quora
Nobody downloaded yet

Identity theft through the use of the internet and how businesses and people are affected by its continuous threats - Literature review Example

Comments (0) Cite this document
Summary
Introduction Even today, where every technology interrelated to Information technology involves the ‘.com’ phenomenon; Internet is relatively an evolving field, which is constantly changing. Extensive use of computing technology has aid different scale organizations to achieve targets…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Identity theft through the use of the internet and how businesses and people are affected by its continuous threats
Read TextPreview

Extract of sample
"Identity theft through the use of the internet and how businesses and people are affected by its continuous threats"

Download file to see previous pages In the end, the mission critical data is compromised, resulting in severe losses for organizations. Generally, the business functions and processes, which exist electronically and digitally within the organization needs to be protected. The people who use Internet, provides a lot of personal information on the Internet in order to perform banking, registration, subscription, purchasing a product or service. The personal information has enormous dimensions to get extracted and become vulnerabilities. One of the most common threats in the context of misusing personal information is identity theft A network dictionary demonstrate the concepts of Identity theft as “Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver’s license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials.” In order to protect identities of the customer, organization need to protect and manage identities. A good definition of identity management is illustrated in the network dictionary as “Identity Management is an integrated system of business processes, policies and technologies that enable organizations to facilitate and control their users’ access to critical online applications and resources while protecting confidential personal and business information from unauthorized users”. In the code of deferral regulations (CFR), identity theft is defined as a fraud that is conducted by using the identity information of another person without permission. Identity theft can also contribute to other crimes. For instance, identify theft is successful in document fraud, bank fraud, immigration fraud and in the form of burglary and robbery. Consequently, the challenges for eliminating identity theft including victimization, offending and prosecution rates, needs to be considered by the congress, as these threats are arising by the contribution of identity theft and related crimes (Finklea 2009). Online privacy policy is of great concern, when considering identity theft as privacy policies of some websites does not satisfy the users for disclosing their personal data. There is no undertaking from the website owner for securing the contents provided by the user online. This is one area, which needs research and improvement, in order to provide a mechanism of securing data privacy, policies that are implemented by web services to ease privacy concerns associated with information related to their clients and adhere to legislative measures. Moreover, this also involves the undertaking for personal data usage including, what organizations would do or not with the personal information of their clients. This is crucial as some websites may sell personal information of their clients to cyber criminals or other competitors in terms of cash. This personal information is substantial for online cyber criminals to extract and guess passwords and retrieve credit card numbers, once they break into the email account of users. In order to eliminate identity theft appropriate measures are required. Identity theft is categorized into two domains i.e. Physical identity theft and ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Identity theft through the use of the internet and how businesses and Literature review”, n.d.)
Retrieved from https://studentshare.org/gender-sexual-studies/1416277-identity-theft-through-the-use-of-the-internet-and
(Identity Theft through the Use of the Internet and How Businesses and Literature Review)
https://studentshare.org/gender-sexual-studies/1416277-identity-theft-through-the-use-of-the-internet-and.
“Identity Theft through the Use of the Internet and How Businesses and Literature Review”, n.d. https://studentshare.org/gender-sexual-studies/1416277-identity-theft-through-the-use-of-the-internet-and.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
An analysis on the foreign women's fashion magazines in China, and compare how do Chinese people appreciate Western magazines
A review of literature was conducted to provide a conceptual framework for interpreting the data collected and as a frame of reference for what is known and assumed about Chinese consumer culture and attitudes toward foreign women’s magazines. This chapter is therefore divided into five main parts: consumer culture in China; magazine readership in China with an emphasis on how Chinese women are reading/using and engaging with magazines; differences in readership along demographic lines; contents of magazines; and the relationship between magazines and consumption.
16 Pages(4000 words)Literature review
Culture and Identity
Communication becomes a form of culture and what it means to be a part of an identity (Carey, 3: 2008). Media and society then become intertwined with how different cultures are identified as well as the communication that is used with certain events. The ability to communicate through the use of images, as well as the form of content that is used, becomes the main concept in perceiving a message to others in society (Carey, 4: 2008).
11 Pages(2750 words)Literature review
Voice over Internet Protocol Security Vulnerability and Risk Analysis
The journey of communication has undergone number of steps and over period of time all those means have offered more compared to their predecessors. The late 20th century was seen as the time period where rapid development took place in the world of telecommunications.
4 Pages(1000 words)Literature review
Current themes in businesses
The article reveals that the workplaces of the Western world proclaim gender neutrality even while inhibiting gender discrimination. Female power in an organisation is a complex ideology, and all business organisations give more importance to male workforce than female.
3 Pages(750 words)Literature review
Research Question: How Can RyanAir maintain its dominance in the European low-cost airline market European low-cost airline ma
Introduction The nature of competitiveness of the global market place has been ha been changed significantly in the post-modern age of business environment. The intensity of the competiveness are increasing continuously and the in order to cope with the fierce competition, the existing firms are trying to gain a sustainable competitive advantage to secure a reliable amount of the revenue.
12 Pages(3000 words)Literature review
How does the western model of Internet Banking apply to Russia
Internet transactions are cheap and thus cost effective. Moreover, internet banking is an efficient for different customers. Internet banking allows customers to operate their accounts at their own convenience (Sadiq & Nassar 2008, p. 56). The numerous advantages of internet banking have contributed its increased growth.
10 Pages(2500 words)Literature review
Identity theft how it has affected societies way of life and reality
Focus will be given to the problems experienced by consumers and the business world and what policies are already in position to solve the issue and what kind of policies are required to counter the problem. One of the biggest concerns of
10 Pages(2500 words)Research Paper
Womens participation levels in sport and physical activity and how it is affected
Even, though, many people are aware of this factor, some groups rarely take part in these activities. There are a number of social and environmental factors that affect the participation in sports, for
3 Pages(750 words)Literature review
HOW IT SECURITY AND ROBUST TECHNOLOGY COMPROMISES PEOPLES FREEDOM AND HOW CAN PEOPLE, GOVERNMENT AND ORGANISATIONS ADAPT TO THESE CHALLENGES
A number of other scholars have related the aspect of privacy and transformations in society. Westin conducted privacy surveys in which respondents expressed their satisfaction or
10 Pages(2500 words)Literature review
How financial crisis affected businesses in the UK economy
UK, alongside USA, had also entered this financial crisis which disturbed one of the main hubs of global finance. The first big commercial bank that required an emergency funding from the
6 Pages(1500 words)Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Literature review on topic Identity theft through the use of the internet and how businesses and people are affected by its continuous threats for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us