Get help now

Internet and Assignment Identity Theft

  • Pages 11
  • Words 2538
  • Views 57
  • dovnload



  • Pages 11
  • Words 2538
  • Views 57
  • Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get your paper price

    124 experts online

    Identity theft today seems to be highest growing white collar crime in our nation and it preys on the economic resources and reputations of its injured parties this includes young children and the deceased. In several cases victims of identity theft have to prove that they are innocent in order for anyone to even notice them. The law officials often can’t provide the necessary time to fully investigate in order to catch predators because of the high quantity and jurisdiction that is combined with the internet. Neither businesses nor individuals are safe or impervious to identity theft.

    In today’s prolific development of the internet; user need to secure their personal information in combination of using anti-virus software or take the risk that comes with the internet. Lit Review of -with 2 Academic References The Information Technology and Software Development career was the fastest growing career field in America during 201 1 (CNN Money, 2012). Every day new innovations and discoveries are flooding our lives. The world is persistently struggling to move at a rapid pace while improving efficiency.

    The urge to come up with the next great technology is the means for our irrepressible detonation in digital information. Still, with all the expediency and access to digital Week 5 assignment media, the world faces those who will use the equipment to steal our identities and resources for their own benefit. The United States Department of Justice describes Identity Theft and Fraud as, “… Terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for financial gain” (US.

    Department of Justice, 2012). A person’s personal information like their Social Security number, bank account information, or credit card numbers could be seed by predators to personally benefit from your expense. In several cases, a victim’s loss not only includes out-of-pocket financial losses, but substantial additional financial costs and time repairing and correcting credit histories and erroneous information. To assist with my research for this paper, I chose two books written from different perspectives.

    First, I searched for a book to provide an inclusive assessment of identity theft history; methods used to steal identities, consequences of having your identity stolen, and prevention techniques from an individual or business perspective. Next, after developing a strong baseline on identity theft, I sought out f a reference book which presents an inclusive assessment of the concepts of computer crimes, relevant laws, and methods performed by investigators to map out, capture and pursue identity theft criminals. Mr..

    Martin Boogieman the director of Financial Integrity for Microsoft and 30 years of experience under his belt; wrote a book called Identity Theft Handbook Detection, Prevention, and Security, the book is a summary on identity theft from his own experiences as an investigator Week 5 assignment and his very own research. He illustrates the extensive selection of methods that hackers and attackers use to get a person’s information for example steal through the mail to wash checks, skimmers, and identity stealing through older sites that have little or no security function.

    Later, the text captures the criminal justice system’s response to the problem, with the existing intervals identifying different parts of identity theft, such as victims, global development, and research efforts concerning identity theft. Identity theft has developed starting from an American dilemma into a nationwide pandemic and there are no signs of it ever ending. Trying to understand the vastness of this problem is crucial to a person’s ability to protect themselves and fight back.

    It doesn’t matter if you are the chief executive officer, chief financial officer; law enforcement officer, student, or a young child; no one seems to be out of reach from these terrible crimes. This book was researched carefully and written to uncover the massive criminal endeavor affecting the public. As the number one complaint initiator for the Federal Trade Commission for the past five years, and costing Americans $1. 52 billion last year in recovery efforts and actual lost monies. Federal Trade Commission, 2012) The disturbing economic and emotional impact that identity theft causes is astonishing.

    Mr.. Bogeyman’s suggests perceptive guidance, tremendously helpful suggestions, and first-hand examples signifying the individual person is the best defense against identity theft. He states in his book, individual citizens must be as savvy as the criminals seeking to steal their identity” (Boogieman, 2012, p. 20). As Internet technology has rush forward, it is just about impossible to solve all identity theft weak pointed no matter how well technology is advanced. With this in mind, my second academic reference speaks about the investigation, arrest and persecution of identity criminals.

    Authors Chuck States and Jeff Taylor wrote a book called “Computer Crime, Investigation, and the Law. Chuck States a writer who has been involved in the Internet Technology industry over twenty years and has the authored over eleven computer science books. He has over twenty different computer industry certifications and was a subject matter expert in expanding the Compact’s Certified Technical Trainer exam. Jeff Taylor a Texas police detective in the Criminal Investigations department who’s career began n 1982 and where his specialty is in white collar crimes.

