Hackers and Identity Theft, Personal Info, science homework help

Don't use plagiarized sources. Get Your Custom Essay on
Need an answer from similar question? You have just landed to the most confidential, trustful essay writing service to order the paper from.
Just from $13/Page
Order Now

Hackers and Identity Theft

The use of technology has provided a
convenience of which many individuals take advantage. Online banking, paying
bills online, applying for credit cards online, and communicating via e-mail
are all examples of using technology for convenience. In order to utilize many
services through the Internet, you are required to enter varying amounts of
personal information. To obtain an e-mail address, you may need to enter your
name and date of birth. To complete a credit card application online, you may
need to enter your social security number, income, place of residence, phone
number, and much more. To engage in online banking, you have to allow much of
your financial information to be available through the bank’s online banking
site. Sharing personal information on the Internet increases your level of
vulnerability to hackers. Hackers are individuals with increased computer
skills who are able to access varying levels of information using computer

For this Discussion, consider your
comfort level with sharing personal information on the Internet. Think about
whether your comfort level is influenced by a fear of your information being
obtained by hackers. Then consider how the criminal justice system perceives hackers.

Post by Day 4 an explanation of how comfortable you are
sharing personal information on the Internet. Then explain whether or not your
comfort level is influenced by a fear of your information being obtained by
hackers and explain why. Finally, explain whether or not hackers are perceived
as serious criminals by the criminal justice system.

One and a half page with at least two reference….

It is important that you cover all the topics identified in the
assignment. Covering the topic does not mean mentioning the topic BUT
presenting an explanation from the readings for this class

To get maximum points you need to follow the requirements listed for
this assignments 1) look at the page limits 2) review and follow APA rules
3) create subheadings to identify the key sections you are presenting and
4) Free from typographical and sentence construction errors.


  • Course Text: Taylor,
    R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and
    digital terrorism.
    (3rd ed.). Upper Saddle River, NJ: Pearson.
    • Chapter 4,
    • Chapter 12, “The
      Investigation of Computer-Related Crime”
  • Article: Anderson, K.
    B., Durbin, E., & Salinger, M. A. (2008). Identity theft. Journal
    of Economic Perspectives, 22
    (2), 171–192.
  • Article: Gilman, N.
    (2009). Hacking goes pro. Engineering & Technology, 4(3), 26–29.
  • Article: Haney, M.
    (2010). Triptech: Is it safe to surf? Condé Nast’s Traveler, 45(4),
  • Article: Kanable, R.
    (2009). The face of identity theft. Law Enforcement Technology, 36(4),
  • Article: Kirchheimer,
    S. (2011). “They stole my name!” The Saturday Evening Post,
    (1), 32–35.
  • Article: Pilcher, J.
    (2010). Growing use of Twitter raises customer security concerns. ABA
    Banking Journal, 102
    (1), 27–28.


    • Article: Katel, P.
      (2005). Identity theft: Can Congress give Americans better protection? CQ
      Researcher, 15
      (22), 517–540.
    • Article: Study reveals
      consumers’ data worries. (2005). Information Management Journal, 39(5),