An online identity, internet identity, or internet persona is a social identity that an Internet user establishes in online communities and websites. Although some people prefer to use their real names online, most Internet users prefer to be anonymous, identifying themselves by means of pseudonyms, which reveal varying amounts of personally identifiable information.
In some online contexts, including Internet forums, MUDs, instant messaging, and massively multiplayer online games, users can represent themselves visually by choosing an avatar, an icon-sized graphic image. As other users interact with an established online identity, it acquires a reputation, which enables them to decide whether the identity is worthy of trust. Some websites also use the user's IP address to track their online identities using methods such as tracking cookies.
The concept of the personal self, and how this is influenced by emerging technologies, are a subject of research in fields such as psychology and sociology. The Online disinhibition effect is a notable example, referring to a concept of unwise and uninhibited behavior on the internet, arising as a result of anonymity and audience gratification.
Saturday, August 15, 2009
Friday, July 31, 2009
Precautions to Pevent Identity Fraud and Theft
These are Some Precautions You should take to Escape From Identity Fraud and Theft
1. Safeguard your information and monitor your credit reports often.
2. If you are selling an item and someone will only pay by check, it is probably a scam. The check will appear to "clear" in a short time, but it may take a few weeks for the bank to find out the check is actually fake.
3.Do not accept pre-printed shipping labels from people attempting to purchase goods from you. They may be using a fraudulent shipping account like the one opened in my name. Shippers can re-route packages in mid-stream and the goods get sent anywhere they choose. The person you think you are selling the item to has likely had their identity stolen.
4. Avoid job postings where it appears you will be working for someone overseas that you have never met, such as selling items on ebay or paying US "customers."
1. Safeguard your information and monitor your credit reports often.
2. If you are selling an item and someone will only pay by check, it is probably a scam. The check will appear to "clear" in a short time, but it may take a few weeks for the bank to find out the check is actually fake.
3.Do not accept pre-printed shipping labels from people attempting to purchase goods from you. They may be using a fraudulent shipping account like the one opened in my name. Shippers can re-route packages in mid-stream and the goods get sent anywhere they choose. The person you think you are selling the item to has likely had their identity stolen.
4. Avoid job postings where it appears you will be working for someone overseas that you have never met, such as selling items on ebay or paying US "customers."
Thursday, July 30, 2009
Cyber Spying
Cyber spying is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using illegal exploitation methods on internet, networks or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.
Domain Sniping
Domain sniping is the practice of an individual registering a domain name whose registration has lapsed in the immediate moments after expiry. This practice has largely been rendered moot through ICANN's addition of the Redemption Grace Period (RGP), which allows registrants 30 days to reclaim their domain name. By law there are no perpetual rights to domain names after payment of registration fees lapses, aside from trademark rights granted by common law or statute.
Tuesday, July 28, 2009
Internet Privacy
The ability to control what information one reveals about oneself over the Internet, and who can access that information, has become a growing concern. These concerns include whether email can be stored or read by third parties without consent, or whether third parties can track the web sites someone has visited. Another concern is whether web sites which are visited collect, store, and possibly share personally identifiable information about users.
The advent of various search engines and the use of data mining created a capability for data about individuals to be collected and combined from a wide variety of sources very easily.
The advent of various search engines and the use of data mining created a capability for data about individuals to be collected and combined from a wide variety of sources very easily.
The Data Protection Act 1998 (DPA) : UK
The Data Protection Act 1998 (DPA) is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK. Although the Act does not mention privacy, in practice it provides a way in which individuals can control information about themselves. Most of the Act does not apply to domestic use, for example keeping a personal address book. Anyone holding personal data for other purposes is legally obliged to comply with this Act, subject to some exemptions. The Act defines eight data protection principles.
The E-Government Act of 2002:USA
The E-Government Act of 2002 (Pub.L. 107-347, 116 Stat. 2899, 44 U.S.C. § 101, H.R. 2458/S. 803), is a United States statute enacted on December 17, 2002, with an effective date for most provisions of April 17, 2003. Its stated purpose is to improve the management and promotion of electronic government services and processes by establishing a Federal Chief Information Officer within the Office of Management and Budget, and by establishing a framework of measures that require using Internet-based information technology to improve citizen access to government information and services, and for other purposes.
Subscribe to:
Posts (Atom)