Reading response 1
Vangie ‘Aurora’ Beal. “Defend Yourself Against Identity Theft.” Webopedia.com . 01 Sept. 2006. 06 March 2007.<>.
Summary: This website talks about what identity theft is and what it is on the internet. It explains the methods of internet identity theft such as Trojan horses and e-mail phising, which both put key loggers on your computer and track everything you type. This will give the thief all of your personal information and they will be able to steal identities. It also mentions that internet fraud is only a small portion of overall identity theft and the numbers seem to be decreases over the past few years. The website gives tips for protecting yourself against internet identity theft and what to do if it happens to you.
Importance: This is important because it gives some background information on primary identity theft and then what internet identity theft is.
Connections: I knew what identity theft was but I didn’t know exactly how identity theft worked on the internet.
Supporting source: I can use this article for basic information and it also gave some statistics that I can use as well.
Argumentative Source: I think there should have been more information on exactly how identity theft works so the reader would be a bit more informed and knowledgeable.
Reading Response 2
Russell Kay. “Phishing.” Computerworld.com . 19 January 2004. 06 March 2007.
Summary: This article talks about internet phishing. Phishing is a way for people to steal identification. Thieves will send out fake e-mails and try to pass them off as an email from a legitimate source such as eBay , Citibank, etc. It also gave examples of internet phishing that has been reported in the past from well known websites. It gave tips to know if the e-mails are legit or not.
Importance: This is a major scheme used by internet thieves and is important to understand how and what it is.
Connections: I had no idea what phishing was until I looked into internet identity fraud.
Supporting Source: This could be used as an example in my paper. I can use it to show ways a hacker may try to access personal information.
Argumentative Source: There should be more information in the article. It does provide facts but doesn’t go too far in depth.