Preview
Preview

Internet - Disclosure of Personal Information On-line and Identity Theft

:: 5 Works Cited
Length: 1763 words (5 double-spaced pages)
Rating: Blue      
Open Document




- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Disclosure of Personal Information On-line and the Occurrence of Identity Theft


Introduction

Identification is a critical and common process which we encounter on a regular basis as we carry out our daily activities. Companies, government agencies and institutions routinely ask individuals for personal information in order to help identify a specific individual from another. In the past, people have relied upon face-to-face exchange of information and identity verification but with the recent explosion of the Internet this system has become relatively obsolete. Personal information that had previously been stored in file cabinets in secure locations is now easily collected and stored on databases. Does this fast and efficient system violate the security of our personal information? Is our personal information and basic identifying data truly secure on the net?

Irwin Winkler’s movie “The Net” illustrates the type of problems that can arise if an individual’s personal information falls into the wrong hands. Winkler’s main character, Angela Bennett, played by Sandra Bullock, fell victim to identity theft as her personal information and key identify data were stolen and used in order to exchange her identity with another.1 Although the plot of the movie seems a little far-fetched, identity theft by means of the Internet is a serious and common problem that occurs frequently in real life.



How do we identify ourselves on the Internet?

In the virtual realm of the Internet physical means for identification verification are relatively non-existent since it requires specific technology, such as biometrics, which is not widely used. Instead the most common methods for identity verif...


... middle of paper ...


... lives an open book just waiting to be read. In order to prevent identity theft on-line we must take into account that Internet companies and the Internet, itself, play just as an important role in identity theft on-line as hackers and thieves.



References

1. Winkler, I. (1995), “The Net”.

2. Noack, D. (2000), “Identity Theft Thrives in Cyberspace”, http://www.apbnews.com/newscenter/internetcrime/2000/03/08/idtheft0308.01html

3. Marlin, A. (2000), “Online Identity Theft a Growing Concern”, http://www.europe.cnn.com/2000/tech/computing/08/16/id.theft.offline.idg/

4. Barlow, J. (2000), “Privacy On-line: A Shattered Illusion”, http://wings.buffalo.edu/Complaw/CompLawPapers/ryan.html

5. Chaum, D. (1996), “Achieving Electronic Privacy”, in High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace, edited by Peter Ludlow, pp.224-225.


Click the button above to view the complete essay, speech, term paper, or research paper

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »







This essay is 100% guaranteed.


