Saturday, May 18, 2019

Effects of Identity Theft on Social Networking Sites

This research is big because of the rowing risks of indistinguishability stealth, as the blob berths and social networking internet sites Users population increase, Identity thievery shames also increases. This may attend the students to focus on their studies, knowing that they ar safe from Identity theft criminals because nowadays, social networking sites be used in sharing discipline that may help them in their studies. The study is concerned with the respective(a) in the flesh(predicate)ities of the student, this is integrity way to release and expose their creativity to provide inter flakeive materials in preventing identity theft.This is to reprehend the Users about Identity Theft. This study is conducted for the users to be aw atomic number 18 in these be crimes. This can develop the determine of an individual which shows c ar in their fellow users that can be a victim of identity theft. creation a contributor in decreasing the identity theft in social netwo rking sites deserves honor in the country, it can be non as formal as expected, but it gives moral to the country. With this research, contributors started to be professionals by sharing their efforts and knowledge to help the country fight against Identity theft.Theft is an unusual act of human being which results too rime that intentionally piddles huge problem in our society. Theft builds a in force(p) wrong in dispositions and accounts in users of computer system, personal properties of users may and can be steal everytime by the sendupsters. Identity Theft is an epidemic which is rising in our society, it affects e actuallybody even the newfoundbie which atomic number 18 new users and adequate users, Criminals for some years improved materials to get easy access in stealing. Identity theft is a serious crime that defrauds millions of dollars from necessitous victims.Identity Theft exists because of the advance ways of doing crimes which result to inhuman to inhuman n ature act. at that place be instances that Identity Theft crimes are unrecognized by users thats why criminals are much eng succession the act of stealing that builds a broken system in our computer society. The effects of Identity Theft really switch over each and every member of tender Networking Sites, Identity Theft creates damage which is non limited in financial problems, and psychologically users were also affected because of the improper use of their identity that tends to bring down their reputation. companionable Networking Sites were also affected thither would be less numbers of users because they are afraid of Identity theft which ends to break rules and credential measures and system in Social Networking sites. If there are mounting problems for sure there would be more(prenominal) alternative solutions for their kind of change magnitude problem, through implementing rules and laws would be more accurate and waxy in building a strong security and social n etworking sites and early(a) websites.Security operators and administrators in Internet bequeath also play a big role in preventing and decreasing Identity theft. Since there are different kinds of Theft that are existing in our country, students must be aware in these existing crimes to prevent more hilarious situations. Technology was developed because of humans high intellectual abilities and they can create either epidemic crime of precautionary measures in existing crimes. Many population are innocent in fraudsters and criminals thats why they need to improve their knowledge when it comes to cautions about Identity Theft.Unimplemented laws result in increasing crimes thats why it should be release as soon as possible to prevent existing crimes. If we smear Identity Theft there would be a solid computer system which can be attain through knowledge sharing to the users. Definition of Identity Theft Identity theft is a crime. Identity Theft and Identity fraud are terms used to refer to all types of crime in which some adept wrongfully obtains and uses another persons personal data in some way that involves fraud or deception, typically for economic grain stated by the U. S.Department of Justice. With enough entropy about an individual, a criminal can take over that individuals identity to conduct wide range of crimes like dishonorable use of telephone calling calling cards, or obtaining other goods or privileges which the criminal might be denied if he were to use his real name. Identity Theft is an absolute epidemic, according to Robert Ellis Smith, a respected cover author and advocate. It affects everybody, and there is very little you can do to prevent it and, I think, worst of all-?you cant describe it until its probably too late. Some law-enforcement authorities call identity theft the fastest growing crime across the country right now. In fact, identity theft is the most called-about subject on the Privacy Rights Clearinghouses telephone hotl ist. (http// www. Identifying. Org/). In many a(prenominal) cases, a victims losses may include not solitary(prenominal) out-of- octet financial losses, but substantial additional financial costs associated with trying to restore his reputation in the community and correcting erroneous information for which the criminal is responsible. (http//www. justice. Gob/criminal/ fraud/websites/theft. HTML) Coming from the solving of Anna Marie Estonia, a sophomore IBIS student of PUT, Identity Theft is a form of stealing someones identity in which someone pretends to be someone else by assuming that persons identity, typically in order to access resources or obtain credit and other benefits in that persons name. Therefore, the researcher concludes that Identity Theft is a Technological act of Theft, this involved High Technological objects Oriented Materials which are used in stealing. As our Technology develops many crimes were developed as well because of the improper use of internet an d computer system.Identity Theft implies the low security in accessing internet and other online sites which can cause devastation in other users. Many cases were not yet settled with regards to this manner and many implemented subscriptions were in act to support the anti-Latinity Theft in Social Networking Sites which can help many recent and future users. The Concept of Social Networking Sites More and more, passel are turning to the Internet to keep in touch with friends, family and colleagues. Social networking sites (SONS), make staying involved quicker, easier and more fun than ever before.However, Social Networking Sites rush draw screens. These relate to privacy. While you can protect yourself, you cant control what others seat about you a growing concern as employers are beginning to search out information about new and potential employees. As there are few erasers to double-faced usage, there is substantial risk of misrepresentation. A user should also monitor the terms of use for SONS they have been known to change without notice. People have also been known to become addicted, spending so much of their time on these sites that their real lives suffer. 