Wednesday, May 6, 2020
Effects of Identity Theft on Social Networking Sites Free Essays
string(83) " are turning to the Internet to keep in touch with friends, family and colleagues\." This research is important because of the rowing risks of Identity Theft, as the blob sites and social networking sites Users population increase, Identity theft crimes also increases. This may help the students to focus on their studies, knowing that they are safe from Identity theft criminals because nowadays, social networking sites are used in sharing information that may help them in their studies. The study is concerned with the various personalities of the student, this is one way to release and expose their creativity to provide interactive materials in preventing identity theft. We will write a custom essay sample on Effects of Identity Theft on Social Networking Sites or any similar topic only for you Order Now This is to warn the Users about Identity Theft. This study is conducted for the users to be aware in these existing crimes. This can develop the values of an individual which shows care in their fellow users that can be a victim of identity theft. Being a contributor in decreasing the identity theft in social networking sites deserves honor in the country, it can be not as formal as expected, but it gives moral to the country. With this research, contributors started to be professionals by sharing their efforts and knowledge to help the country fight against Identity theft. Theft is an unusual act of human being which results too rime that intentionally creates huge problem in our society. Theft builds a serious damage in reputations and accounts in users of computer system, personal properties of users may and can be steal anytime by the fraudsters. Identity Theft is an epidemic which is rising in our society, it affects everybody even the newbie which are new users and adequate users, Criminals for many years improved materials to get easy access in stealing. Identity theft is a serious crime that defrauds millions of dollars from innocent victims. Identity Theft exists because of the advance ways of doing crimes which result to inhuman to inhuman nature act. There are instances that Identity Theft crimes are unrecognized by users thatââ¬â¢s why criminals are more pursuing the act of stealing that builds a broken system in our computer society. The effects of Identity Theft really change each and every member of Social Networking Sites, Identity Theft creates damage which is not limited in financial problems, and psychologically users were also affected because of the improper use of their identity that tends to destroy their reputation. Social Networking Sites were also affected; there would be less numbers of users because they are afraid of Identity theft which ends to break rules and security and system in Social Networking sites. If there are mounting problems for sure there would be more alternative solutions for their kind of increasing problem, through implementing rules and laws would be more accurate and flexible in building a strong security and social networking sites and other websites. Security operators and administrators in Internet will also play a big role in preventing and decreasing Identity theft. Since there are different kinds of Theft that are existing in our country, students must be aware in these existing crimes to prevent more hilarious situations. Technology was developed because of humans high intellectual abilities and they can create either epidemic crime of precautionary measures in existing crimes. Many people are innocent in fraudsters and criminals thatââ¬â¢s why they need to improve their knowledge when it comes to cautions about Identity Theft. Unimplemented laws result in increasing crimes thatââ¬â¢s why it should be release as soon as possible to prevent existing crimes. If we minimize Identity Theft there would be a solid computer system which can be attain through knowledge sharing to the users. Definition of Identity Theft Identity theft is a crime. Identity Theft and Identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another personââ¬â¢s personal data in some way that involves fraud or deception, typically for economic grain stated by the U. S. Department of Justice. With enough information about an individual, a criminal can take over that individualââ¬â¢s identity to conduct wide range of crimes like fraudulent use of telephone calling cards, or obtaining other goods or privileges which the criminal might be denied if he were to use his real name. Identity Theft is ââ¬Å"an absolute epidemicâ⬠, according to Robert Ellis Smith, a respected privacy author and advocate. It affects everybody, and there is very little you can do to prevent it and, I think, worst of all-?you canââ¬â¢t detect it until itââ¬â¢s probably too late. Some law-enforcement authorities call identity theft ââ¬Å"the fastest growing crime across the country right nowâ⬠. In fact, identity theft is the most called-about subject on the Privacy Rights Clearinghouses telephone hotlist. (http:// www. Identifying. Org/). In many cases, a