According to an article, “Stalking Goes High Tech”, by Robert Docksai, “Of the 3.4 million Americans who reported being stalked… 27% reported being cyberstalked…” “Six percent said that their stalkers stole their identities to open or close financial accounts in their names, steal funds from their existing accounts, or make unauthorized charges to their credit cards.” Social networking is creating an opportunity for individuals to discover data about others and conceivably cause harm to them. According to an article in Risk Management, by Hilary Tuttle, some individuals who utilize social media networks offer data they would not normally uncover (44). Predators take advantage of the information that is being released from their victim. For example, one might share that they will be on vacation for the remainder of the week and people who want to cause harm might take it as an invitation to burglarize the individuals’ home. Many disclose personal information online because they think they are not of any target by evildoers. Tuttle states “Most consumers enjoy a false sense of security: more than three quarters of respondents believe they ae not of any interest to cybercriminals” (Tuttle 44). Stalking is also getting easier to do when all you have to do is type an individual’s name on a social network site and possibly find them. Facebook, a social network site, has an option where you can send instant messages to other people and at the same time share your location. It is becoming difficult for police to investigate who is behind the stalking or cybercrime since they cannot count messages as proof (Docksai 14-5). J.R Slosar explains in The Culture of Excess that in America, identity theft is one of the quickest developing wrongdoings (158). “3.6 million households experienced some form of
According to an article, “Stalking Goes High Tech”, by Robert Docksai, “Of the 3.4 million Americans who reported being stalked… 27% reported being cyberstalked…” “Six percent said that their stalkers stole their identities to open or close financial accounts in their names, steal funds from their existing accounts, or make unauthorized charges to their credit cards.” Social networking is creating an opportunity for individuals to discover data about others and conceivably cause harm to them. According to an article in Risk Management, by Hilary Tuttle, some individuals who utilize social media networks offer data they would not normally uncover (44). Predators take advantage of the information that is being released from their victim. For example, one might share that they will be on vacation for the remainder of the week and people who want to cause harm might take it as an invitation to burglarize the individuals’ home. Many disclose personal information online because they think they are not of any target by evildoers. Tuttle states “Most consumers enjoy a false sense of security: more than three quarters of respondents believe they ae not of any interest to cybercriminals” (Tuttle 44). Stalking is also getting easier to do when all you have to do is type an individual’s name on a social network site and possibly find them. Facebook, a social network site, has an option where you can send instant messages to other people and at the same time share your location. It is becoming difficult for police to investigate who is behind the stalking or cybercrime since they cannot count messages as proof (Docksai 14-5). J.R Slosar explains in The Culture of Excess that in America, identity theft is one of the quickest developing wrongdoings (158). “3.6 million households experienced some form of