    Detective Taylor is a certified computer forensic evidence recovery specialist and is a member of the instructor staff at Collins County Law Enforcement Academy where he instructs Electronic Crime Scene Investigations. Their book was written help to the identity theft investigator level and provides an extensive introduction to the ideas of computer crimes and appropriate laws. The authors display a good deal of knowledge, nonetheless due to profoundly technical argument; the message was challenged for common people to figure out.

    The chapters on the legalities and law, though extensive, were written at an attorney’s level and are very difficult to understand. In my opinion pairing these two professions in this book was an excellent idea. Justifiably, law-enforcement officials are caught up in identity theft investigations, but these days in Internet crimes, so are network administrators and technical-support experts. Computer Crime, Investigation, and the Week 5 assignment Law offers this several different discipline viewpoints to their readers.

    Starting expansive introductions to computer cremes, the book tracks the crossing f computer crime, and the various criminal procedures and techniques. The argument within computer forensics is First-rate and while it is great to understand the skills of forensic scientists, I wonder sometimes, if forensic specialists spent more of their time on finding other methods to prevent crime, would we be discussing identity theft still to this day? Taylor and States tell their readers, “Identity theft is a growing problem. 8. 5 million victims means that in a single year, about 2. Percent of the United States population was the victim of identity theft. This means your odds of being a victim in any given year are bout 1 in 3(Y’ (Taylor & States, 2011, p. 412). What percentage of these 8. 5 million victims would be reduced if we were to start to use biometrics in order to identify users of credit cards instead of just a signature on that is on the back of a card that few even sign and very few cashiers actually take the time to validate? Both author’s additionally state that individuals can, “Put a notice on your credit report.

    Most credit-reporting agencies will place a notice on your report that no new credit is to be issued to this identity without first calling the home number and verifying” (Taylor ; States, 2011, p. 21). Why isn’t there an automatic validation process? Smart phones today, easily have an automated email or phone call notification of all your bank transactions. Most banks in today’s society do offer these services now for free if you request them so why can’t any of the major credit reporting agencies not pursuing the same method?

    Another area in identity theft that needs more discussion is knowledge and awareness. Week 5 Explain how academic knowledge impacts social elements Individuals need to be alert that they, have control over protecting their own personal information. Businesses and law enforcement will respond to illegal activities; however the person not the companies and organizations have the most gained interest in protecting their identity. Therefore, being educated is a very important part of any successful identity theft protection program.

    Individuals should realize that it is their own responsibility to be attentive of the risks of identity theft and carefully monitor and take proactive actions to protect their personal information. While this may seem very simple, it is not always that easy. Tyler Moore from Harvard University and Richard Clayton from the University of Cambridge (2011) claim, “Despite the increase in online criminal activity, information on incidents and the losses caused by such crimes have largely remained hidden from public view’ (p. L).

    The pair claim that there are several reasons for this policy. “First, firms fear negative publicity which may arise if incidents are openly discussed. Second, some argue that disclosing information on incidents actually aids attackers more than it helps defenders” (Moore ; Clayton, 2011, p. L). The saying that knowledge is power tends to be very accurate when dealing with identity theft. Detailed knowledge of these crimes and how one can alleviate their own personal risks will drive a behavioral change among individuals.

    This education can be offered through an assortment of public service commercials, news and radio casts, articles in papers/magazines, and social media. Updating and empowering individuals on the identity theft development will result in an understanding of what the clear, actionable steps to take if they suspect their identities have been compromised. In addition to biblically benefiting the customers, Moore and Clayton (2011) tell us, “… Research suggests that policy Akers should encourage the publication of more information that can help the Internet’s defenders fix problems as they arise” (p. 6). It is very clear that hiding the identity theft epidemic will not achieve anything , public knowledge of the proper steps to protect their identity and the actions to begin identifying suspected identity theft will have a obvious impact on reducing this global issue. Assess how the principles of active citizenship affect Identity Theft Today, the Internet affects nearly every part in our lives and it is the responsibility of parents, educators and the communities to make certain that our children re safe and secure.

    The Internet’s very design is to be consistent on multiple systems and networks, which provides to its own security problems and safeguards. The ability of criminals to intercept pieces of personal information shared on social networking sites is frightening. Children are often naive to these risks, not fully understanding identity theft is not limited to adults and that they are often targeted for their clean credit records. Cyber criminals make use of social networking sites like Faceable, Misplace and even instance messaging to get your personal information.

