication of rigorous standards of security, data safeguard, transparency of data use, etc. (The effect of IT-based security on feedback mechanisms and trust building in online auction settings) Morgan and Hunt during 1994 indicate that trust

Risk Assessment in the Past
PAGES 15 WORDS 5965

It is also quite possible to use the file system's security characteristics or features in order to protect accessibility to the device management application itself. Then unauthorized users will not be in a position to read the application file, and they will not be able to run the application and have to attempt to guess a legitimate logon password in each of the step providing an extra layer of