Title Length Color Rating  
Essay about Analysis of Opposing Articles About Cyberspace and Identity - Sherry Turkle, author of the article “Cyberspace and Identity”, explains in her article that true identity is found through multiple personas and the internet helps the individual act out these personas which leads to self-actualization, in which every need is met and fulfilled. Whereas, Jeffery Rosen, author of the article and book “The Naked Crowd”, contends that the identity of the individual is being lost in the Omnipticon, where the many are watching the many, of the crowd. Rosen asserts that the internet is only speeding up the individual’s loss of identity....   [tags: true identity, internet, risks ]
:: 2 Works Cited
979 words
(2.8 pages)
Better Essays [preview]
Essay on Finding Personal Identity in Rumspringa in the Film Devil's Playground - The concept of culture spurs many individuals to study, understand, and obtain knowledge of certain customs, values, standards, and rituals that create another perspective to empathetically grasp, and each relatable truth, discovered by its researcher, can establish foundational, inalienable traits to argument the researcher’s identity. Each human is elected to be a researcher of culture with or without the knowledge of the research, but ironically, identity is not a firm state of being; it is continually shaped and molded after each new experience....   [tags: personal, identity, society, affinmations] 679 words
(1.9 pages)
Better Essays [preview]
Identity Journal: Personal and Social Identity Essay - Each week I have been writing in my identity journal and each time it seem to help answer the question of how do I identify who I am. In are world we identity are self in two ways who we really are and who we what other to believe we are. This is us wearing a mask. In week five and six we had to write our entry was a creative piece—a short story, poem, drawing, or other creative form explore issues of identity. This was for me a poem and a drawing that went with my drawing on how we all wear mask....   [tags: Journal, identity, ] 728 words
(2.1 pages)
Better Essays [preview]
Essay on Personal Identity: Who Are You? - Identity, an ambiguous idea, plays an important part in today’s world. To me identity can be defined as who a person is or what differentiates one person from another. Identity would be a person’s name, age, height, ethnicity, personality, and more. A quote by Anne Sexton states “It doesn't matter who my father was; it matters who I remember he was”(Anne Sexton). This quote helps me define identity because I believe it is saying that identity is what people are remembered by. When some people think of identity, words such as, uniqueness, distinctiveness, or individuality may come to mind....   [tags: What Is Personal Identity?]
:: 6 Works Cited
1397 words
(4 pages)
Better Essays [preview]
Third Party Personal Information Disclosure Essay - There are many ways personal information is collected. The companies who receive this information buy/sell personal information for marketing and advertising purposes but cyber-crimes can occur when personal information is transmitted through cyberspace. Communication professionals utilize technology a great deal in their work and they want to know their work and personal information is protected by Federal Law, Common-Law and Statutes. It is alarming to think of a person or company buying and selling one’s personal information....   [tags: Access to Personal Digital Data]
:: 9 Works Cited
2317 words
(6.6 pages)
Research Papers [preview]
Essay on Personal Identity at a High School Reunion - All through life people strive to become someone with a specific identity; to be classified as a “somebody” rather than a “nobody”. This classification is most noted amongst high school students. Often youth identities are developed through the activities they participate in, the jock, the cheerleader, the nerd, the band geek. Yet, people are not the activities they participated in in high school. People graduate, go to college, work toward a career, have children. Then at the ten year reunion, those same high school jocks, cheerleaders, nerds, and band geeks gather once again to reminisce over the past....   [tags: Criteria of Identity] 1506 words
(4.3 pages)
Powerful Essays [preview]
My Personal Identity Essay - A person’s identity is shaped by many different aspects. Family, culture, friends, personal interests and surrounding environments are all factors that tend to help shape a person’s identity. Some factors may have more of an influence than others and some may not have any influence at all. As a person grows up in a family, they are influenced by many aspects of their life. Family and culture may influence a person’s sense of responsibilities, ethics and morals, tastes in music, humor and sports, and many other aspects of life....   [tags: Personal Narrative, Identity Essay] 956 words
(2.7 pages)
Better Essays [preview]
Analysis of the Movie, Disclosure Essay - Disclosure is a drama/thriller. The genre for this movie states, “Sex is Power”. Tom is a happily married man, a successful computer expert, and works for a major computer company “Digicom”, which is about to merge. He believes he is going to receive a promotion because of all his devotion and work for the company. Instead the job goes to Meredith, who is from another plant and with whom he was romantically involved in his bachelor days. She is now his new boss, who is very aggressive, sexy and dedicated to destroy him after he refuses to have an affair with her....   [tags: Disclosure Movies Sex Films Essays]
:: 3 Works Cited
4404 words
(12.6 pages)
Better Essays [preview]
There is No Captain Kirk: A Theory of Universal Lack of Personal Identity - There is No Captain Kirk: A Theory of Universal Lack of Personal Identity There are multiple ways to interpret the second scenario provided to us. In general, the Captain Kirks in scenario two are either identical or they are not. Since we know that anything can only be numerically identical to itself, we also know that the two Kirks are not numerically or perfectly identical to each other. Thus, the question we are left with is: how are the two Kirks identical and how are they not....   [tags: Identity Essays]
:: 2 Works Cited
1996 words
(5.7 pages)
Strong Essays [preview]
Essay about Personal Narrative: Identity - Personal Narrative: Identity Identity-“Ones personal qualities.”Identiy is something only he or she can fully define. My uncle says I am affectionate,cheerful, and calm. My grandmother sees me as slim, pretty and sweet. My dad described me as perky, cheerful and happy, my mom says beautiful, gentle, and self-conscious. These adjectives describe me accurately, yet they are only abstract versions of me. Adjectives cannot begin to describe me and I aknowlege these descriptions for what they are, a condensed translation from my outward self to the world....   [tags: Papers Personal Description Essays] 1339 words
(3.8 pages)
Strong Essays [preview]