Verified Document

Information Technology An Effective Project Essay

It is possible to avoid becoming a victim of such crimes through some basic precautionary methods. Firstly, it is essential to store or discard personal information in a careful manner. This means personal documents should not be left lying around or shared through internet. All personal information should be stored in a secure place. All sorts of old receipts, expired cards, bank statements and checks should be disposed of in an appropriate manner so that nobody can glean any sort of information by rummaging through the trash. (United States Department of Justice, 2010); (Vacca, 2002); (June, 2000) Secondly, one must be very careful about divulging personal identifying information like Social Security Number to people through the Internet or telephone. Persons impersonating bank officials may ask for essential information like passwords or account information using which identity theft can be done. Third, billing cycles must be constantly checked. In case bills do not arrive at regular intervals, it must be verified from the creditors. Fourth, use internet effectively without leaving a trail. This would involve strengthening the login security of the computer, installing a good firewall and using hard-to-break passwords. (United States Department of Justice, 2010); (Vacca, 2002); (June, 2000)

References

Baschab, John; Piot, Jon; Carr, Nicholas. (2007) "Executive's Guide to Information

Technology." Wiley.

Beard, Jon W. (1996) "Impression management and information technology."

Praeger.

Brotby, Krag. (2009) "Information Security Governance"

Wiley.

Brown, C.V; DeHayes, D.W; Hoffer, J.A; Martin,...

(2009).
"Managing Information Technology: (6th ed.)" Prentice Hall.

Cohen, Eli. (2005) "Issues in informing science and information technology."

Informing Science.

Cookie Central. (2010) "What are cookies?" Retrieved 19 January, 2010 from http://www.cookiecentral.com/cm002.htm

Evjen, Bill; Beres, Jason; Et Al. (2001) "Visual Basic .Net Programming Bible"

Wiley.

Henry, James. (2005) "Developing .NET Custom Controls and Designers Using C#"

BlueVision Publishing.

June, Dale L. (2000) "Protection, security, and safeguards: practical approaches and perspectives" CRC Press.

Marchewka, Jack T. (2006) "Information Technology Project Management"

Wiley.

N.A. (2005) "IT Steering Committee: Advocate or Adversary?" Insights, Retrieved 19

January, 2010 from http://www.ctghs.com/healthcare/newsletters/Insights-Steering-Committee.pdf

Schwalbe, Kathy. (2009) "Information Technology Project Management" Cengage

Learning.

Stone, Sarah. (2010) "Must-Have Non-Technical Skills for IT Pros." Retrieved 19

January, 2010 from http://www.globalknowledge.com/training/generic.asp?pageid=1840&country=United+States

Tipton, Harold F; Krause, Micki. (2008) "Information Security Management Handbook."

CRC Press.

United States Department of Justice. (2010) "Identity Theft" Retrieved 19 January, 2010

from http://www.justice.gov/criminal/fraud/websites/idtheft.html

Vacca, John R. (2002) "Identity Theft"

Prentice Hall.

Sources used in this document:
References

Baschab, John; Piot, Jon; Carr, Nicholas. (2007) "Executive's Guide to Information

Technology." Wiley.

Beard, Jon W. (1996) "Impression management and information technology."

Praeger.
Cookie Central. (2010) "What are cookies?" Retrieved 19 January, 2010 from http://www.cookiecentral.com/cm002.htm
January, 2010 from http://www.ctghs.com/healthcare/newsletters/Insights-Steering-Committee.pdf
January, 2010 from http://www.globalknowledge.com/training/generic.asp?pageid=1840&country=United+States
from http://www.justice.gov/criminal/fraud/websites/idtheft.html
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now