Hackers and Identity Theft, Personal Info, science homework help

User Generated

xnz19

Science

Description

Hackers and Identity Theft

The use of technology has provided a convenience of which many individuals take advantage. Online banking, paying bills online, applying for credit cards online, and communicating via e-mail are all examples of using technology for convenience. In order to utilize many services through the Internet, you are required to enter varying amounts of personal information. To obtain an e-mail address, you may need to enter your name and date of birth. To complete a credit card application online, you may need to enter your social security number, income, place of residence, phone number, and much more. To engage in online banking, you have to allow much of your financial information to be available through the bank’s online banking site. Sharing personal information on the Internet increases your level of vulnerability to hackers. Hackers are individuals with increased computer skills who are able to access varying levels of information using computer systems.

For this Discussion, consider your comfort level with sharing personal information on the Internet. Think about whether your comfort level is influenced by a fear of your information being obtained by hackers. Then consider how the criminal justice system perceives hackers.


Post by Day 4 an explanation of how comfortable you are sharing personal information on the Internet. Then explain whether or not your comfort level is influenced by a fear of your information being obtained by hackers and explain why. Finally, explain whether or not hackers are perceived as serious criminals by the criminal justice system.



One and a half page with at least two reference....


It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the readings for this class

To get maximum points you need to follow the requirements listed for this assignments 1) look at the page limits 2) review and follow APA rules 3) create subheadings to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.




Readings

  • Course Text: Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson.
    • Chapter 4, "Hackers"
    • Chapter 12, "The Investigation of Computer-Related Crime"
  • Article: Anderson, K. B., Durbin, E., & Salinger, M. A. (2008). Identity theft. Journal of Economic Perspectives, 22(2), 171–192.
  • Article: Gilman, N. (2009). Hacking goes pro. Engineering & Technology, 4(3), 26–29.
  • Article: Haney, M. (2010). Triptech: Is it safe to surf? Condé Nast's Traveler, 45(4), 50.
  • Article: Kanable, R. (2009). The face of identity theft. Law Enforcement Technology, 36(4), 28–33.
  • Article: Kirchheimer, S. (2011). "They stole my name!" The Saturday Evening Post, 283(1), 32–35.
  • Article: Pilcher, J. (2010). Growing use of Twitter raises customer security concerns. ABA Banking Journal, 102(1), 27–28.

    Media

    • Article: Katel, P. (2005). Identity theft: Can Congress give Americans better protection? CQ Researcher, 15(22), 517–540.
          
    • Article: Study reveals consumers’ data worries. (2005). Information Management Journal, 39(5), 16.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Running Head: HACKERS AND IDENTITY THEFT

Hackers and Identity Theft
Institution Affiliation
Date:

1

HACKERS AND IDENTITY THEFT

2

Introduction
The advancement in computers and technologies used in communications has led to a
widespread usage of computers in almost every aspect of life in the world (Marek and ALA
TechSource, 2011). Computers today are associated with every societal facet which includes the
law enforcement, financial and commercial industries, health institutions, education facilities as
well as the government body. Moreover availability of internet services has also contributed to
the spread of computer use by individuals at home. However due to the increasing access to the
internet by individuals, computers create opportunities ...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags