Branigan, Steven, Cheswick, William. High -Tech Crimes Revealed: Cyberwar Stories from the Digital Front. Addison-Wesley: Boston, 2004. Print.
The book is intended to be used as a textbook to educate us on the different types of high tech crimes we are faced with in our growing digital
world. Crimes such as hacking, identity theft and internet fraud are some of the topics covered. The author gains his knowedge of the subject from his experience
in law enforcement, computer programming, network security researching and internet security consulting. Chapter five is dedicated to the increasing problem of
identity theft and focuses on how it occurs and what consumers should do if they become a victim of identity theft. It highlights how many victims are often
unaware that they have been targeted. The average time it takes a consumer to realize they have been the victim of identity theft is twelve months. It also
discusses the more active role that both the FTC and credit agencies should take in protecting and education consumers on these crimes.
The information provided in the book can educate technology consumers on how to protect themselves from the digital crimes of hacking, internet fraud,
identity theft and computer viruses. The book is marketed for the academic community, but it would be beneficial to provide this information to all technology
consumers. The author gives us an insight into the mind of the hackers and tells us that "there are basically four motivations for hackers: revenge, profit, pride,
and curiosity. Interestingly, each of these motivations results in a different severity of attack." There is helpful insight provided to lead consumers to the proper
agencies to report cases of fraud and to get assistance from credit agencies when faced with these crimes. Being aware of the motivations of the criminals can
help us to become smarter with the security measures we exercise to prevent the disclosure of our personal information.
The book is intended to be used as a textbook to educate us on the different types of high tech crimes we are faced with in our growing digital
world. Crimes such as hacking, identity theft and internet fraud are some of the topics covered. The author gains his knowedge of the subject from his experience
in law enforcement, computer programming, network security researching and internet security consulting. Chapter five is dedicated to the increasing problem of
identity theft and focuses on how it occurs and what consumers should do if they become a victim of identity theft. It highlights how many victims are often
unaware that they have been targeted. The average time it takes a consumer to realize they have been the victim of identity theft is twelve months. It also
discusses the more active role that both the FTC and credit agencies should take in protecting and education consumers on these crimes.
The information provided in the book can educate technology consumers on how to protect themselves from the digital crimes of hacking, internet fraud,
identity theft and computer viruses. The book is marketed for the academic community, but it would be beneficial to provide this information to all technology
consumers. The author gives us an insight into the mind of the hackers and tells us that "there are basically four motivations for hackers: revenge, profit, pride,
and curiosity. Interestingly, each of these motivations results in a different severity of attack." There is helpful insight provided to lead consumers to the proper
agencies to report cases of fraud and to get assistance from credit agencies when faced with these crimes. Being aware of the motivations of the criminals can
help us to become smarter with the security measures we exercise to prevent the disclosure of our personal information.
Internet Fraud and Scams/Documentary/Video. You Tube. You Tube 2012. Web. 1 July 2012. Retrieved from http://www.youtube.com/watch?v=uE-_l9oV2U8.
The video was created by the U.S. Postal Inspection Service and chronicles the efforts being made to combat internet crimes
throughout the world. It recreates real life scenarios of fraud that are occurring around the world in an effort to arm consumers with
the knowledge of how to prevent becoming a victim. Scammers are working globally to create intricate schemes using methods such
as phishing to steal individual identities and wreak financial havoc on unknowing consumers. There are task forces working internationally
to put a stop to these crimes. The video offers saftey measures that should be used to keep your personal information from getting into the
wrong hands. They also offer viewers information on additional websites providing security measures that can be taken to protect yourself
against internet fraud.
The video is intended to create awareness for unsuspecting internet consumers from the intricate scams that they may fall prey to in doing their
personal business in online forums. The U.S. Postal Inspection Service alerts consumers about scams involving websites designed to replicate their
financial institutions and warns that we should "never use a link in an email to visit any website" (7:40). By informing internet users of the potential
dangers online the intention is to create a higher level of online safety in order to avoid becoming victim. Since the internet is an ever evolving entity it
is important to find ways to spread information to consumers about new risk potentials. It is our responsibility to maintain online awareness and not allow
ignorance to create a lack of personal safety.
Kurt, M. S., & Zucker, B. Counteracting identity fraud in the information age: The Identity Theft and Assumption Deterrence Act. International Review
of Law, Computers & Technology, 13(2), 183-192.(1999). Retrieved from
http://ezproxy.rowan.edu/login?url=http://search.proquest.com/docview/213388025?accountid=13605.
The purpose of this study is to understand identity fraud and the need to create The Identity Theft and Assumption Deterrence Act of 1998 in order to
combat the theft of personal information with the intention to commit a crime. The Identity Theft and Assumption Deterrence Act was passed in October
of 1998 making the theft of personal identity a federal crime and allowing private citizens to be considered as victims. The three main objective of this law
are giving consumers who have fallen prey to identity theft standing as victims under federal law, creating harsher penalties for the offenders and requiring
the Federal Trade Commission to inform the public and handle complaints regarding cases of identity theft. The law became necessary as a result of the
increasing use of online databases securing sensitive personal information and the ability for criminals to access this information and use it illegally.
With more business being done online we will not only need to look at existing laws concerning identity theft, new laws will need to be created to
accomodate the many new challenges we are faced with as digitial consumers. We will need to create task forces to investigate and prosecute the
perpetrators of these crimes since they are currently "difficult to trace or find, judgement proof, and without assets or income" (6). We will also need
to generate guidelines for the FTC to implement public education and establish procedures to report cases of identity theft in order to ensure their
compliance in enforcing the law. "Authorities estimate that identity theft imposes a cost on consumers approaching $100 million annually" (2). With
these numbers growing exponentially we cannot afforrd to wait to find successful ways to prosecute the individuals responsible for these crimes.
Nicola Davinson, and Elizabeth Sillence. It won’t happen to me: Promoting secure behaviour among internet users. Computers in Human Behavior.
Volume 26. Issue 6. November 2010. Pages 1739-1747. Retrieved from http://dx.doi.org.ezproxy.rowan.edu/10.1016/j.chb.2010.06.023.
The premise of this study is to prevent internet fraud by providing training programs for maintaining a more secure online presence.
The study was made up of 64 individuals, 9 men and 55 women with ages ranging from 18 to 43. By exposing participants to a risk
message regardless of their personal risk level, all users practiced more secure safety measures across the board. Those participating
in the study were asked to complete a questionairre which they believed was intended to assess their online risk level, but the level was
actually assigned randomly. They were then asked to complete a second questionairre to indicate their intentions to increase their security
measures over the course of a seven day period. The participants were also asked to enroll in a program designed to combat the online
practice of phishing called Anti-Phishing Phil. At the end of the seven days the respondants were emailed to measure their current level of
secure online behavior. By creating awareness of individual threat levels and the detrimental effects of personal fraud it was shown that
behaviors regarding online security changed and increased safety measures were taken.
Based on the findings of this study we are able see that people will change their behavior regarding online security based on perceived threat
alone. According to the study "once given the risk warning score, regardless of whether it indicated high or low risk, participants intentions were
to behave more securely than they had indicated at baseline"(1743). It is my assertion that people are naive and unaware of risk that they put
themselves at while conducting both personal and business affairs in the online world we live in today. Until they are faced with the facts or even
more powerful, the consequences, regarding their personal behavior they are likely to continue putting themselves a risk of identity theft or online
fraud. Awareness is key as the indications show that "users only need to be given the information at a generic level and do not need to have their
level of risk to be increased in order to behave more securely" (1743).
Sengupta, Somini, Wortham, Jenna. 7 Charged in Web Scam Using Ads. The New
York Times. 9 Nov. 2011.Retrieved from http://www.nytimes.com/2011/11/10/technology/us-indicts-7-in-online-ad-fraud-scheme.html?_r=1&
The article tells of an internet fraud scheme carried out by six men in their 20's and 30's from Eastern Europe generating fourteen million dollars
in revenue for the scammers. The scam swapped out advertising for high profile brands intended to be shown on the home page of ESPN.com with
ficticious vacation timeshare ads infecting four million computers worldwide. Redirecting the traffic to the timeshares site allowed the culprits to
receive referral fees. The virus attacked the infrastructure of the internet and prevented antivirus software from detecting it's presence. The virus
was able to attack both window and MAC operating systems.
Hearing of cases like this makes us realize just how vulnerable we are to fraud and virus attacks. If a group of individuals can create a virus that
can affect the internet infrastructure and web experts are unable to detect it then how can we as consumers ensure that we do not fall victim to
these types of scams? Computer security expert David Dagon expressed his concern when he said, "When people start attacking the infrastructure,
it creates the potential for a rogue version of the Internet" (B1). We need better policing of internet crime and harsher punishment for those who participate.
This is the wave of the future and we need experts to look after our best interests and protect us and our personal information from being used
unscrupulously.
Thomes, James T. Dotcons: Con Games, Fraud and Deceit on the Internet. iUniverse Incorporated: Lincoln, 2000. Print.
This book provides an indepth look at the many ways fraud occurs within the world of technology. The author's background with internet security
comes from his experience with military command and control systems as a colonel in the Air Force and currently as the head of an information
technology company. It provides the reader with a list of internet resources to report or fight internet crimes including the address for the Attorney
Generals office for each state. It covers Spam, credit card fraud, viruses, invesment scams, identity theft, sweepstakes scams and much more. It
dicusses how we leave ourselves vulnerable to internet crimes and how personal information based on our usage is compiled and sold to companies
that create elaborate schemes designed to deceive us.
This is an excellent tool for technology consumers to arm themselves for their personal aresenal in the fight against internet crimes. There is
information on most types of crimes that occur in the world of technology and resources on who to contact if you become a victim of these crimes.
This helps internet users to understand how some of these crimes occur and what measures to take to avoid becomeing a victim. The author
warns that "Identity theft has been simplified and automated so that even a novice can acquire enough personal data about you to defraud you and
drive you into bankruptcy" (1). This book creates a more informed consumer and with the knowledge it provides we are better equipped to not fall
prey to some of the online deceptions that appear to be authentic.
Additional citations from collaborative research project:
Balzhiser, Deborah et. al. "The Facebook Papers". 2006-2009. Web. Nov. 2012. http://kairos.technorhetoric.net/16.1/praxis/balzhiser-et-al/notes.html
Joseph, Max. "Catfish: The TV Show Trailer". Online video clip. YouTube, 26 Oct. 2012. Web. Nov. 2012. http://www.youtube.com/watch?v=CMA4x7aXJT0.
Kitvtv. "How to Avoid Facebook Identity Theft".Online video clip. YouTube, 31 Oct. 2009. Web. Nov. 2012. http://www.youtube.com/watch?v=O80y0GNDkNM.
Melsa85. "Social Media and the Creation of Self: Identity Development in Youth". Online video clip. YouTube, 10 Nov. 2011. Web. Nov. 2012.
http://www.youtube.com/watch?v=7cd0VTn_czk.
MrNationalistpride. "I met a guy through FACEBOOK see what happens". Online video clip. YouTube. YouTube, 20 Apr. 2010. Web Nov. 2012. http://www.youtube.com/watch?v=ZRxp3ozRtMs&feature=related
Pugh, Jessica Lee. "A Qualitative Study of the Facebook Social Network: The Desire to Influence, Associate, and Construct a Representative and Ideal Identity". Theses. May 2010. 1-43. PDF File. http://www.csulb.edu/colleges/cba/honors/thesis/documents/JessicaPughThesis.pdf.
The video was created by the U.S. Postal Inspection Service and chronicles the efforts being made to combat internet crimes
throughout the world. It recreates real life scenarios of fraud that are occurring around the world in an effort to arm consumers with
the knowledge of how to prevent becoming a victim. Scammers are working globally to create intricate schemes using methods such
as phishing to steal individual identities and wreak financial havoc on unknowing consumers. There are task forces working internationally
to put a stop to these crimes. The video offers saftey measures that should be used to keep your personal information from getting into the
wrong hands. They also offer viewers information on additional websites providing security measures that can be taken to protect yourself
against internet fraud.
The video is intended to create awareness for unsuspecting internet consumers from the intricate scams that they may fall prey to in doing their
personal business in online forums. The U.S. Postal Inspection Service alerts consumers about scams involving websites designed to replicate their
financial institutions and warns that we should "never use a link in an email to visit any website" (7:40). By informing internet users of the potential
dangers online the intention is to create a higher level of online safety in order to avoid becoming victim. Since the internet is an ever evolving entity it
is important to find ways to spread information to consumers about new risk potentials. It is our responsibility to maintain online awareness and not allow
ignorance to create a lack of personal safety.
Kurt, M. S., & Zucker, B. Counteracting identity fraud in the information age: The Identity Theft and Assumption Deterrence Act. International Review
of Law, Computers & Technology, 13(2), 183-192.(1999). Retrieved from
http://ezproxy.rowan.edu/login?url=http://search.proquest.com/docview/213388025?accountid=13605.
The purpose of this study is to understand identity fraud and the need to create The Identity Theft and Assumption Deterrence Act of 1998 in order to
combat the theft of personal information with the intention to commit a crime. The Identity Theft and Assumption Deterrence Act was passed in October
of 1998 making the theft of personal identity a federal crime and allowing private citizens to be considered as victims. The three main objective of this law
are giving consumers who have fallen prey to identity theft standing as victims under federal law, creating harsher penalties for the offenders and requiring
the Federal Trade Commission to inform the public and handle complaints regarding cases of identity theft. The law became necessary as a result of the
increasing use of online databases securing sensitive personal information and the ability for criminals to access this information and use it illegally.
With more business being done online we will not only need to look at existing laws concerning identity theft, new laws will need to be created to
accomodate the many new challenges we are faced with as digitial consumers. We will need to create task forces to investigate and prosecute the
perpetrators of these crimes since they are currently "difficult to trace or find, judgement proof, and without assets or income" (6). We will also need
to generate guidelines for the FTC to implement public education and establish procedures to report cases of identity theft in order to ensure their
compliance in enforcing the law. "Authorities estimate that identity theft imposes a cost on consumers approaching $100 million annually" (2). With
these numbers growing exponentially we cannot afforrd to wait to find successful ways to prosecute the individuals responsible for these crimes.
Nicola Davinson, and Elizabeth Sillence. It won’t happen to me: Promoting secure behaviour among internet users. Computers in Human Behavior.
Volume 26. Issue 6. November 2010. Pages 1739-1747. Retrieved from http://dx.doi.org.ezproxy.rowan.edu/10.1016/j.chb.2010.06.023.
The premise of this study is to prevent internet fraud by providing training programs for maintaining a more secure online presence.
The study was made up of 64 individuals, 9 men and 55 women with ages ranging from 18 to 43. By exposing participants to a risk
message regardless of their personal risk level, all users practiced more secure safety measures across the board. Those participating
in the study were asked to complete a questionairre which they believed was intended to assess their online risk level, but the level was
actually assigned randomly. They were then asked to complete a second questionairre to indicate their intentions to increase their security
measures over the course of a seven day period. The participants were also asked to enroll in a program designed to combat the online
practice of phishing called Anti-Phishing Phil. At the end of the seven days the respondants were emailed to measure their current level of
secure online behavior. By creating awareness of individual threat levels and the detrimental effects of personal fraud it was shown that
behaviors regarding online security changed and increased safety measures were taken.
Based on the findings of this study we are able see that people will change their behavior regarding online security based on perceived threat
alone. According to the study "once given the risk warning score, regardless of whether it indicated high or low risk, participants intentions were
to behave more securely than they had indicated at baseline"(1743). It is my assertion that people are naive and unaware of risk that they put
themselves at while conducting both personal and business affairs in the online world we live in today. Until they are faced with the facts or even
more powerful, the consequences, regarding their personal behavior they are likely to continue putting themselves a risk of identity theft or online
fraud. Awareness is key as the indications show that "users only need to be given the information at a generic level and do not need to have their
level of risk to be increased in order to behave more securely" (1743).