    It us as parents, educators and communities accessibility to teach children of these dangers. The Internet can be an amazing resource, but as with most things in life, should be respected and used wisely. Children and the society in general must be taught the risks of releasing too much information online. Charlotte Change in her 2010 article in the Berkeley Technology Law Journal; Annual Review, Volvo. 25 Issue 1, INTERNET SAFETY SURVEY: WHO WILL PROTECT THE CHILDREN? Warns society that, “Teaching children about safe Internet practices and cautioning them against sharing too much information online will have lasting effects. Just as children learn to not take candy from strangers, they can also learn to not share personal information and about the wrongs of Internet harassment” (Change, 2011, p. 523). Ms. Change further goes on to say, “In May 2009, Senator Robert Maddened (D-NJ) introduced the School and Family Education about the Internet (SAFE Internet) Act. 49 The SAFE Internet Act would allocate $175 million over five years to educate children on Internet safety issues” (Change, 2011, p. 525). This multi- level echelon approach of educating our society is paramount to reducing the risks of identity theft. We all have a civic responsibility to educate our children. We are accountable for their failure to understand these principles. Open and direct dialogue from all levels will not only teach the risks of the identity theft predators but will develop into a role model for their lifelong framework of civic responsibility.

    It is these very principles of being an active citizen that will educate our children’s knowledge of the risks and protect them from these predators. Evaluate the relevance of your multimedia component Today, multimedia is vital facet in the lives and institutions of world citizens. In a recently published Forrester Forecast View report titled Forrester Research World Online Population Week 5 assignment Forecast (Global), 2012 To 2017 found that, “2. 4 billion people across the world use the Internet on a regular basis i. E. At least once a month ? from home, school, work, or any other location via a PC or a non-PC (mobile) Internet access device” (Migrant, 2012). The report goes on to state, “Internet use is expected to grow to 3. 5 billion users by 2017, representing nearly half of the 2017 expected overall world population of 7. 4 billion. ” The use of the Internet and social media rely is a world-wide function and expands across all continents, nations and countries. As these forms of communication and numbers of users continue to multiply, so are the security risks involved with using this technology.

    To fully understand the risks associated with social media and the Internet, it was my responsibility to comprehend the ramifications of not having a protected computer and home network. Kevin Haley, Symantec Director of Security Technology and Response presented a potash to highlight the vulnerabilities as identified by the Symantec Corporation during 2011. In the potash, Mr.. Haley emphasized, “… Attackers are shifting efforts to the social network arena, Mallard has skyrocketed to 5. 5 billion attacks, doubling the assaults from 201(Y’ (Haley, 2012).

    As the attackers are directing their efforts to social media, it is even more critical that we have a multi-tiered educational approach to mitigate these potential threats. Jacqueline Lipton expresses this vulnerability in her article, Combating Cyber-Visualization (2012). When discussing the risks of cyber-space, she writes, “Another unique feature of cyberspace is that it enables perpetrators to manipulate the victim’s identity online. Cyber-abusers can both impersonate their victims and can manipulate others’ reactions to their victims. Wrongdoers may engage in identity theft for financial purposes” (p. 14).

    By Week 5 assignment utilizing the latest antivirus and mallard software such as Symantec, reducing the amount of personal information released on social networking sites and being aware that attackers are waiting in cyber-land, Internet users can take full advantage of the wonders of the Internet while reducing the risks of an a attack. Conclusion The rapid expansion of Internet provides an endless source for information; over users must remain diligently to limit or secure their personal information. Users must ensure they are operating with current anti-virus software or assume the risk malicious attacks.

    I have highlighted the causes that make identity theft America’s number one white collar crime. With the prolific development of the Internet, one of the major roots of cyber-crimes and identity theft is the fact that technology has transformed at a much faster velocity than businesses and consumers are able to adapt. Experts in the field, whether they are voicing their opinion on individual responsibilities or as crime investigators, ell us the individual has more of an impact on protecting their identity security than any other entity.

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need a custom essay sample written specially to meet your requirements?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Internet and Assignment Identity Theft. (2018, Jun 18). Retrieved from

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper
    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy