StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Credit Card Theft and Identity Theft - Essay Example

Cite this document
Summary
The paper "Credit Card Theft and Identity Theft " describes that it has been observed that the advancement of political debate is indeed a positive development, however; the recognition of tools for conducting the activity is integral towards deciding whether hacktivism should be penalized…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Credit Card Theft and Identity Theft
Read Text Preview

Extract of sample "Credit Card Theft and Identity Theft"

The integration of information technology has emerged as a significant element of individuals’ lives in today’s world and the influence of various computer technologies is such that not only does it encompass the social spectrum of human life as represented by the use of social media to interact but also extends to conducting economic activities through e-commerce platforms and making financial transactions through online banking services. The references to preceding examples only represent a narrow perspective of the scenario as information technology today is primarily incorporated within several aspects of society. The identification of this factor raises concerns regarding the impact and possibility of crime and criminal activity with regards to the availability of information on technological platforms. Moreover, this concern also extends to recognizing the need to establish frameworks for governing technological channels for protection against the threat of criminal interference. Thus, this essay examines the issue of crime within the broader spectrum of computer sciences and information technology. The analysis which has been conducted in this discussion focuses upon exploring two critical aspects of crime by highlighting fundamental issues concerning hacking, identity theft and credit card theft. In conclusion, the paper focuses on conducting an assessment of the legal structures which can aid in the development of effective solutions for the issues which have been highlighted. This examination encompasses developing an understanding regarding the laws and ethical dilemmas concerning crime and the cultural implications of the problem. According to Bossler and Burruss (2010), the historical context of hacking presents a conflict with the context in which the term is used currently as the coinage of this earlier terminology as pertaining to earlier hackers only aimed to highlight groups or individuals who were able to devise far-reaching and exceptional uses of technology which were different from the manner in which common users were using the same technology. Moreover, the historical purposes of hacking were linked with following a standardized code of morals and ethics which governed the participation and involvement of hackers in any activities. This code comprised of promoting beliefs regarding ensuring 1) free, comprehensive and widespread access to knowledge 2) working towards developing ways to use technology for enhancing quality of life 3) choosing not to follow the instructions or orders of any authoritative figures and 4) demonstrating tendencies reflecting the acceptance of new and unconventional ideas (Bossler and Burruss 2010, p. 40). In the present circumstances they key differentiating factor between earlier hackers and present hackers remains in intent and motives behind their actions for launching or participating in a specific activity. While, earlier hackers who engaged in the exploration of multiple networks and systems initiated such ventures to acquire a better understanding of technology and also for the purposes of devising strategies for advancing the scope of technology, the scope of hacking in the current context is linked with malicious objectives and goals (Bossler and Burruss, 2010). Despite of the growing concern that the agenda behind modern hacking is linked with a breach of security codes and guidelines in addition with an invasion of privacy, it should be noted that there are multiple perspectives which can be explored with reference to this issue. In her research, Stan (2004) explores the perspective of hacktivism and how it has been employed as a tool to influence political debate and participate in the political landscape. Hacktivism essentially represents the use of either legal or illegal means to progress towards the attainment of a specific political motive. It is important to understand that the realm of hacktivism may or may not achieve a particular objective by using means which have been defined as legal. The illegal means which may be utilized to progress an initiative linked with hacktivism may include hacking official or .gov websites and portals to spread a particular message or access archived data while, legal means encompass the development of software and applications which feature political message and prompt individuals to think and act (Samuel, 2004). Moreover, it should also be noted that hacktivist tools which breach the sphere of law are not limited to securing accessing to websites and also relates to the theft of information. The identification of this element of technological crime sheds light on a significant concern for practitioners and analysts who aim to develop and launch frameworks for increasing the security of online and computer channels for data storage. Consumer protection has emerged as a critical topic of discussion when assessing the scope of the integration of technologies to conduct and combat criminal activity. As noted by Milne, Rohm and Bahl (2004), it has emerged that the demonstration of specific online behaviors by consumers can increase or decrease the possibility of exposure to identity theft. The recognition of behavioral factors which distinguishes consumers on the basis of the likelihood of their exposure to online identity theft certifies that by exercising awareness and privacy control, consumers can play a critical role in protecting themselves against becoming the victims of crime. The examination of online behaviors and characteristics in defining the probability of becoming a victim of credit card theft is also linked with the manner in which an individual has devised an online lifestyle and how often he/she uses online channels to carry out financial transactions through the use of a credit card. According to Reisig, Pratt and Holtfreter (2009), exercising caution and concern is a key factor which distinguishes whether a consumer is expected to become exposed theft or not. This notion essentially states that consumers with an impulsive behavior when conducting transactions often fail to understand the terms and conditions of use and maybe more willing to provide their financial information upon request in comparison with rational and vigilant consumers. Other strategic actions to cope with the possibility of becoming a victim of credit card theft includes limiting the number of purchases made online, reviewing the reputation of online seller before disclosing information and assessing various options for making the purchase prior to the release of information (Reisig, Pratt and Holtfreter, 2009). The discussion which has been conducted in this essay focuses on outlining a range of issues concerning crime and how information technology may be utilized to engage in delinquent and illegal activities. However, it should be noted that a comprehensive analysis of a range of issues represents that it is important to distinguish between the legality of the scenario. For example, in the cases of hacktivism it has been observed that the advancement of political debate is indeed a positive development however; the recognition of tools for conducting the activity is integral towards deciding whether hacktivism should be penalized. The development of software, applications and the management of forums and blogs which aim to increase political awareness should be welcomed however; the defacement of official government websites and portals must be addressed under legal frameworks. The extent of credit card theft and identity theft represents a range of issues in assessing online crime whereby, raising consumer awareness can play a critical role in aiding the reduction of the activities and its implications. The critical features surrounding this issue are concerned with the cross border implications of the action as online channels allow consumers to participate in financial transactions on a global scale. This implication highlights the significance of developing cooperation between authorities for aiding the resolution of issues which have victims living in territories other than the perpetrator; this aspect also raises concerns regarding the cultural and ethical consequences of the crime which must be addressed to guide practical research on the topic. References Bossler, A. M., & Burruss, G. W. (2010). The general theory of crime and computer hacking: Low self-control hackers. Corporate hacking and technology-driven crime: Social dynamics and implications, 57-81. Milne, G. R., Rohm, A. J., & Bahl, S. (2004). Consumers’ protection of online privacy and identity. Journal of Consumer Affairs, 38(2), 217-232. Reisig, M. D., Pratt, T. C., & Holtfreter, K. (2009). Perceived Risk of Internet Theft Victimization Examining the Effects of Social Vulnerability and Financial Impulsivity. Criminal Justice and Behavior, 36(4), 369-384. Samuel, A. W. (2004). Hacktivism and the future of political participation(Doctoral dissertation, Harvard University Cambridge, Massachusetts). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Credit Card Theft and Identity Theft Essay Example | Topics and Well Written Essays - 1250 words - 1, n.d.)
Credit Card Theft and Identity Theft Essay Example | Topics and Well Written Essays - 1250 words - 1. https://studentshare.org/information-technology/1841108-crime
(Credit Card Theft and Identity Theft Essay Example | Topics and Well Written Essays - 1250 Words - 1)
Credit Card Theft and Identity Theft Essay Example | Topics and Well Written Essays - 1250 Words - 1. https://studentshare.org/information-technology/1841108-crime.
“Credit Card Theft and Identity Theft Essay Example | Topics and Well Written Essays - 1250 Words - 1”. https://studentshare.org/information-technology/1841108-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Credit Card Theft and Identity Theft

