• Home
  • /
  • Topic
  • /
  • Crimes
  • /
  • Hacking
  • /
  • Increase Risk of Identity Theft Due to Higher Levels of Internet Use Research Proposal
Verified Document

Increase Risk Of Identity Theft Due To Higher Levels Of Internet Use Research Proposal

Related Topics:

¶ … identity theft due to an increase in Internet usage Identity theft is on the rise. This research paper will explore how the increased use of the Internet has made identity theft (once a relatively rare crime) extremely common. It will hypothesize that the use of online technology by a wider pool of individuals has contributed to the explosion of identity theft and also that the integration of social networking websites has facilitated identity theft. In the most recent comprehensive study conducted by the federal government on the crime: "federal identity theft convictions increased 26% in 2007 from the year prior...According to the 'Identity Theft Task Force Report,' as many as 1,534 people were convicted in 2006, and a year later, 1,943 were convicted nationwide on various identity theft violations" (Kravets 2008).

The use of the Internet has become integral to the functioning of daily life, spanning from connecting with work for telecommuters, doing online banking, making payments, shopping, as well as basic communication with friends and family. The opportunity to gain access to personal data has likewise exploded. The interlinked nature...

One much-talked about article by Mat Honan, writer for Wired magazine recently revealed how the author became a victim. "In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook" (Honan 2012). Critical security flaws and carelessness create a perfect storm for users. Honan blames himself to some degree for the hacking: "My accounts were daisy-chained together. Getting into Amazon let my hackers get into my Apple ID account, which helped them get into Gmail, which gave them access to Twitter" (Honan 2012). However, if a writer for Wired magazine is easily 'hacked,' this begs the question: what hope is there for far less technologically-savvy Internet users? Moreover, identity theft is growing increasingly sophisticated. While some identity thieves are petty criminals or persons who merely want to use identity theft for 'lol'…

Sources used in this document:
References

Honan, Mat. (2012). How Apple and Amazon security flaws lead to my epic hacking. Wired.

http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/

Kravets, David. (2008).U.S. identity theft convictions increase 26%, feds Say. Wired.

Retrieved: http://www.wired.com/threatlevel/2008/10/us-identity-the/
http://www.wired.com/images_blogs/threatlevel/files/id_theft_report_2008_final_version.pdf
http://finance.yahoo.com/news/pf_article_108711.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Identity Theft but He That
Words: 2933 Length: 10 Document Type: Term Paper

In one case in 2000, two-20-year-olds hacked into the Lowe's credit card mainframe from a white Pontiac Grand Prix parked outside a store, synching a single laptop to the wireless system that was meant for employees to use to locate products. The hackers, obviously to blame for the crime, played on the flaws of a computer system that should not have allowed for a security breach. While the same hackers

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Internet Gambling Consumers Industry and Regulation
Words: 9110 Length: 26 Document Type: Dissertation

Internet Gambling: Consumers, Industry, And Regulation Business Management Final Year Project Online gambling is a large and growing industry. Estimates from an industry consulting group indicate that as many as 2,000 firms worldwide are involved in offering a number of different types of online gambling, resulting in an estimated $25.4 billion in winnings and as much as twenty times that in revenue. Why is online gambling so popular, and what does this imply

Risk Minimization and Loss Prevention
Words: 16256 Length: 59 Document Type: Term Paper

Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison

Computer Ethics the Internet's Rapid
Words: 3784 Length: 10 Document Type: Term Paper

Clearly from this case and others there is a critical need for the development of safeguards on consumer data captured over the Internet, both of the opt-in (where the customer approves the data being captured) and the non-opt-in variety. An Explicit Requirement for Transparency and Ethical Use of Data Consumers have become increasingly concerned that their data, however acquired, will eventually be sold without their knowledge, eventually leading to the potential

Economic Impact of Online Identity
Words: 5767 Length: 20 Document Type: Thesis

The onus of who is responsible, the consumer, the private institutions, or even the government will come into question. A brief revue of the history of the credit card is also in order since the use of "plastic" money has certainly contributed to the identity theft crisis. Past and current legislation will be analyzed regarding this new crime in both its cyber and analog presentations. Lastly, an opinion and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now