5 minute Guide to Social Networking Sites) Social Networking sites are social network sites as web-based services that allow individuals to construct a public or semi-public profile within a spring system articulate a list of other users with whom they share a connection, and view ND get through their list of connections and those made by others within the system. (http//CM. Indiana. Du/via/issues/Boyd. Ellison. HTML) There are dating sites, friendship sites, and sites with a business enterprise purpose and hybrids that offer a combination of these. Globally, hundreds of millions of stack have Joined one or more social sites. Whom. PCMCIA. Com) From the response of Noel Angelo Magellan, Social Networking Sites are more likely a virtual place where people in the world can communicate and i nteract with each other socially and as explained by Christine Marie Tyson, Social Networking ties are used for communicating our love ones in other places in the world, our long broken friends, used for worldwide meetings and many more. In short, communicating peoples lives to another person around the world. Example of this sites are Faceable, Twitter, Renee, Webb, mayday and many more.To sum it up, Social Networking Sites are made for the purpose of social interaction connecting and communicating with one another around the world through internet. Describing the Cases of Identity Theft Law enforcement agencies have developed new methods and new relationships to catch the bad guys in cyberspace. Some cases include Reshipping and Pushing. Reshipping is an operation in which conspirators or unlettered accomplices in the fall in States are hired to receive packages of electronic or other merchandise bought with fraudulent or stolen credit cards, and then repackages the merchandis e for shipment, usually abroad.By the time the merchant finds out that the credit card was fraudulent, the merchandise is already in another country. Pushing is the act of attempting to steal passwords and financial information by posing as a trustworthy person or business in a manifestly official (spoofed) electronic communication. Daniel Larkin, Fighting Online Crime) It may seem that there are some countries like the United States and Australia which have already enacted laws that pertain to the prosecution of identity theft related crimes. The Philippines however, being one of the largest Faceable populations in the world -? is also one of the many countries without a law to protect its citizens from online identity theft. Clogging is one of the many online problems involving identity theft. A Kellogg is software that tracks your keystrokes and records them so that a hacker can go back later and see what sites you visited, what information you submitted and more. Gallopers work invisibly in the background and are impossible to receive without security software. (www. Agro. H) As explained by Christine Marie Tyson, cases of identity theft nowadays can do anything like, chatting with strangers to get turn up with them, pushing, hack ones account in order to get some benefits of their victims, impersonates someone else in order to contain their own true identity, getting somebody elses photos and information through social networking sites and portray or pursue the identity of the victim. To summarize the discussion, the one thing that all of these attacks have in common though is the very thing that binds social networks together trust.We need to become far more aware of the value of our personal information and importantly the information we have about your friends. Effects of Identity Theft in Social Networking Sites The growing popularity of social networking sites (SONS) among the Internet users demands an introspection of personal and social behavi or of human beings. Today 1. 5 billion people across the world have their profiles in social networking sites. SONS becomes a reason for disturbance and addiction.The beginning of social networking sites started to make contacts with people and build a network of healthy relationship in the society. tho now it seems offering cyberneticss a great advantage to target victims. (International Journal of Business and Social Science) As stated by Risk Ferguson, Senior Security Adviser of Trend Micro, With explosive produce and user populations of this order its hardly surprising that these services also appear to be coming of age as attack platforms for cyberneticss. Web 2. With its user-generated, rich, interactive content and social networking with its interlinked trust-based networks of people and groups, offer cyberneticss great mise en scene for leveraging the capabilities offered, both to disseminate traditional forms of mallard through new channels and also to book out social engineering attacks for the purposes of target profiling or identity theft. (http// hosted. Personalities. Com/358216/affection/1746500010/cybercaf/) base on the answer of Paul Francis del Rosaries, It can affect the sites popularity.Some people would probably quit using the site if their image or identity were used in ways that they did not know about. The site would have reduced users which would also affect their income rate. Because social networking sites usually depends on how many users they have on their site for example is the Faceable. To sum up, with limited government oversight, industry standards or incentives to educate users on security, privacy and defend your identity, users are then exposed to identity theft and fraud.Additionally, these platforms have terabytes of confidential user information and are likely vulnerable to outside (or inside) attack. Although the issue is not yet in the mainstream conscious, it may well e sooner or later. Cyber laws have to be f ortified with advancement of rules as if violators cannot escape committing a crime, at the cost of societal value. Ways on how Identity Theft can be avoided As with any crime, you cant guarantee that you will never be a victim, but you can minimize your risk These are some of the tips that can make you and your family, safe on social networking sites 1) Change the profile privacy now.Keep your information accessible only to people in your friend list. 2) Dont post very personal information on the profile. It includes your email d, date of birth, contact number, mom address and information about your family members. Just like in the real world, it is not possible to completely protect oneself from a crime like identity theft. But there are many safeguards you can adopt to protect your identity. 1 Protect your wallet. Some people keep a lot of stuff in their wallet credit card charge slips, stick to slips, and all IDs, including their ASS and TIN cards.Minimize your risk by keepin g items with personal information in a safe place home. 2. ) Protect your computer. Use anti-virus software, as well as firewall and anti- spare software. This will help deter criminals efforts in stealing your personal information. Coming from the answer of Mark Angelo Menace, mostly, celebrities are the victims of Identity theft and it can be avoided in a form or way of privacy. Celebrities should have privacy in other aspects of their life. In the side of the poser or the theft, self-discipline is the best way to avoid this.Another is, other people can report cases like Identity theft. Overall, people should be contented on who they are and what they have and with that there will be no more cases like these. As a conclusion, these are many ways in minimizing Identity Theft we Just eave to implement it and continue to maintain the security of our computer system. The simplest way in minimizing this increasing numbers on thieves in Identity theft crisis is by Just being responsible enough in our belongings. Minimizing Identity theft will lead to a better computer system.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.