Sengupta, Somini, Wortham, Jenna. 7 Charged in Web Scam Using Ads. The New
York Times. 9 Nov. 2011.Retrieved from http://www.nytimes.com/2011/11/10/technology/us-indicts-7-in-online-ad-fraud-scheme.html?_r=1&
The article tells of an internet fraud scheme carried out by six men in their 20's and 30's from Eastern Europe generating fourteen million dollars
in revenue for the scammers. The scam swapped out advertising for high profile brands intended to be shown on the home page of ESPN.com with
ficticious vacation timeshare ads infecting four million computers worldwide. Redirecting the traffic to the timeshares site allowed the culprits to
receive referral fees. The virus attacked the infrastructure of the internet and prevented antivirus software from detecting it's presence. The virus
was able to attack both window and MAC operating systems.
Hearing of cases like this makes us realize just how vulnerable we are to fraud and virus attacks. If a group of individuals can create a virus that
can affect the internet infrastructure and web experts are unable to detect it then how can we as consumers ensure that we do not fall victim to
these types of scams? Computer security expert David Dagon expressed his concern when he said, "When people start attacking the infrastructure,
it creates the potential for a rogue version of the Internet" (B1). We need better policing of internet crime and harsher punishment for those who participate.
This is the wave of the future and we need experts to look after our best interests and protect us and our personal information from being used
unscrupulously.
Thomes, James T. Dotcons: Con Games, Fraud and Deceit on the Internet. iUniverse Incorporated: Lincoln, 2000. Print.
This book provides an indepth look at the many ways fraud occurs within the world of technology. The author's background with internet security
comes from his experience with military command and control systems as a colonel in the Air Force and currently as the head of an information
technology company. It provides the reader with a list of internet resources to report or fight internet crimes including the address for the Attorney
Generals office for each state. It covers Spam, credit card fraud, viruses, invesment scams, identity theft, sweepstakes scams and much more. It
dicusses how we leave ourselves vulnerable to internet crimes and how personal information based on our usage is compiled and sold to companies
that create elaborate schemes designed to deceive us.
This is an excellent tool for technology consumers to arm themselves for their personal aresenal in the fight against internet crimes. There is
information on most types of crimes that occur in the world of technology and resources on who to contact if you become a victim of these crimes.
This helps internet users to understand how some of these crimes occur and what measures to take to avoid becomeing a victim. The author
warns that "Identity theft has been simplified and automated so that even a novice can acquire enough personal data about you to defraud you and
drive you into bankruptcy" (1). This book creates a more informed consumer and with the knowledge it provides we are better equipped to not fall
prey to some of the online deceptions that appear to be authentic.
Additional citations from collaborative research project:
Balzhiser, Deborah et. al. "The Facebook Papers". 2006-2009. Web. Nov. 2012. http://kairos.technorhetoric.net/16.1/praxis/balzhiser-et-al/notes.html
Joseph, Max. "Catfish: The TV Show Trailer". Online video clip. YouTube, 26 Oct. 2012. Web. Nov. 2012. http://www.youtube.com/watch?v=CMA4x7aXJT0.
Kitvtv. "How to Avoid Facebook Identity Theft".Online video clip. YouTube, 31 Oct. 2009. Web. Nov. 2012. http://www.youtube.com/watch?v=O80y0GNDkNM.
Melsa85. "Social Media and the Creation of Self: Identity Development in Youth". Online video clip. YouTube, 10 Nov. 2011. Web. Nov. 2012.
http://www.youtube.com/watch?v=7cd0VTn_czk.
MrNationalistpride. "I met a guy through FACEBOOK see what happens". Online video clip. YouTube. YouTube, 20 Apr. 2010. Web Nov. 2012. http://www.youtube.com/watch?v=ZRxp3ozRtMs&feature=related
Pugh, Jessica Lee. "A Qualitative Study of the Facebook Social Network: The Desire to Influence, Associate, and Construct a Representative and Ideal Identity". Theses. May 2010. 1-43. PDF File. http://www.csulb.edu/colleges/cba/honors/thesis/documents/JessicaPughThesis.pdf.