Thursday, November 21, 2019
Course Project-Research Proposal Assignment Example | Topics and Well Written Essays - 500 words
Course Project-Research Proposal - Assignment Example to be protected by their respective governments from such fraudulent individuals but they also have a responsibility to take all the necessary precautionary measures to minimize their exposure to identity theft. 1) Having oneââ¬â¢s identity taken away by individuals with wrong motive is one of the most difficult things for the individual to deal with. It could interpret to inability to pay bills or even worse, inability to obtain credit besides exposing the person to more destructive eventualities. 2) Although am not an expert in the field of identity theft, it is self-evident that everybody is a potential victim of such occurrences. This implies that it is necessary for all to be equipped with the appropriate information on how to deal with such modern realities. Through the exploration of some expertsââ¬â¢ work within the field of identity theft, I am able to establish my credibility in responding to the issues surrounding identity theft. Such experts include Saleh (2013), Mulig, Smith and Stambaugh (2014), and Biegelman (2002). 2) My secondary audience will be my professor in this course as well as fellow classmates, some of whom have been victims of identity theft and who would desire greater exposure on precautionary measures to protect themselves from such future recurrences. 3) Except for some few individuals who believe there is nothing much one can do to protect themselves from identity thieves, majority of my audiences share in my school of thought that it is possible to create a wall between oneself and such fraudulent individuals. From exploration of a number of literatures, it is evident that identity theft is often a crime of opportunity, which implies that precautionary measures can go a long way in reducing risks. Most of the attacks have been made possible because of negligence and loopholes created by the victims themselves, thus they have a significant role to play in ensuring that they are safe. It is a fact that both technology and hackers
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.