StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Course Project-Research Proposal - Assignment Example

Cite this document
Summary
2) Working thesis: Working thesis: Identity theft has been skyrocketing be it to organizations or upon individuals, which means that victims are uninformed of how they can protect themselves from victimization
3) Angle: Millions people and uncountable organizations are becoming…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Course Project-Research Proposal
Read Text Preview

Extract of sample "Course Project-Research Proposal"

Identity Theft First of Proposal for Identity Theft I. Introduction A. Topic Research question: Is there anything that identity thief potential victims can do to protect themselves from attackers? 2) Working thesis: Working thesis: Identity theft has been skyrocketing be it to organizations or upon individuals, which means that victims are uninformed of how they can protect themselves from victimization3) Angle: Millions people and uncountable organizations are becoming victims of identity theft every year.

Although government relevant agencies are working towards curbing the recurrence of these incidences, the rates are still alarming and very little is being done towards enlightening the masses how to protect themselves. Citizens have a right to be protected by their respective governments from such fraudulent individuals but they also have a responsibility to take all the necessary precautionary measures to minimize their exposure to identity theft.B. Context1) Having one’s identity taken away by individuals with wrong motive is one of the most difficult things for the individual to deal with.

It could interpret to inability to pay bills or even worse, inability to obtain credit besides exposing the person to more destructive eventualities.2) Although am not an expert in the field of identity theft, it is self-evident that everybody is a potential victim of such occurrences. This implies that it is necessary for all to be equipped with the appropriate information on how to deal with such modern realities. Through the exploration of some experts’ work within the field of identity theft, I am able to establish my credibility in responding to the issues surrounding identity theft.

Such experts include Saleh (2013), Mulig, Smith and Stambaugh (2014), and Biegelman (2002). C. Audience1) The primary audience for this study will be organizations’ management teams and other individuals who are potential victims to identity theft. 2) My secondary audience will be my professor in this course as well as fellow classmates, some of whom have been victims of identity theft and who would desire greater exposure on precautionary measures to protect themselves from such future recurrences. 3) Except for some few individuals who believe there is nothing much one can do to protect themselves from identity thieves, majority of my audiences share in my school of thought that it is possible to create a wall between oneself and such fraudulent individuals.II. Evidence A.

Research collected so farFrom exploration of a number of literatures, it is evident that identity theft is often a crime of opportunity, which implies that precautionary measures can go a long way in reducing risks. Most of the attacks have been made possible because of negligence and loopholes created by the victims themselves, thus they have a significant role to play in ensuring that they are safe. B. Research to be collected It is a fact that both technology and hackers are becoming more sophisticated as time goes by.

I will seek to understand how managements and individuals can employ more advanced protective measures to reduce their chances of being victimized by identity thieves. I will also explore the various experts’ opinions on possibility of establishing a wall to ensure that organizations and individuals are safe from the reach of identity thieves. III. Conclusion I believe that everybody is vulnerable to hackers of modern day who sometimes uses one’s identity for fraudulent purposes. Although the government has a responsibility to protect its own people from such fraudulent individuals, its capacity is limited and sometimes it necessitates the potential victims to respond appropriately to protect themselves.

The crime of identity theft is often opportunistic, thus the stakeholders are able to initiate measures that can ensure that the exposures are minimal and the risks lowered. The objective of this project will be to advance this course and to authenticate the validity of these statements. IV. ReferencesBiegelman, M. (2002). Identity Thief handbook. Detection, Prevention and Security. New York, NY: John Wiley & Sons. Mulig, E., Smith, M., & Stambaugh, C. (2014, December). Identity Hack! Is Your Company Next?

Strategic finance, 33-39.Saleh, Z. (2013). The Impact of Identity Theft on Perceived Security and Trusting E-Commerce. Journal of Internet Banking and Commerce, 18(2), pp. 1-11.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Course Project-Research Proposal Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/english/1683897-course-project-research-proposal
(Course Project-Research Proposal Assignment Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/english/1683897-course-project-research-proposal.
“Course Project-Research Proposal Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/english/1683897-course-project-research-proposal.
  • Cited: 0 times

CHECK THESE SAMPLES OF Course Project-Research Proposal

Why the Population Is Vulnerable

Of course, the first challenge that causes vulnerability within the context of language barriers lies in the fact that the rest of the Americans use the USA version of English.... Health Science and Medicine Name: Institution: Outline 1.... Description of why the population is vulnerable 1....
7 Pages (1750 words) Research Paper

Diabetic Health Education

This document is a proposal on the implementation of education in diabetes control and management.... Wellstar Cobb clinic has designed a proposal that will foster education in the region and minimize the adverse effects of diabetes disease in Cobb County.... Diabetic Health Education Name: Instructor: course: Date: Abstract Diabetes is a dangerous disease thus people should take interest in getting the basic knowledge on ways in which it is acquired, prevented and how a patient diagnosed with this disease can manage to live a normal life....
7 Pages (1750 words) Research Paper

Lubricator for Gas Generators

proposal to Research and Develop Lubricator for Gas Generators Faisal Abdullah Indiana State University Author's Note I would like to thank [ Professor Name ] for providing unwavering support and cooperation during various stages of this project.... 18 Hypothesis 19 Solution proposal Method 19 Mechanisms of the Task 19 RCA.... 14 Table 2 - Lubrication feed rate used for experimentation 23 Table 3 - Lubrication feed rates and the corresponding MTBF 25 proposal to Research and Develop Lubricator for Gas Generators Natural gas serves as a cheap fuel alternative to the more expensive diesel, gasoline, kerosene, light fuel oil (LFO) and heavy fuel oil (HFO)....
14 Pages (3500 words) Research Paper

Investment Appraisal Techniques

The paper "Investment Appraisal Techniques" describes that such аs the quаlity of the mаnаgement teаm аnd the nаture of the product аnd the mаrket is not used directly in the vаluаtion process.... nbsp;It hаs been shown thаt the mаnаgeriаl skills аnd the nаture of the product mаrket....
8 Pages (2000 words) Research Paper

Disaster Relief

??2 In other words, every action by the government's three branches – the executive, legislative and judicial – is governed by a pre-determined course of action.... Each year, the world's superpower is besieged by disasters, natural or otherwise.... For the year 2010 alone, the Federal Emergency Management Agency (FEMA) has recorded… Before disaster strikes, when possible as in the case of typhoons and hurricanes, and its resultant flooding, the government is there to issue warning and evacuate people from the danger zones....
10 Pages (2500 words) Research Paper

Costs, Benefits and Ethical Issues

Discuss the costs, benefits, and ethical issues proposal proposal Approval and Rejection Word Count: 513 (2 pages) Approve or disapprove each proposal and provide your reasons such as costs, benefits and ethical issues raised in relation to your recommendation to Approve or Disapprove.... This proposal was summarily rejected due to the fact that the study would not measure what it is supposed to measure (i.... Here, a proposal and the cost, the experimental group and the benefits of such a test, and the control group and the ethics of the experiment—were all examined in an attempt to decide whether to approve or reject the proposal....
3 Pages (750 words) Research Paper

Mechanical Engineering Analysis and Techniques for a Diesel Engine Mechanical Systems

The present paper seeks to present a design of a Car diesel engine with an improved (electronic) cooling system in order to provide an efficient engine temperature control which ultimately leads to enhanced fuel efficiency as well as reduced carbon emissions.... hellip; After thorough scrutiny, they planned this project is a manner that it will be simple to understand....
8 Pages (2000 words) Research Paper

The North-South Water Pipeline for Australia

The climatic predictions, together with the existing water pipelines across the country have led to the proposal of the idea of water transportation from Northern Australia to Southern Australia using the pipelines.... The main aim of the research paper 'The North-South Water Pipeline for Australia' is to analyze the risks involved in the North-South Australian water pipeline using the AS/NZS framework....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us