victimââ¬â¢s losses may include not only out-of- octet financial losses, but substantial additional fi nancial costs associated with trying to restore his reputation in the community and correcting erroneous information for which the criminal is responsible. (http://www. ]justice. Gob/criminal/ fraud/websites/theft. HTML) Coming from the answer of Anna Marie Estonia, a sophomore IBIS student of PUT, Identity Theft is a form of stealing someoneââ¬â¢s identity in which someone pretends to be someone else by assuming that personââ¬â¢s identity, typically in order to access resources or obtain credit and other benefits in that personââ¬â¢s name. Therefore, the researcher concludes that Identity Theft is a Technological act of Theft, this involved High Technological objects Oriented Materials which are used in stealing. As our Technology develops many crimes were developed as well because of the improper use of internet and computer system. Identity Theft implies the low security in accessing internet and other online sites which can cause devastation in other users. Many cases were not yet settled with regards to this manner and many implemented subscriptions were in act to support the anti-Latinity Theft in Social Networking Sites which can help many recent and future users. The Concept of Social Networking Sites More and more, people are turning to the Internet to keep in touch with friends, family and colleagues. You read "Effects of Identity Theft on Social Networking Sites" in category "Papers" Social networking sites (SONS), make staying involved quicker, easier ââ¬â and more fun ââ¬â than ever before. However, Social Networking Sites have drawbacks. These relate to privacy. While you can protect yourself, you canââ¬â¢t control what others post about you ââ¬â a growing concern as employers are beginning to search out information about new and potential employees. As there are few erasers to fraudulent usage, there is significant risk of misrepresentation. A user should also monitor the terms of use for SONS ââ¬â they have been known to change without notice. People have also been known to become addicted, spending so much of their time on these sites that their real lives suffer. 5 minute Guide to Social Networking Sites) Social Networking sites are social network sites as web-based services that allow individuals to construct a public or semi-public profile within a bounded system; articulate a list of other users with whom they share a connection, and view ND traverse their list of connections and those made by others within the system. (http://]CM. Indiana. Du/via/iss ues/Boyd. Ellison. HTML) There are dating sites, friendship sites, and sites with a business purpose and hybrids that offer a combination of these. Globally, hundreds of millions of people have Joined one or more social sites. Whom. PCMCIA. Com) From the response of Noel Angelo Magellan, Social Networking Sites are more likely a virtual place where people in the world can communicate and interact with each other socially and as explained by Christine Marie Tyson, Social Networking ties are used for communicating our love ones in other places in the world, our long lost friends, used for worldwide meetings and many more. In short, communicating peopleââ¬â¢s lives to another person around the world. Example of this sites are Faceable, Twitter, Renee, Webb, mayday and many more. To sum it up, Social Networking Sites are made for the purpose of social interaction ââ¬â connecting and communicating with one another around the world through internet. Describing the Cases of Identity Theft Law enforcement agencies have developed new methods and new relationships to catch the bad guys in cyberspace. Some cases include Reshipping and Pushing. Reshipping is an operation in which conspirators or unwitting accomplices in the United States are hired to receive packages of electronic or other merchandise bought with fraudulent or stolen credit cards, and then repackages the merchandise for shipment, usually abroad. By the time the merchant finds out that the credit card was fraudulent, the merchandise is already in another country. Pushing is the act of attempting to steal passwords and financial information by posing as a trustworthy person or business in a seemingly official (spoofed) electronic communication. Daniel Larkin, Fighting Online Crime) It may seem that there are some countries like the United States and Australia which have already enacted laws that pertain to the prosecution of identity theft related crimes. The Philippines however, being one of the largest Faceable populations in the world -? is also one of the many countries without a law to protect its citizens from online identity theft. Clogging is one of the many online problems involving identity theft. A Kellogg is software that tracks your keystrokes and records them so that a hacker can go back later and see what sites you visited, what information you submitted and more. Gallopers work invisibly in the background and a re impossible to detect without security software. (www. Agro. H) As explained by Christine Marie Tyson, cases of identity theft nowadays can do anything like, chatting with strangers to get close with them, pushing, hack oneââ¬â¢s account in order to get some benefits of their victims, impersonates someone else in order to conceal their own true identity, getting somebody elseââ¬â¢s photos and information through social networking sites and portray or imitate the identity of the victim. To summarize the discussion, the one thing that all of these attacks have in common though is the very thing that binds social networks together: trust. We need to become far more aware of the value of our personal information and importantly the information we have about your friends. Effects of Identity Theft in Social Networking Sites The growing popularity of social networking sites (SONS) among the Internet users demands an introspection of personal and social behavior of human beings. Today 1. 5 billion people across the world have their profiles in social networking sites. SONS becomes a reason for anxiety and addiction. The beginning of social networking sites started to make contacts with people and build a network of healthy relationship in the society. But now it seems offering cyberneticsââ¬â¢s a great advantage to target victims. (International Journal of Business and Social Science) As stated by Risk Ferguson, Senior Security Adviser of Trend Micro, ââ¬Å"With explosive growth and user populations of this order itââ¬â¢s hardly surprising that these services also appear to be coming of age as attack platforms for cyberneticsââ¬â¢s. Web 2. With its user-generated, rich, interactive content and social networking with its interlinked trust-based networks of people and groups, offer cyberneticsââ¬â¢s great scope for leveraging the capabilities offered, both to disseminate traditional forms of mallard through new channels and also to carry out social engineering attacks for the purposes of target profiling or identity theftâ⬠. (http:// hosted. Personalities. Com/358216/affection/17 46500010/cybercafà ©/) Based on the answer of Paul Francis del Rosaries, ââ¬Å"It can affect the siteââ¬â¢s popularity. Some people would probably quit using the site if their image or identity were used in ways that they did not know about. The site would have reduced users which would also affect their income rate. Because social networking sites usually depends on how many users they have on their site for example is the ââ¬Å"Faceableâ⬠. â⬠To sum up, with limited government oversight, industry standards or incentives to educate users on security, privacy and protecting your identity, users are then exposed to identity theft and fraud. Additionally, these platforms have terabytes of confidential user information and are likely vulnerable to outside (or inside) attack. Although the issue is not yet in the mainstream conscious, it may well e sooner or later. Cyber laws have to be fortified with advancement of rules as if violators cannot escape committing a crime, at the cost of societal value. Ways on how Identity Theft can be avoided As with any crime, you canââ¬â¢t guarantee that you will never be a victim, but you can minimize your risk These are some of the tips that can make you and your family, safe on social networking sites : 1) Change the profile privacy now. Keep your information accessible only to people in your friend list. 2) Donââ¬â¢t post very personal information on the profile. It includes your email ââ¬Ëd, date of birth, contact number, mom address and information about your family members. Just like in the real world, it is not possible to completely protect oneself from a crime like identity theft. But there are many safeguards you can adopt to protect your identity. 1 Protect your wallet. Some people keep a lot of stuff in their wallet ââ¬â credit card charge slips, deposit slips, and all IDs, including their ASS and TIN cards. Minimize your risk by keeping items with personal information in a safe place home. 2. ) Protect your computer. Use anti-virus software, as well as firewall and anti- spare software. This will help deter criminalsââ¬â¢ efforts in stealing your personal information. Coming from the answer of Mark Angelo Menace, mostly, celebrities are the victims of Identity theft and it can be avoided in a form or way of privacy. Celebrities should have privacy in other aspects of their life. In the side of the poser or the theft, self-discipline is the best way to avoid this. Another is, other people can report cases like Identity theft. Overall, people should be contented on who they are and what they have and with that there will be no more cases like these. As a conclusion, these are many ways in minimizing Identity Theft; we Just eave to implement it and continue to maintain the security of our computer system. The simplest way in minimizing this increasing numbers on thieves in Identity theft crisis is by Just being responsible enough in our belongings. Minimizing Identity theft will lead to a better computer system. How to cite Effects of Identity Theft on Social Networking Sites, Papers
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.