Here is the synopsis of our sample research paper on Guarding Against Identity Theft. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
A 14 page paper discussing identity theft in the electronic environment and what IT personnel can do to decrease incidence associated with e-commerce and other applications. Includes a 1-page outline Bibliography lists 10 sources.
Page Count:
14 pages (~225 words per page)
File: CC6_KSitIDtheftSec.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
IP addresses. C. Goals and Objectives. D. Program and policy design. 1. Inherent risk in the electronic environment. 2. Risk management. 3. Selecting measurement criteria. E. Action Plan. F. Monitoring.
G. Evaluation. H. Conclusion. Introduction The convenience of electronic information storage and use also opens that information to being used in unauthorized and
even fraudulent ways. As organizations continue to escalate security measures intended to protect customers privacy and information, hackers and other white-collar criminals also are working to overcome those security
measures. The end result is that organizations must continually monitor, upgrade and improve their ability to ensure protection of the information they hold. The purpose here is to
assess the extent to which identity theft can reach and to propose in general terms risk management measures intended to counter efforts to gain unauthorized access. Identity Theft
The electronic environment appears to be quite anonymous, but in reality it is anything but. Jackson, Locke and Shannon (2001) report on the use
of "spyware" on the computer of a colleague, a program installed on the colleagues computer when he was out of the office specifically for the purpose of having the software
loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access
to all of his colleagues personal information, but also was able to disguise his own Internet identity by using his colleagues. Thus Jackson (2001) could have wreaked havoc at
one or more Internet sites, and the only traceable trail would lead back to the colleague. Jackson (2001) would have been able to do this by visiting any number
...