Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Identity Theft on social Media for the professional of standard

chartered Bank in Islamabad


Hafiz Muhammad Salman
MS
Article

An Evaluation of Identity-Sharing Behavior in


Social Network Communities

 Stutzman, F. (2006). An evaluation of identity-sharing behavior in social


network communities. Journal of the International Digital Media and Arts
Association, 3(1), 10-18.
Introduction
 In recent years, social network communities (SNC) such as Friendster and
MySpace have drawn significant press from the business and academic
communities
 Student academic information-Protection
 Guidelines-Ethical basis-Law
 SNC-richly information profile-USER
 Pilot Study-Target Audience,-Students-Quantitative method
 Primary Goal-The primary goal of the pilot study was to develop quantitative
metrics on SNC
 Secondary Goal -To investigate and comparatively analyze population attitudes
about participation in SNC’s, and population attitudes about online identity
sharing in general.
 3 SNC’s- Facebook, Friendster, and MySpace.
Research Questions

What identity information is disclosed in the


SNC’s?
How does it compare to identity information
previously disclosed by the university? –
How much identity information are students
disclosing in SNC’s? –
 What are student opinions about identity
information disclosure in SNC’s?
Methodology

 Quantitative-Random Sampling Technique-Target Audience(Students).


 A list of common SNC’s, as well as an option to share other SNC’s
was made available.
 In the second part of the survey, students were asked to respond to
a number of statements about identity information disclosure,
indicating their level of agreement with the statement.
 3.2 Participants Of our randomly selected participants (N=200), 19 percent
(N=38) completed the survey. Of the respondents, 20 were undergraduates, and 18
were graduate/professional (G/P).
Procedure & Participants in Survey

 how students feel about their SNC profiles being accessed, and how students feel about
sharing identity information in general.
Finding

Social Network Community Breadth -71%


Undergraduate students heavily participated-

Social Network Community Identity Data Analysis

Identity Information Disclosure in The Facebook


Article 2

IDENTITY THEFT LITERATURE REVIEW

 Newman, G. R., and McNally, M. M. (2005). Identity theft literature


review.
INTRODUCTION

 This paper format is of a literature review.

 Identity theft is a product of the new age of information technology


 And as such fits nicely into the literature of opportunity theory in
criminology which examines how offenders take advantage of new (and
old) ways of doing business and conducting the affairs of everyday life
 Identity theft is rarely one crime, but is composed of the commission of
a wide variety of other crimes, many if not all of which are crimes well
known to us all. The crimes with which identity theft is commonly
associated are: check and card fraud, financial crimes of various sorts,
various telemarketing and Internet scams.
 1998- FTC Federal Trade Commission-Consumer Complaints.
 9.1 million in 2003.
 9.3 million adults had been victimized-2004
 Researching Harm and its Reduction -Identity theft involves, at a minimum
two victims: the individual whose identity is stolen and, in most cases, the
financial institution that is duped by the use of the victim’s stolen identity.
DEFINITION OF IDENTITY THEFT
 DEFINITION OF IDENTITY THEFT In 1998, Congress passed
the Identity Theft Assumption and Deterrence Act (the Identity
Theft Act; U.S. Public Law 105-318).
 This act identifies offenders as anyone who …knowingly transfers
or uses, without lawful authority, any name or number that may be
used, alone or in conjunction with any other information, to
identify a specific individual with the intent to commit, or to aid or
abet, any unlawful activity that constitutes a violation of Federal
law, or that constitutes a felony under any applicable State or local
law.
 3. As a motive for other crimes. (Cases 5-6). Offenders now recognize the
monetary value of the personal information of individuals.
 burglary," 2004). Burglary, robbery, muggings, theft from cars, pick
pocketing may all be committed with the view to obtaining the victim’s
personal and financial information.
Financial Scams

 Identity theft is harmful to open markets, because they depend on the


very trust that is so obviously violated by identity theft.
 Credit card fraud is perhaps the best example of the type of identity theft
that targets a specific technology which is the plastic card.
 Other common targets of this type of identity theft are electronic
databases that contain personal and financial data on customers (Cases
1-2).
 2. Financial Scams. (Case 3-4) There is a wide variety of scams that may be
committed with the goal of obtaining from victims their personal
information. These types of identity theft are obviously also related to the
exploiting of specific technologies and information system.
Type of the Identity Theft
 Exploiting Weakness in Specific Technologies and Information
Systems
 Financial Scams
 As a motive for other crimes
 Facilitating Other Crimes
 Avoiding Arrest
 Repeat Victimization: “Classic” Identity Theft
 Organized Identity Theft..
Sources of Data

 Agency Data
 Research Studies
 Anecdotal Information

Victims:
 “Identity theft is a dual crime,” that is, it usually affects two victims: the individual
whose identity was stolen and the business whose service was stolen.

 Victim demographics:
 According to Identity Theft Clearinghouse data, which represent only those
victims who reported their age, individuals aged 30-39 and 18-29 consistently
reported more incidents of identity theft (FTC 2005 2004 2003b 2002a 2001a).
 Children as victims of identity theft –Only one source-Under age 18-
 No authentic data was available.
 Institutional victims
 The elderly as victims
 Offenders has two types:
 1. Low-frequency offenders
 2. High-frequency offenders
THE COST OF IDENTITY THEFT

 Financial costs: Businesses


 Financial costs: The criminal justice system
 Financial costs: Individuals
 Personal costs: (non-financial)
 • Social security card , • Passport , • Electoral register entries , •
Employment information.
How offenders steal identities

 • They steal wallets or purses from shopping bags, from cars, or by pick
pocketing.
 They steal mail by several means. They may simply take it from insecure
mailboxes, submit a false change-of-address form to the post office to
direct someone’s mail to themselves, or collude with a postal employee to
steal mail that contains personal information. Mail that is useful to offenders
includes preapproved credit card applications, energy or telephone bills,
bank or credit card statements.
Thank You

You might also like