Hackers and Identity Theft

Anonymous
timer Asked: Jun 19th, 2018
account_balance_wallet $5

Question description

should be about 2-3 detailed paragraphs. Double spaced. Use some references from below please

Hackers and Identity Theft

The use of technology has provided a convenience of which many individuals take advantage. Online banking, paying bills online, applying for credit cards online, and communicating via e-mail are all examples of using technology for convenience. In order to utilize many services through the Internet, you are required to enter varying amounts of personal information. To obtain an e-mail address, you may need to enter your name and date of birth. To complete a credit card application online, you may need to enter your social security number, income, place of residence, phone number, and much more. To engage in online banking, you have to allow much of your financial information to be available through the bank’s online banking site. Sharing personal information on the Internet increases your level of vulnerability to hackers. Hackers are individuals with increased computer skills who are able to access varying levels of information using computer systems.

For this Discussion, consider your comfort level with sharing personal information on the Internet. Think about whether your comfort level is influenced by a fear of your information being obtained by hackers. Then consider how the criminal justice system perceives hackers.

Post by Day 4 an explanation of how comfortable you are sharing personal information on the Internet. Then explain whether or not your comfort level is influenced by a fear of your information being obtained by hackers and explain why. Finally, explain whether or not hackers are perceived as serious criminals by the criminal justice system.

Be sure to support your postings and responses with specific references to the Learning Resources.

Read a selection of your colleagues' postings.

Respond by Day 6 to at least one of your colleagues' postings in one or more of the following ways:

  • Ask a probing question.
  • Share an insight from having read your colleague’s posting.
  • Offer and support an opinion.
  • Validate an idea with your own experience.
  • Make a suggestion.
  • Expand on your colleague’s posting.

Return to this Discussion in a few days to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.

Readings

  • Course Text: Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism.(3rd ed.). Upper Saddle River, NJ: Pearson.
    • Chapter 4, "Hackers"
    • Chapter 12, "The Investigation of Computer-Related Crime"
  • Article: Anderson, K. B., Durbin, E., & Salinger, M. A. (2008). Identity theft. Journal of Economic Perspectives, 22(2), 171–192.
    Retrieved from the Walden Library using the Business Source Complete database.
  • Article: Gilman, N. (2009). Hacking goes pro. Engineering & Technology, 4(3), 26–29.
    Retrieved from the Walden Library using the Academic Search Complete database.
  • Article: Haney, M. (2010). Triptech: Is it safe to surf? Condé Nast's Traveler, 45(4), 50.
    Retrieved from the Walden Library using the ProQuest Central database.
  • Article: Kanable, R. (2009). The face of identity theft. Law Enforcement Technology, 36(4), 28–33.
    Retrieved from the Walden Library using the ProQuest Central database.
  • Article: Kirchheimer, S. (2011). "They stole my name!" The Saturday Evening Post, 283(1), 32–35.
    Retrieved from the Walden Library using the Academic Search Complete database.
  • Article: Pilcher, J. (2010). Growing use of Twitter raises customer security concerns. ABA Banking Journal, 102(1), 27–28.
    Retrieved from the Walden Library using the Business Source Complete database.

Media

Tutor Answer

melissanursingExpert
School: University of Virginia

Attached. Bye!!!!

Running head: HACKING AND IDENTITY THEFT
1

Hacking and Identity Theft

Name
Institution

HACKING AND IDENTITY THEFT
Hacking and Identity Theft

Hacking and identity theft have become rampant since the day technology became
dominant in running businesses and was accepted widely. Such online transactions that demand
personal information and details do put people at risk in case their security systems are bridged. I...

flag Report DMCA
Review

Anonymous
Thanks, good work

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors