Setting password for personal information and creating private accounts on social networking is not an entirely effective method of dealing with problems like identity theft and it is irrational. This is because there have been so many cases of identity theft over the past few years even after users have been encouraged to use private accounts and complicated passwords. This practice is irrational because it does not consider cases like electronic forgery, which cannot be prevented through passwords, and private accounts alone (Stutzman 15). It involves using the user’s passwords to create a fake one. Therefore, it uses the solutions created for users to create an even bigger problem. Methods that are more complex should be …show more content…
They argue that the criminals use someone else’s personal information like their address or name and therefore the best way to prevent that is by use of private accounts and passwords. They also argue that crimes happen when they get peoples personal information and creating new ones therefore hiding personal information is the best way to go about it. Otherwise, what they do not look at is the great perspective of identity theft. It does not only occur to people socializing on social media, it also includes business people who get information from the social networks (Bilge). These business people also exchange ideas on social networks and they interact on social network. This alone can cost a businessperson a lot thus it requires more than just a private account to secure such information. Firms also have their accounts in different social networking sites and they use their employees to interact with customers in order to know their tastes and presences and measure quality of their products (Bilge). During such activities is when some information about the company leaks and it is hacked. Therefore, before concluding that passwords are the best form of security, identity theft should be looked at in broader terms (Aimeur, Gambs and …show more content…
For example, the fact that it looks at only one dimension of identity theft makes it weak. This is because it leaves loopholes for such crimes. Securing information is supposed to be all round and it should take care of both personal information and sensitive data of the organization (Aimeur, Gambs and Ho). It should also think about the government because as mentioned earlier it is a target and it has also been affected by this crime. The administration of passwords and private accounts does not thoroughly evaluate the bigger picture and the long-term effect. Shallowly, identity theft may happen if someone gives out their log in details or of the log in at some public place and forget to log out. That is an easy target because no effort is needed to hack into that account. This is where passwords are most effective if people learn to use them privately. Otherwise, carelessness could lead to identity theft. People who forget to log out after using social networking on someone else’s phone or computer can expose themselves to this crime (Aimeur, Gambs and Ho). On the other hand, some people use too complicated passwords even for themselves. This therefore makes them not to log out after using their Smartphone to avoid missing out the details the next time. If someone else uses that phone, they can log in and steal personal information, which helps them hack into the victims account. It