Social networking and identity theft in the digital society

نویسنده

  • Eric Holm
چکیده

This paper explores the vulnerability of social network users to identity theft when they share personal identification information online. The sharing of details like age, sex, address and other personal information like photographs can assist in establishing an identity. Identity criminals exploit social network users and the weaknesses of social networking sites to gather the information needed to commit identity theft and identity fraud using this identification information. While there are mechanisms that can reduce the incidence of this crime, information sharing on social networks is voluntary, which, makes its control difficult. This paper presents an exploration of existing literature from Australia, the United States and United Kingdom and highlights the importance of the relationship between social networking and identity crime. The drivers to sharing information on these platforms are considered. The paper provides opportunities to improve the understanding of the relationship between personal information and the crime. A difficulty in having preventative mechanisms in place is that social networking sites have a vested interest in promoting rather than preventing the sharing of information. Further, identity crime is pervasive which, makes the amelioration of risks difficult. In conclusion, efforts have been made in this paper to outline arguments that will assist in resolving the crime given vulnerability of social network users

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anti-Social Networking?

Social networking is one of the most successful and popular tools to emerge from the Web 2.0 era. However, the increased interconnectivity and access to peoples’ personal lives and information has created a plethora of opportunities for the nefarious side of human nature to manifest. This paper categorizes and describes the major types of anti-social behavior and criminal activity that can aris...

متن کامل

A Survey of Privacy and Security Issues in Social Networks

Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Soc...

متن کامل

A Survey of Privacy and Security Issues in Social Networks

Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Soc...

متن کامل

Supporting Law Enforcement in Digital Communities through Natural Language Analysis

Recent years have seen an explosion in the number and scale of digital communities (e.g. peer-to-peer file sharing systems, chat applications and social networking sites). Unfortunately, digital communities are host to significant criminal activity including copyright infringement, identity theft and child sexual abuse. Combating this growing level of crime is problematic due to the ever increa...

متن کامل

Identity Theft through the Web

In the physical world, an individual’s identity is verified by legal documents including passports, driver’s licenses, birth certificates, and identification cards. Identity can also be authenticated by biological features (such as fingerprints or DNA) or demonstration of secret knowledge (passwords). Naturally, online identities can not rely on physical evidence. Instead, online identities are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016