The Internet: Mainstream of America

hellip; One of these problems is identity theft.... identity theft has greatly increased with people using their personal information over the internet.... When people buy something online with a credit card or use any personal information online, no matter how secure the site says it is, there is a chance of identity theft.... One of these problems is identity theft.... identity theft has greatly increased with people using their personal information over the internet....
2 Pages (500 words) Essay

Identity Theft: Problems and Solutions

One of the biggest misuses is the fraudulent act of identity theft.... The next section aims at explaining what identity theft means furthering which the problems are touched upon.... The loss and misuse of personal identification information is called identity theft.... The Internet identity theft differs from the normal form of identity theft in a number of ways.... This report aims at The main focus is on the theft of identity using computer....
4 Pages (1000 words) Essay

Identity Theft

identity theft is a serious and new crime that the legal system is currently grappling with.... identity theft identity theft is a serious and new crime that the legal system is currently grappling with.... Criminals use identity theft to open up new bank accounts in your name and get new credit cards.... There are a number of useful precautions that a person can take to ensure that their personal data is protected and is not vulnerable to theft by criminals....
1 Pages (250 words) Research Paper

Leaking Identifying Information

These measures will ensure that everyone has information and identity theft hence everyone will be protected from identity theft....  This essay discusses a situation of identity theft where an individual impersonates another person inform of identity without his or her consent and uses the information to commit a crime.... hellip;  To reduce the impact of identity theft everybody needs to know that they exist through public awareness campaigns, assisting the victims, coming up with legislation to protect victims, protecting identifying information of people, and finally, training police and other investigators on how to deal with the thieves (Schmalleger, 1998)....
2 Pages (500 words) Essay

Final Project Problem at Work

To an individual this problem has been leading to identity theft, embarrassments, and blackmails all of which can make a person to incur losses and destroy his relationship with other people.... Therefore, if we can address this problem we can be able to avoid issues such as identity theft, embarrassments, and blackmails.... Among the issues caused by this problem, the most prevalent one is the identity theft.... identity theft is undertaking an activity while pretending to be somebody else....
4 Pages (1000 words) Essay

Credit Report Issues

A bill was passed that would function to amend the Fair Credit Reporting Act, to prevent identity theft, improve the resolution of consumer disputes, improve the accuracy of consumer records, make improvements in the use of, and consumer access to, etc.... A bill was passed that would function to amend the Fair Credit Reporting Act, to prevent identity theft, improve resolution of consumer disputes, improve the accuracy of consumer records, make improvements in the use of, and consumer access to, credit information, and for other purposes....
1 Pages (250 words) Essay

Protecting Information Resources

Regular analysis hinders potential harm since one detects identity theft promptly.... ne recommendation for preventing or reducing ID theft is protecting one's Social Security Card by refraining from carrying it when not necessary.... astly, checking one's mail early lowers exposure to mail theft.... ATM cards, social security cards, online bank accounts, and registration cards have personal identity numbers that on should always secure....
1 Pages (250 words) Assignment

Credit Card Liabilities and Fraud

Reduce Your Risk of Credit Fraud and identity theft.... … credit card Liabilities and Fraud credit card Liabilities and Fraud Legal Rights Furman Smoogie, who was a sales and marketing representative, had lost his American Express card.... Who Pays When Merchants are Victims of credit card Fraud?... American Express could have stopped any loss or theft from taking place if Furman had notified them earlier....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us