StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Summaries of the Articles about the Computing Enviroment - Term Paper Example

Cite this document
Summary
The "Analysis of the Articles about the Computing Environment" paper contains the summaries of articles such as "Anonymous Attacker" by Hurst, " Survey reveals our identity theft fears" from Alpha Galileo 2010. Then the author examines identity theft in the UK…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Summaries of the Articles about the Computing Enviroment
Read Text Preview

Extract of sample "Summaries of the Articles about the Computing Enviroment"

Summaries of chosen articles One of the article contains detailed information about mainly all the aspects of identity thefts; ranging from the preventions that should be taken to avoid the occurrence of identity thefts to the perspective of the authorities to handle the crime. Hurst (2009) terms the criminal as the ‘anonymous attacker’ and states some real life cases of individuals who have become victims of such criminals. This article points out the different techniques that are commonly adapted by the intruders and the appalling figures that are being witnessed nowadays regarding the respective crime in UK. Hurst, P 2009, Anonymous Attacker, CIFAS, viewed 12th October 2010, Another literature that has been chosen for the respective research is a guideline for the insurance of identity theft (Defaqto Media 2010). This text explains how identities can be stolen even when an individual is very cautious about revealing his personal information. This guideline identifies the following techniques by which identity may be stolen of the internet users, as well as others; intercepted postage mail, stolen handbags and online activities. It also gives information about the different insurance policies that have been formulated to handle identity thefts. Defaqto Media 2010, Identity theft insurance guide, viewed 14th October 2010, The third chosen article highlights a study that was conducted by Royal Holloway, University of London (Alpha Galileo 2010). The study analyzed the concerns and worries of individuals regarding their experience on the internet. The results showed that the most feared crime on the internet is of identity theft in UK. The sample consisted of around 1048 respondents therefore this data also proved to be a useful source of information about the demographics of the average internet user in UK. Alpha Galileo 2010, Survey reveals our identity theft fears, Royal Holloway, University of London, Mcafee is one the most prominent security providers in the world of computing, who offer products like anti-viruses etc. A comprehensive article was published by them in 2010; it provides useful facts about the intensity of the problem in UK and how people lose large amounts of money due to this crime. This article also revealed surprising facts about the identity theft of children, as young as six years old. Mcafee Inc., 2010, What you need to know to avoid identity theft, viewed 12th October 2010, During the research study of the respective topic, an article was found that stated an instance of laptop theft from University of Kentucky, in August this year (Herald, 22 August 2010). The laptop had detailed data about the patients in a certain department. Around 2000 individuals got affected by this theft and were directed to be cautious of any identity theft incidents. This article highlights the need to keep information safe and monitored under some kind of supervision to avoid such cases of theft. Herald, 2010, Identity-theft warning issued after UK patients records stolen, 22 August. The last article that has been chosen for the research topic is the latest news on the respective crime in UK (Guardian, 11 October 2010). The article warns homeowners to be vigilant about their property statuses since imposters, fraudsters are attempting to sell off or mortgage properties by stealing identities. This article also outlines few steps that can help individuals to avoid such undesirable instances. Mark, K 2010, ‘Homeowners warned to be vigilant as identity and registration fraud rises’, Guardian 11 October Identity Theft in UK Abstract The integration of internet in the lifestyle of humans has made personal data vulnerable to attacks. The access to such sensitive data has become easier with the technological trends. It is due to this reason that identity thefts have become a global problem. UK is also one of the regions of the world that is affected by this crime and the respective crime is increasing at an alarming level. Precautions should be taken at the organizational as well as individual level to mitigate the problem. 1. Introduction The advent of computers has changed the lifestyles of individuals to a great extent, in almost every walk of life. Computers caused revolutionary changes in the field of business, education, medicine etc. Then, the inception of internet made life more convenient and fast-paced due to the removal of geographical barriers of communication. Internet made the whole world come closer like never before but also invited crimes that had never been experienced by people. Internet has become the hub of information; academic as well as personal. Internet offers services for which people have to reveal their personal information. All major businesses and organizations have online presence due to which their customer’s information is accessible through the internet. This level of technical integration in our lives has created temptations for the criminals to maliciously use this data for their own inappropriate purposes. Identity thefts, credit card frauds, social security numbers stealing are some of the most common internet crimes of the modern world. 2. Identity Theft Identity theft is defined as the usage of someone else’s personal information for one’s own benefit. The impostor might pose to be someone else for some financial gains, getting sanctioned for a loan or mortgage etc. The nature of modern computing has introduced numerous forms of online services like banking, online shopping, education etc. This causes dispersion of personal information around the internet and thus makes it vulnerable. Mcafee Inc (2010) stated that once the information is revealed to some company, it is up to the concerned authorities to safeguard it against malicious intent. 2.1 Phishing In the last section, the reason for identity theft was given as the dispersion of personal information at numerous sources that might not be given the highest level of security. Another common attempt to gain personal information of an individual is called ‘phishing’ in technological terms. Defaqto Media (2010) stated that online scammers obtain email addresses from different data sources and send scam emails which have the look of real, professional emails. The content of the emails may be the announcement of winning a lottery or the update of personal information in the individual’s respective bank. The recipient might reply to the email consisting of his personal details with the viewpoint that it is a part of routine bank processes. The scammers replicate the official layouts of the original documents and obtain similar email aliases to make the email look genuine. The personal details of the individual might be used to make online transactions, earn good loans or mortgages etc. 2.2 Intensity of the Issue in UK A report by CIFAS (Hurst 2009) published the increase in identity as much as 36% in the year of 2009 in UK, as compared to the previous years. According to a research conducted by Hurst (2009); £463 is the amount that is stolen from an average victim of identity theft. The following table shows the number of victims with respective to different postcodes in UK: Figure 1: Number of victims w.r.t postcodes in UK in 2009 (till Sept) (Hurst 2009) According to the figures given by Federation of Small Businesses (2009); almost 54% of the businesses have been affected in the year of 2008 by identity frauds, 37% individuals have fallen victims of phishing emails. Another survey conducted by the same organization stated that around £2.61bn were stolen from UK citizens in 12 months from Aug 2008 to July 2009. Information Security Group (ISG) at Royal Holloway, University of London conducted a study about the concerns that people have regarding the revelation of their information on the internet (Alpha Galileo 2010). The sample of 1048 respondents gave their feedback that identity theft was the most feared crime on the internet. Identity theft requires much attention of the government and individuals since it leads to serious crimes like opening a bank account in someone else’s name or selling someone’s house with the help of fake documents. Mark (2010) notified that the Land registry and Law Society have recently combined their efforts in UK to fight the identity fraud and theft instances in the selling and purchasing of properties. This article pointed out that the homeowners who did not live in the country have an increased risk of such identity frauds. With the passage of years, identity theft has caused much damage in UK. It is due to this reason that authorities and organizations have become more cautious than ever. University of Kentucky publicly apologized to its patients in June this year when one of their laptops were stolen from the premises of their respective hospital (Herald, 22 August 2010). The laptop contained records of around 2027 patients who were notified about the incident and advised to be alert about any identity thefts and fraud incidents. 2.3 Strategies to address the problem Hurst (2009) provided some precautionary steps that should be taken to avoid identity theft on the internet: Protect ones computer by deploying firewall and installing anti-virus software Passwords should be kept very safe and private. If personal information is being provided to a website then it should be ensured that the website is safe and reliable. Email attachments should only be downloaded if the source is authentic or known by the user. Companies and banking institutions need to deploy more reliable measures for the security of the data so that identity theft cases can be minimized. Customers should be vigilant about their bank accounts and credit card statements to ensure that no one else is utilizing their resources. Some authorities and business organizations have become more aware about the concept and crimes of identity theft therefore they are more attentive towards this cause. Many online services are making use of latest technologies to inhibit this crime. One of the most successful technologies is geo-location; this technology informs the respective organization about the location of the online customer (Gueye, Ziviani, Crovella and Fdida 2006). The company matches the current location of the customer with the demographics of his credit card details. For example; if a credit card from London is being used in an online transaction from the interior areas of Iran then an alarm should be raised. If such a contradiction arises, the transaction is declined and the attempt of identity fraud is avoided. Similar developments are being witnessed in the field of detecting identity fraud and promise a bright and safe future for the companies as well as individuals. 3. Conclusion The crime of identity theft has marked its presence around the globe therefore it is also found in UK at a great frequency. During the research process, it was discovered that identity theft is increasing in UK at an alarming level. Personal identity should be considered as valuable as one’s assets and properties and hence not disclosed to any unauthentic or unreliable source. Geo-location is one of the latest and reliable technologies to handle the detection of the crime of identity theft. References Alpha Galileo 2010, Survey reveals our identity theft fears, Royal Holloway, University of London, Defaqto Media 2010, Identity theft insurance guide, viewed 14th October 2010, Federation of Small Businesses, 2009, Inhibiting Enterprise: Fraud and Online Crime Against Small Businesses, ISBN: 978 0 906779 95 8 Gueye, B., Ziviani, A., Crovella, M., Fdida, S 2006, ‘Constraint-Based Geo-location of Internet Hosts’, IEEE/ACM Transactions on Networking, Vol. 14, No. 6. Hurst, P 2009, Anonymous Attacker, CIFAS, viewed 12th October 2010, Herald, 2010, Identity-theft warning issued after UK patients records stolen, 22 August. Mcafee Inc., 2010, What you need to know to avoid identity theft, viewed 12th October 2010, Mark, K 2010, ‘Homeowners warned to be vigilant as identity and registration fraud rises’, Guardian 11 October, Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Summaries of the Articles about the Computing Enviroment Term Paper, n.d.)
Summaries of the Articles about the Computing Enviroment Term Paper. https://studentshare.org/information-technology/1742932-the-computing-enviroment
(Summaries of the Articles about the Computing Enviroment Term Paper)
Summaries of the Articles about the Computing Enviroment Term Paper. https://studentshare.org/information-technology/1742932-the-computing-enviroment.
“Summaries of the Articles about the Computing Enviroment Term Paper”. https://studentshare.org/information-technology/1742932-the-computing-enviroment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Summaries of the Articles about the Computing Enviroment

