Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Deep Impact of Information Technology and the Lost Cost of Identity, Research Paper Example

Pages: 2

Words: 642

Research Paper

Social networking is a current fad that human individuals adhere to. Due to the increase of the popularity of social networks such as facebook, twitter and others, people at present views the society in a much different manner. Connecting from one place to another has been as easy as one click of a button hence making these forms of communication more evidently efficient compared to others. True, through these forms of online application, people are not only able to connect to each other; they are also able to express themselves online. Information technology has specifically made it a point that people from all nations are placed together closer to each other hence making it easier for them to make a conceivable relationship between people.

Modern information technology however does not only provide a means of improved communication between people [or P2P operations]. It also imposes on the new system of operation for businesses situated abroad to cater to the needs of a larger market [this is often called as the B2C or business to client operation]. In consideration with this process, it could be analyzed that several information about clients are being passed on through the internet just so to be able to complete particular transactions online. Take for example Paypal [an online payment delivery service]; it does provide top-of-the-line service however, among the requirements it imposes on its clients is for them to share some of their personal information including the number of their credit cards for confirmation of membership (Michael, 2009). True, this is a protocol and if one wants to become a member, there is a need to comply with the requirement mentioned.

With these cases considered, it could be analyzed that information technology does provide efficient provision of connection for both people and businesses. Nonetheless, it could be noted that along with these provisions come specific consequences that human individuals need to be very careful of (McFadden, 2007). One is that of the possibility of an emergence of identity theft that could endanger both their sense of security and specifically the personal aspects of their life. Identity theft usually occurs when the network or the database of a particular company is not well protected making it easier to be accessed by computer hackers which mean that it would be easier to access the said data system and use the information stored in it.

This is the crucial reason why many individuals, no matter how much they wish to become more disdained as to be connected through the internet and handle business through it are having a hard time expanding their choices due to the fear of becoming one of the victims of identity theft. To respond to this particular dilemma that questions the reputation of the internet and its capability to provide top of the line and well secured source of business and personal transactions, programmers and web developers have created specific programs that would enable extensive protection especially for businesses operating online. These programs however could be considered as primary investments for business enthusiasts as they do cost some amount of money that is at times priced at a more expensive level as it does give optimum service to the business owners and their clients at the same time (Gralla, 2007). True, with the advancement of modern technology, almost anything is possible. The considerable way of manifesting the course of development that the internet shall embrace should strongly be defined through the values that its major users recognize. It is with this particular factor of consideration that internet developers are challenged at present to make sure that their system is efficient enough to handle public demand.

References

Gralla, Preston (2007). How the Internet Works. Que Pub, Indianapolis.

Michael,Sara, (, 2009-05-21).”Getting Red Flag Ready” PhysiciansPractice.com. (Retrieved on November 1, 2011).

McFadden, Leslie (2007-05-16). “Detecting synthetic identity fraud“. Bankrate.com. pp. 1–2. (Retrieved on November 1, 2011).

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

Media Account Analysis: National Geographic, Research Paper Example

National Geographic is an established Instagram account with over 241 million followers. In all its posts, National Geographic focuses on oceans, land, wildlife, human ingenuity, [...]

Pages: 2

Words: 567

Research Paper

Health Reasons for Abortion, Research Paper Example

Abortion remains one of the most controversial subjects in the world, as some people support that it should be freedom while others believe it is [...]

Pages: 3

Words: 720

Research Paper

Indigenous Caribbean Art, Research Paper Example

Introduction The portrayal of cultural characteristics that are important to the populations that are native to that location is a common feature of the indigenous [...]

Pages: 9

Words: 2341

Research Paper

Jean Lamarr, Research Paper Example

Introduction Different cultures have different ways of fostering creativity and imagination. However, since people might be impacted by values and norms from different cultures, artists [...]

Pages: 5

Words: 1511

Research Paper

The Oppression of Indigenous People in Layli Long Soldier’s Whereas, Research Paper Example

Introduction Colonization perpetrated the oppression of indigenous communities. Also, the struggle against cultural imperialism lay at the heart of oppression as the culture of native [...]

Pages: 7

Words: 2029

Research Paper

Reviled and Loved Prompt, Research Paper Example

Introduction The media and channels of communication are vital in passing information in a society (Lovari et al., 2020, p315-p328). The information is specifically addressed [...]

Pages: 7

Words: 1948

Research Paper

Media Account Analysis: National Geographic, Research Paper Example

National Geographic is an established Instagram account with over 241 million followers. In all its posts, National Geographic focuses on oceans, land, wildlife, human ingenuity, [...]

Pages: 2

Words: 567

Research Paper

Health Reasons for Abortion, Research Paper Example

Abortion remains one of the most controversial subjects in the world, as some people support that it should be freedom while others believe it is [...]

Pages: 3

Words: 720

Research Paper

Indigenous Caribbean Art, Research Paper Example

Introduction The portrayal of cultural characteristics that are important to the populations that are native to that location is a common feature of the indigenous [...]

Pages: 9

Words: 2341

Research Paper

Jean Lamarr, Research Paper Example

Introduction Different cultures have different ways of fostering creativity and imagination. However, since people might be impacted by values and norms from different cultures, artists [...]

Pages: 5

Words: 1511

Research Paper

The Oppression of Indigenous People in Layli Long Soldier’s Whereas, Research Paper Example

Introduction Colonization perpetrated the oppression of indigenous communities. Also, the struggle against cultural imperialism lay at the heart of oppression as the culture of native [...]

Pages: 7

Words: 2029

Research Paper

Reviled and Loved Prompt, Research Paper Example

Introduction The media and channels of communication are vital in passing information in a society (Lovari et al., 2020, p315-p328). The information is specifically addressed [...]

Pages: 7

Words: 1948

Research Paper

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!