Professional Documents
Culture Documents
References 3
References 3
References 3
ID 80609610
10/29/2017
Annotated Bibliographies
Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (april 20 - 24, 2009 ). All your contacts are belong
to us: automated identity theft attacks on social networks. In WWW '09 Proceedings of the
18th international conference on World wide web pp. 551-560). New York: ACM.
doi:10.1145/1526709.1526784
This journal states the definition and explains the social structure in the internet. As the activity in
the Internet has grown exponentially in the last years, so has the level of online criminal activities.
It shows the danger of malicious viruses and people who seek to take advantage of the internet
identity and hide behind a false identity in social media. The source explains how the assaulter
looks for his/her victims in social media and convinces them to give away important personal
information by creating a false identity or even by hacking into the users profile. By engineering
processes, it is shown and explained how easy is to hack and gain information by cloning and
breaking up CAPTCHAs even in the most used media like Facebook and Linked In. This journal
is important to this research because it states clearly the dangers of sharing our personal
information in the Internet and how easy it is for anyone to have access to it.
Page 1 of 5
Brody, R. G., Mulig, E., & Kimball, V. (2007). Phishing, pharming and identity theft. In Brody,
R. G., Mulig, E., & Kimball, V, Academy of Accounting and Financial Studies Journal,
(pp 11-43).
This chapter of the book defines the two most common ways of identity theft as the fastest growing
crime in America. By phishing and pharming, thieves gather information of their victims and use
them to make money. This malicious acts might repercute in our wallet, work place or even family.
The source explains really well these terms that are ways of thieves to get our information and
money from the Internet. This information is relevant because it states two very important terms
from Identity Theft. It might raise awareness to the reader of the danger and how to react when
Chou, C., & Hsiao, M. (2000). Internet addiction, usage, gratification, and pleasure experience:
the Taiwan college students case. Computers & Education, 35(1), 65-80.
doi:10.1016/s0360-1315(00)00019-1
The study was implemented in two universities in Taiwan and shows that most of their students
use the internet daily, and some are even addicted to it. These addicts, spent almost triple time
more than non-addicts. These addicts found the internet entertaining, fascinating and satisfactory.
They concluded that most of these addicts are brought to the internet by the communication
pleasure score they receive from it. This study is relevant to the research because it describes how
our society and college students are in some cases, addicted to the Internet. This research shows
the cases of addiction and how it may be easier to be a victim of identity theft.
Page 2 of 5
Dinev, T., & Hart, P. (2006). Internet Privacy Concerns and Social Awareness as Determinants of
doi:10.2753/jec1086-4415100201
This study is concerned about the conduct in online transactions and internet privacy. Data
collected by a survey explains the two concerns and intention between internet privacy and online
transactions. It also explains how the Internet Identity contributes a big importance in the current
globalization. According the source, the social awareness of the pros and contras of the internet
identity will help the users to have a better understanding of the matter and be well prepared for
the dangers. This study helps this research because it explains the social awareness in the internet
identity, especially when we ought to do a transaction online. This information also shows the two
Fornas, J., & Fornas, J. (2002). Digital borderlands: cultural studies of identity and interactivity
This chapter of the book researches about borderlands in the internet, gives a view of the internet
identity and daily usage from a cultural studies perspective. It defines and explains the mass media
and interpersonal media, social categories, interactivity, and more that is created in the internet.
They state how human culture has been changing over time and how it changes in the web. This
book is helpful for this study because it defines and enforces the meanings of the social interaction
in the internet and how they are important. This information shows that it is important to be aware
of our behavior, because even on the internet, there is a complex society as in real life.
Page 3 of 5
Mckenna, K. Y., & Bargh, J. A. (1998). Coming out in the age of the Internet: Identity
This journal explains how the interaction between the anonymous fashion and the personal
information are important to create our own Internet Identity. It defines and explains Internet
identity, its importance and its effects on self-esteem. The relevance of virtual groups and the
acceptance of a group is also studied and explained. Besides explaining how to get involved within
a virtual group by using an identity, it analyzes how to become part of several groups or leave one.
Even though this journal is more about coming out, it is relevant to this research for its deep
analysis of the importance of having an Internet Identity being anonymous factors into the
discussion. It also has value information about social groups and how they work.
Stretton, T., & Aaron, L. (2015). The dangers in our trail of digital breadcrumbs. In Computer
This article states the importance and the dangers of our digital breadcrumbs. By doing several
accounts, like Facebook, Instagram, Apple, etc... We leave a big amount of personal information
online. The authors say that most of the time when a webpage recommends the user to change the
password, is because the database has been suffering a data breach recently. The source also
suggest basic measures to erase all digital breadcrumbs that we leave forgotten in some other
webpage to keep our personal information safe. This source has relevance in this research because
Page 4 of 5
it explains us how dangerous it is to leave a forgotten webpage with our information in it. It help
also for its information about how to erase and create awareness into our personal data in the
Internet.
This survey researched information and collected data about people who have been victims of
identity theft. The survey purpose is to estimate the number of victims of identity theft, the actions
they did afterwards, and the methods of helping those victims. According to the data, identity theft
was more seen in new credit cards, loans that were never paid, framing the victim. I think this
survey is important to this research because it gives data and real examples of people who had
their identity stolen in the internet. This data may give a better approach when giving examples of
Page 5 of 5