Pronunciation Accuracy: A Sociolinguistic Investigation

The author proffered issues relative to the thrusts of TESOL Quarterly with three identified trends, to wit: (1) a continuation along the earlier lines of progression; (2) a radical reorientation along new paradigms; and (3) unresolved debates and questions about the direction in certain domains (Canagarajah, 2006, p....
10 Pages (2500 words) Article

10 environmental science articles

In 2008,twelve orphan chimpanzees were released back into the wild after being equipped with GPS tracking devices attached to collars....
9 Pages (2250 words) Article

The Myth of Secure Computing by Austin and Christopher

Austin and Christopher in their article, “The Myth of Secure Computing”, inform about the state of digital security in companies nowadays.... Austin and Christopher in their article, “The Myth of Secure Computing” (2003), inform about the state of digital security in companies nowadays.... The Myth of Secure computing.... The IT staff should be well equipped with all concerned knowledge about IT state of the company and required security measures....
2 Pages (500 words) Article

Questions about election maps

Such maps use the computer interface Questions about election maps Inserts His/her Inserts Inserts Grade (December 03, -Outline-Introduction-Discussion of types, variables and the effectiveness of each map-ConclusionA map refers to either a digital or static representation of an actual object thus depicting a model environment....
1 Pages (250 words) Article

Neutrality as Impartiality & Neutrality as Equidistance

hellip; This article is about a study that tested whether, in a social conflict, a party follower does influence decisions of judgment & trustworthiness in mediation....  It then talks about accountability or the need to keep the mediation in private to protect post-negotiation matters.... 8) This article is about a study that tested whether, in a social conflict, a party follower does influence decisions of judgment & trustworthiness in mediation....
7 Pages (1750 words) Article

Cloud Computing and the New Economics of Business

This article "Cloud computing and the New Economics of Business" discusses Hugo that incorporated some of the innovation theories where sustained success is attained through the change, innovation, and adaptation of organizations.... Therefore, CIO has enabled convenient and ubiquitous on-demand access of the network to configurable computing resources such as services, storage, and also networks.... Hugo states that Internet technology is facilitating the revolution of economies and in particular cloud computing....
1 Pages (250 words) Article

History, Honesty, Whiteness, and Blackness by Lillian Holt

The paper "History, Honesty, Whiteness, and Blackness by Lillian Holt" observes the article that was the keynote addresses in a conference themed 'Historicising Whiteness: Transnational Perspectives on the Construction of an Identity which was hosted in the University of Melbourne.... hellip; In any multi-racial nation, interracial relations constitute an important national discourse that is worth interrogating especially when one race has a bearing over the other as they go down in the annals of history as a critical aspect of that nation and offers insights on nation-building....
9 Pages (2250 words) Article

The Management Philosophy of Edwards Deming

Though this battle has raged for most of the last century, Perrow concluded that we have learned more about what does not work than what works.... The paper "The Management Philosophy of Edwards Deming" describes that the widespread tendency of many managers (and academics) to latch on to what is tangible and relatively easy to implement (such as tools) suggests little in the way of fundamental change....
19 Pages (4750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us