It is possible to avoid becoming a victim of such crimes through some basic precautionary methods. Firstly, it is essential to store or discard personal information in a careful manner. This means personal documents should not be left lying around or shared through internet. All personal information should be stored in a secure place. All sorts of old receipts, expired cards, bank statements and checks should be disposed of in an appropriate manner so that nobody can glean any sort of information by rummaging through the trash. (United States Department of Justice, 2010); (Vacca, 2002); (June, 2000)
Secondly, one must be very careful about divulging personal identifying information like Social Security Number to people through the Internet or telephone. Persons impersonating bank officials may ask for essential information like passwords or account information using which identity theft can be done. Third, billing cycles must be constantly checked. In case bills do not arrive at regular intervals, it must be verified from the creditors. Fourth, use internet effectively without leaving a trail. This would involve strengthening the login security of the computer, installing a good firewall and using hard-to-break passwords. (United States Department of Justice, 2010); (Vacca, 2002); (June, 2000)
References
Baschab, John; Piot, Jon; Carr, Nicholas. (2007) "Executive's Guide to Information
Technology." Wiley.
Beard, Jon W. (1996) "Impression management and information technology."
Praeger.
Brotby, Krag. (2009) "Information Security Governance"
Wiley.
Brown, C.V; DeHayes, D.W; Hoffer, J.A; Martin,...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now