Monday, February 17, 2020

Identity Theft Essay Example | Topics and Well Written Essays - 1500 words

Identity Theft - Essay Example It can start with lost or stolen wallets, stolen mail, a data breach, computer virus, ‘phishing’ scams etc† (ITRC, 2012). In the current scenario, internet is the extensively used medium for such crimes. Hackers globally are carrying out copious activities to steal the identity of persons for their personal goals or for the interests of some other stakeholders who pay them. Identity theft is also carried out by persons due to their personal rivalries and also by some countries against their rival countries. Many countries are engaged in stealing the personal information of the high level officials of other countries in order to maintain their check on the rivals. When it comes to internet and cyber technologies, tactics like computer viruses, hacking computer networks, obtaining the personal information about the victims from social networking sites and using them to figure out their secret codes, observing the victims typing their personal passwords on public syst ems, abducting their personal information from web browser logs using spywares, installing malwares on the victim’s computer, credit card cloning etc. are used for identity theft. The prime reason for why internet identity theft is widely practised by criminals is that they can carry out crimes on some others’ identity or rifle someone’s accounts in a safer way such that it will be not very easy to figure out the real culprits or the person whose identity they have used for conducting the crime. Internet has grown in such a way that people carry out many of their activities like banking, shopping, bill payments etc. through internet. Social networking sites like facebook, twitter, Google plus etc. have become widely societal that they have emanated as a part of the daily lives of the proletariat. Email has outraged the habit of sending written mails from people. Email is today a vital mode of sending messages among persons to organizations to governments. All th ese have set up a platform for the cyber criminals for their easy patrolling on the net and it has become an easy task for hackers to steal the personal information of others. The Internet Crime Complaint Centre of FBI has listed out the current and ongoing internet trends and schemes in carrying out cyber crimes. They are:-auction fraud, auction fraud-Romania, counterfeit cashier’s check, credit card fraud, debt elimination, parcel courier email scheme, employment or business opportunities, escrow services fraud, internet extortion, investment fraud, lotteries, Nigerian letter or ‘419’, phishing or spoofing, ponzi or pyramid, reshipping, spam, third party receiver of funds (Internet Crime Complaint Center, n. d). Kevin J. Connolly (2004, p. 348-49) in his book ‘Internet Security and Privacy’ describes the privacy rights of internet users and the ways to safeguard their private information. He says the primary worry of a person when he browses the in ternet is lack of privacy. Lack of privacy protection can help a stranger to collect information about the consumer’s activities. The user should be aware about the information provided to a website. User should also be aware of the privacy policies of the websites or online services concerned. Connolly (2004, p. 348-49) points out that users often do not care to go through the privacy notices and

Monday, February 3, 2020

Marketing and Promotion Research Proposal Example | Topics and Well Written Essays - 1000 words

Marketing and Promotion - Research Proposal Example One of the most common used of promoting the products is the use of different celebrities to endorse the product. Identify the specific advantages and disadvantages of using celebrities as part of the advertising program - this can be obtained though in-depth research on the different industries using specific styles of media advertising through celebrity endorsements On the other hand, a series of interviews with some media advertisers will also be conducted so as to have a better idea on why celebrities are used in endorsing a certain product and how the consumers react to such form of media advertising. Results and discussion of the study will be obtained by analyzing the results of the interview conducted and correlating it with the research. Mean, mode and percentage will be obtained in getting the best possible results. These will then be tabled and graphed for easy presentation of data. More so, there will be a analytical analysis of the information that will be gathered from the interview. A part of the result and discussion will then be limited to what the interviewees will reveal. This will be considered as the only limitation oft his research paper. CRITICAL PATH Reference: Bhattacharyya A., (2005) "Advertising in Specialized Markets: Example from the U.S. Pharmaceutical Industry," Boston College working Paper No.610, http://fmwww.bc.edu/ec.p/wp610.pdf, Brown, Alex. (1996). "BUAD 301, Introduction to Marketing" Butters Gerard R., (Oct.,1977) "Equilibrium Distributions of Sales and Advertising Prices," The Review of Economic Studies Vol. 44 No.3: pp.465-491 Grossman G.M. and Shapiro C., (1984) "Informative Advertising with Differentiated Products," Review of Economic Studies Vol.5 No.1,: pp. 63-81 Haller H and Chakraborti S., (2002) "An Analysis of Advertising Wars," http://www.econ.ku.dk/CIE/Discussion%20Papers/2002/pdf/Haller%2003.pdf Kaldor Nicholas, (1950) "The Economic Aspects of Advertising," Review of Economic Studies Vol. 18: pp. 1-27 Manski C.F., (1993) "Identification of Endogenous Social Effects: The Reflection Problem," Review of Economic Studies Vol.60 No.3,: pp. 531-542 Rubin P. H., Schrag J. L., (1999) "Mitigating Agency Problems by Advertising, with Special Reference to Managed Health Care," Southern Economic Journal Vol. 66, No.1,: pp. 39-60 Stigler George J., (June 1961) "The Economics of Information," Journal of Political Economy Vol. 69 No.3: pp. 213-225 Tessler L.G., (1964) "Advertising and Competition," Journal of