References 3

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

RWS 1301

Gina Zavala Alvarado

ID 80609610

10/29/2017

Annotated Bibliographies

Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (april 20 - 24, 2009 ). All your contacts are belong

to us: automated identity theft attacks on social networks. In WWW '09 Proceedings of the

18th international conference on World wide web pp. 551-560). New York: ACM.

doi:10.1145/1526709.1526784

This journal states the definition and explains the social structure in the internet. As the activity in

the Internet has grown exponentially in the last years, so has the level of online criminal activities.

It shows the danger of malicious viruses and people who seek to take advantage of the internet

identity and hide behind a false identity in social media. The source explains how the assaulter

looks for his/her victims in social media and convinces them to give away important personal

information by creating a false identity or even by hacking into the users profile. By engineering

processes, it is shown and explained how easy is to hack and gain information by cloning and

breaking up CAPTCHAs even in the most used media like Facebook and Linked In. This journal

is important to this research because it states clearly the dangers of sharing our personal

information in the Internet and how easy it is for anyone to have access to it.

Page 1 of 5
Brody, R. G., Mulig, E., & Kimball, V. (2007). Phishing, pharming and identity theft. In Brody,

R. G., Mulig, E., & Kimball, V, Academy of Accounting and Financial Studies Journal,

(pp 11-43).

This chapter of the book defines the two most common ways of identity theft as the fastest growing

crime in America. By phishing and pharming, thieves gather information of their victims and use

them to make money. This malicious acts might repercute in our wallet, work place or even family.

The source explains really well these terms that are ways of thieves to get our information and

money from the Internet. This information is relevant because it states two very important terms

from Identity Theft. It might raise awareness to the reader of the danger and how to react when

having one of these approaches while we use the Internet.

Chou, C., & Hsiao, M. (2000). Internet addiction, usage, gratification, and pleasure experience:

the Taiwan college students case. Computers & Education, 35(1), 65-80.

doi:10.1016/s0360-1315(00)00019-1

The study was implemented in two universities in Taiwan and shows that most of their students

use the internet daily, and some are even addicted to it. These addicts, spent almost triple time

more than non-addicts. These addicts found the internet entertaining, fascinating and satisfactory.

They concluded that most of these addicts are brought to the internet by the communication

pleasure score they receive from it. This study is relevant to the research because it describes how

our society and college students are in some cases, addicted to the Internet. This research shows

the cases of addiction and how it may be easier to be a victim of identity theft.

Page 2 of 5
Dinev, T., & Hart, P. (2006). Internet Privacy Concerns and Social Awareness as Determinants of

Intention to Transact. In International Journal of Electronic Commerce, 10(2), 7-29.

doi:10.2753/jec1086-4415100201

This study is concerned about the conduct in online transactions and internet privacy. Data

collected by a survey explains the two concerns and intention between internet privacy and online

transactions. It also explains how the Internet Identity contributes a big importance in the current

globalization. According the source, the social awareness of the pros and contras of the internet

identity will help the users to have a better understanding of the matter and be well prepared for

the dangers. This study helps this research because it explains the social awareness in the internet

identity, especially when we ought to do a transaction online. This information also shows the two

sides of going anonymous and showing or true identity in the Internet.

Fornas, J., & Fornas, J. (2002). Digital borderlands: cultural studies of identity and interactivity

on the Internet (Vol. 6, pp. 1-47). New York: P. Lang.

This chapter of the book researches about borderlands in the internet, gives a view of the internet

identity and daily usage from a cultural studies perspective. It defines and explains the mass media

and interpersonal media, social categories, interactivity, and more that is created in the internet.

They state how human culture has been changing over time and how it changes in the web. This

book is helpful for this study because it defines and enforces the meanings of the social interaction

in the internet and how they are important. This information shows that it is important to be aware

of our behavior, because even on the internet, there is a complex society as in real life.

Page 3 of 5
Mckenna, K. Y., & Bargh, J. A. (1998). Coming out in the age of the Internet: Identity

"demarginalization" through virtual group participation. Journal of Personality and Social

Psychology, 75(3), 681-694. doi:10.1037//0022-3514.75.3.681

This journal explains how the interaction between the anonymous fashion and the personal

information are important to create our own Internet Identity. It defines and explains Internet

identity, its importance and its effects on self-esteem. The relevance of virtual groups and the

acceptance of a group is also studied and explained. Besides explaining how to get involved within

a virtual group by using an identity, it analyzes how to become part of several groups or leave one.

Even though this journal is more about coming out, it is relevant to this research for its deep

analysis of the importance of having an Internet Identity being anonymous factors into the

discussion. It also has value information about social groups and how they work.

Stretton, T., & Aaron, L. (2015). The dangers in our trail of digital breadcrumbs. In Computer

Fraud & Security, 2015(1), 13-15. doi:10.1016/s1361-3723(15)70006-0

This article states the importance and the dangers of our digital breadcrumbs. By doing several

accounts, like Facebook, Instagram, Apple, etc... We leave a big amount of personal information

online. The authors say that most of the time when a webpage recommends the user to change the

password, is because the database has been suffering a data breach recently. The source also

suggest basic measures to erase all digital breadcrumbs that we leave forgotten in some other

webpage to keep our personal information safe. This source has relevance in this research because

Page 4 of 5
it explains us how dangerous it is to leave a forgotten webpage with our information in it. It help

also for its information about how to erase and create awareness into our personal data in the

Internet.

US Federal Trade Commission. (2003, September). Federal Trade Commission--Identity Theft

Survey Report [PDF]. Washington, DC : US Federal Trade Commission.

This survey researched information and collected data about people who have been victims of

identity theft. The survey purpose is to estimate the number of victims of identity theft, the actions

they did afterwards, and the methods of helping those victims. According to the data, identity theft

was more seen in new credit cards, loans that were never paid, framing the victim. I think this

survey is important to this research because it gives data and real examples of people who had

their identity stolen in the internet. This data may give a better approach when giving examples of

victims of identity theft.

Page 5 of 5

You might also like