Preventing Online Identity Theft And Phasing

Read Complete Research Material



Preventing Online Identity Theft and Phasing

By

ACKNOWLEDGEMENTS

First, I would like to thank God and my family for giving me unconditional support through all my personal and professional development. I would also like to show my appreciation to a number of people that where key to the development of this study. First, I am very grateful with Mr. Alexander Bejarano from Ecopetrol for being very supportive and helpful with his wide knowledge and experience in the topic of study. I would also like to thank Mr. Juan Guillermo Perez and Mr. Nicolas Ingram for invaluable information and helping me with interviews. I am also grateful with Mrs. Clemencia for facilitating me first hand material that was critical for this study. I also thank the companies who took the time and actively participated in this study. Last but not least, I would like to thank my supervisor Daniele Archibugi, Department of Management for his useful advice and patience.

DECLARATION

I, (Your name), would like to declare that all contents included in this dissertation stand for my individual work without any aid, & this dissertation has not been submitted for any examination at academic as well as professional level previously. It also represents my own views & not essentially the ones associated with university.

Signed __________________ Date _________________

ABSTRACT

The Internet has brought about major positive beneficial changes in the world. In today's society, you often need to reveal personal bits of information about yourself, such as name, date of birth, a signature, address, phone numbers, and even banking and credit card information. If a thief is able to access this personal information, he or she can use it to commit fraud in your name. Identity theft is such a widespread computer issue which needs to be addressed through user awareness and training. This research will focus on defining, identifying and exploring what is meant by the term online identity theft, and formulate recommendations on how to manage and mitigate the risks of online identity crimes.

TABLE OF CONTENTS

ACKNOWLEDGEMENTSii

DECLARATIONiii

ABSTRACTiv

CHAPTER 1 : INTRODUCTION1

Background1

Problem Statement1

Aims and Objectives2

Significance of the Study2

Motivation of the study3

Purpose of the Study3

Rationale of the Study4

Research Questions5

CHAPTER 2: LITERATURE REVIEW6

Theoretical Framework6

Issues of Online Identity Theft6

Credit Fraud7

Threat of Credit Fraud7

Threats of Online Shopping8

CHAPTER 3 : RESEARCH METHODS10

Introduction10

Explanation of Methodology10

Strengths and Weakness of the Study11

Research philosophy11

Research approach: Deductive12

Research strategy: Pluralistic12

Selection of Research Method13

Research Design13

Literature Design14

Data collection methods and tools14

Data Analysis Methods15

CHAPTER 4: ANALYSIS AND RESULTS16

Survey Results16

Online Payments by Users16

Usage of Online Payment Facility17

Modes of Online Payment18

Usage of Antivirus or Antispyware Software19

Free Usage of Antivirus Software20

Security Level21

Victim of Online Identity22

Disposing off Old Personal Computers23

Promotion of Identity Theft Campaign24

Explaination of the Arguments25

CHAPTER 5: CONCLUSIONS26

Conclusion of Arguments26

REFERENCES28

APPENDIX32

CHAPTER 1 : INTRODUCTION

Background

The Internet has brought about major positive beneficial changes in the world. It makes it easier to keep in touch with our friends and family members and shopping online, but the internet is also behind many changes and adaptations in the way numerous crimes are committed. Vangie Beal (2006). The internet is providing new ways for people to steal personal information and to commit ...
Related Ads