Introduction
Cybercrimes has been said to be the dominant problem in online and networking information sector. The study has revealed that these electronic crimes are becoming very common and dangerous in today's world. Therefore, identity theft is the situation, whereby the criminals, can get someone's personal information online. Like personal information, job identification and other valuable information (Jewkes, 2015). As a result, the report, got from the victim enable the thief to commit frauds, like accessing the victims banking financial accounts and applying loans, credit cards, and other social welfare security benefits like buying homes and cars. Hence, the Peel Regional Police have come up with programs of enlightening the public by educating them about social networking crimes. Firstly, it is advisable not to share your social security number on the social media (Lewis, 2018). Equally, it is essential that when using social sites you log each section by using unique usernames and security passwords. Also, one is advised to minimize logging in all personal details on profiles for security key verification. Lastly, they are supposed to check themselves regularly as well as monitoring their credit by using annual and monthly banking reports (Developing a Policy on the Social Media, 2013).
The reason why social media has become the hotbed of identity and other related crime is the increased use of social media sites among us. As a result, of exposing all our information to the social networks then, it makes one prone to be identified hence falling victim. It happens when you get into the media and post all your actives. Thus, it makes the criminals to open profiles and steal identity details which they will scrutinize it to get all personal identification and use them for fraud purposes without your knowledge. Therefore, everyone who uses social networking site is supposed to very keen on what to share for their security purposes; they are not supposed to share their numbers or driving license on the sites. Because this can give thief's a high chance of accessing their personal information and used against them in malicious ways (Chen, Chung, Xu, et al.2004)
However, the social sites after realizing the criminal actions which are targeting its users it has come up with security key encrypt meaning information cannot get accessed by other parties. Moreover, it has established legal rules to protect their users from fraud and other malicious activities ( Jewkes, 2015) Also; they should come up with different sites for tracking the thieves. Nevertheless, the government is supposed to intervene in these fraud activities by coming up with possible solutions of those who will be found operating illegal actions. Again, they are supposed to agree with social media to come up with better terms in their platforms as well as providing useful private policy measures. Ideally, I think that social networks should not blame for what is happening in our world. Humans are the result of all the problems because, as a result of cognitive advancement ability, they can invent more programs in the sites. However, it the responsibility of social network user to protect from the crime by ensuring that, he or she doesn't feed all personal information on network sites (Lewis, 2018).
According to his Facebook social media information, Rodgers has revealed his information to the public. Job type and the position type, he has uploaded his real profile picture which can be asses by anyone, current location and the city he lives in Strathroy, Ontario not leaving aside the where he schooled and the year of graduation and his professional skills drums. On another side, Sandra Williams in his Facebook account still she has exposed all of her information to the public which can lead her to be the victim of victimization if the information gets into the wrong people (Lewis, 2018). Firstly, she has uploaded her real profile picture which can download and used in malicious ways. Secondly, has revealed her profession and job and position title, banker which the thieves can use it to scrutinize her details to get more information about her identity. And lastly, she has exposed place of schooling which can be used by the hackers to get her personal information very quickly (Jewkes, 2015). Finally, still, Betty has revealed her information just like the other two parties. The report published include, profile picture with other pictures uploaded on the Facebook wall, her personal information, current location, what she does, and her hobbies and interest.
As a result of exposing all their personal information, these Facebook users were responsible for getting public victimizations through; tarnishing of their name by the malicious users. It would occur after their pictures have been downloaded and send on the social media claiming false stories. For instance, in the case of Rodger, they can upload his photo and then came up with false stories concerning this person (Lewis, 2018).
Five Recommendations for Using Social Media Sites
Firstly, the users of social media are warned not to reveal the following information on the social media sites. Their full names, the middle one, date of birth, school and graduation year as well as dates and other personnel-related affiliation. Such factors arise because hackers will use them to identify them. Second, users should stop posting their status and give their location through GPS because the thieves will use the map to determine them. Thirdly, they should only accept, invite and request those people they know in social media because not everyone has a right intention. Some of them are looking for information. Also, users are encouraged not to give their usernames and their passwords to the third party as a way of ensuring their identity is secured. Lastly, they are supposed to change their passwords on their networking sites regularly as a way of providing they well achieved from malicious frauds (Developing a Policy on the Social Media, 2013).
References
Chen, H., Chung, W., Xu, J. J., Wang, G., Qin, Y., & Chau, M. (2004). Crime data mining: a general framework and some examples. Computer, 37(4), 50-56.
Developing a Policy on the Social Media, (2013). Guidance and Recommendations. Retrieved fromhttps://www.nationalpublicsafetypartnership.org/Documents/Developing_a_Policy_on_the_Use_of_Social_Media.pdf
Jewkes, Y. (2015). Media and crime. Sage.
Lewis, L. (2018). Entrepreneurs Organization. How Social Media Networks Facilitate Identity Theft. Retrieved from https://www.eonetwork.org/octane-magazine/special-features/social-media-networks-facilitate-identity-theft-fraud
Cite this page
Essay Sample on Identity Crime in Social Media Networks. (2022, May 03). Retrieved from https://proessays.net/essays/essay-sample-on-identity-crime-in-social-media-networks
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Paranormal Activity and Schindler's List Movies Essay
- Informative Essay on Limitations and Issues Associated with Clinical Psychology
- Criminology Strain Theory in 2pac's Lyrics Essay
- Alzheimer in HBO Documentaries Paper Example
- Film Analysis Essay "An Inconvenient Sequel: Truth to Power"
- Essay on Identifying Communication Strategies in Broward Co. Bond Court
- Essay Sample on Tackling Gun-Related Issues in America: The Influence of Lobbying