InformationTechnology Identity Theft
Agreements,laws, and enacted policies have been put in place to ensure thesafety of persons and privacy of information acquired throughresearch remain confidential by all possible means. There existinternational boards of ethics that ensure all the States meets theserequirements by formulation of national ethical corporations withstructural alignment to the global body to ensure that the well-beingof its citizens is catered for. Punitive actions for any breach ofthe ethics passed is complementary to the law, and thus, it helps tokeep everyone undertaking research within the firm boundaries.
Anembarrassment to the researcher is consequently similar to theparticipant. Such mistakes that may result from the lack of privacywould cause adverse impacts to all those who took part in the study.Information technology is a fast growing sector globally. Its rapidgrowth has seen a wider improvement regarding product production andservice delivery. Despite the positive growth, technology hasexposed, more than it has protected us from malicious people.
Theprincipal duty of ethical boards is to keep information from anyunauthorized people from using, losing and modifying for egocentricpurposes. Therefore, a good security system should be installed tomeet the purpose of the protection and also help to keep track incases of an ambush. The respective security limits may involve theuse of CCTV cameras, generation of passcodes and usage of documentscanning machines security personnel. In many cases, all thementioned sources have been manipulated in the event of any theftthat occurred either manually or through the use of computer crackingsystems that bypass the security passwords and allow internet hackersto take control of the targeted system[ CITATION Jef92 l 1033 ].
Thiscrime through which a person’s data is obtained intentionally byanother individual in ways that are deceitful and malicious foreconomic gain are descriptions of identity theft. The necessaryinformation that is mainly acquired by such perpetrators includes thefollowing personal and social security number, bank account numbersor credit card numbers. People should be very cautious about whoaccesses their personal identification information to avoid suchmistakes of a breach of privacy[ CITATION Jef92 l 1033 ].
Identitytheft happens in everyday life experiences, and the criminals arealways on the alert if they are targeting you. Criminals acquire yourinformation through several methods such as shoulder surfing aroundareas where you require putting your credit card numbers forinstance, or in any event where you provide your personal informationto hotels or even overhear you as you provide information over thetelephone phone. The acquaintance of this information leaves manypeople vulnerable to exploitation by the felons.
Todaythe internet has become the source from which thieves access people’sidentifying data. This information is sought from the spams or eventhe E-mail support centers over the web. With all these personalinformation felons can use the individual`s identity to perform manycrimes, for example, acquiring loans and fraudulence withdrawals fromthe person`s bank account and many other services that the criminalwould not be offered in case he or she presented his or her identity.The federal law has therefore stipulated deterrence legislation thatapplies to punish any individual who participates is such crimes[ CITATION Cha93 l 1033 ].
Mostof these crimes are all drawing back to our central point which isinformation and technology. We understand that there is data beingtaken away and being transformed to benefit some particular cruelpeople. These transmissions expose the used individuals todifficulty, and if enough evidence is not provided, they might not beaccused of these crimes. Growing up in the society involved in suchoffenses, we ought to learn some basic tactics that would help us toavoid being victims of circumstance to this exploitations. Thismechanism would involve the mere stinginess on data and electronicinformation devices capable of remembering passwords and otherpersonal records. Information technology experts are responsible forthis mistakes as they sell certain software that may be used bycriminals to achieve their missions[ CITATION App09 l 1033 ].
Piratesare all over the globe, and they do not give anyone a chance to beacknowledged for any cases of real work within the technologicalsector. It is helping people to cheat today in the research studiesby presenting information that does not belong to them. For instance,they steal research papers from the original writers beforepublications and present to get recognized as the authors leaving theoriginal writers who worked hard to gather the information earnnothing out of their efforts[ CITATION App09 l 1033 ].
Thenetworks are responsible for the alteration of information to createinformation that leads to frauds and larcenies. The computer programssuch Photoshop, for instance, uses the desktop to fake, paste andmodify official documents and graphic images to help in identitytheft. It is unethical to copy such information, but it remainsunclear whether the use of these computer applications should bebanned or access denied to everyone. Proving a guilty individual hasalso turned out to be dilemmatic without finding such evidence.
Creatingdissemination of computer viruses is unethical. The viruses arespecifically directed towards destroying many computer systems andsoftware. They are used to crush many organizational systems and inturn, losses are massive. For example, malware programs can be usedto destroy any information on transactions that took place in a bankat a specific time. This help many felons escape jurisdiction butleave bigger losses to many individuals. It is an area that stillneeds to be well addressed on within the information and technologysection.
Impactsof information technology and resolutions.
Technologicalchange has propelled a rift to occur between that individual who isconversant with a computer and the internet and those doomed to beanalog. Many corporations specify the qualification for employmentwith their company and computer literacy has become a demand for manyinstitutions. Many individuals who are not able to meet therequirements challenge themselves by enrolling in computer classes toacquire the knowledge. Organizations would not risk losing their mostexperienced staff members due to computer illiteracy, and therefore,they initiate a training program that helps these individuals learncomputer skills. Contrary to this improvements more threats toidentification information exposure increased as everyone tries tofind internet services[ CITATION Cha93 l 1033 ].
Inthe twenty-first century, females are discriminated against in theinformation and technology world. Development of good I.T systemscome from men, and, therefore, many organizations seek services frommen to handle any computer related activities. It is a significantchallenge, and many organizations have come up to fight for equalityin gender recognition for this opportunities. The federal laws alsoplay the role in creating policy and legislation that ensure thegender ratio is observed from the government to the organizationalstructures. Women have stepped up to study information and technologycourses to qualify and compete for the job opportunities in I.T. This has led to increased threats of identity theft because womenhave also become crucial and dangerous participants[ CITATION Gil10 l 1033 ].
Terrorismhas become more threatening due to the easier access to informationthey need I order to launch an attack. They develop fakeidentifications for the suicide bombers and their other mission menfor them to evacuate the security checks and conduct their terrorevents. They also use computers and the internet to launch missileattacks from their bases without a physical appearance at the crimescene. Organizations are not able to control such mistakes easily andas a result, many lives are lost. Better systems are thus, installedto ensure criminals are detected in time and flashed out before theycause tragedy.
Giles, J. (2010). Cyber Crimes Made Easy. Academic Search Premier, 20-22.
Piller, C. (1993). Privacy in Peril. Macworld, 124-130.
Rothfeder, J. (1992). Privacy for Sale. New York: Simon Schuster.
S., A. (2009). Social Engineering Hacking the Wetware. Information Security Journal, 40-46.