• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Credit card fraud.

Extracts from this document...


Credit card fraud Criterion A - Describing the Issue: Describe correctly the underlying issue with an extended reference to a social context. (4 marks) As soon as you access the World Wide Web you become susceptible to hackers who are able to access your computer, your files and your internet records. A hacker is able to access a store's database, which are usually private but an experienced hacker might be able to enter it anyway, from this database he can obtain information about the store's customers such as their names, addresses and even credit card numbers. Parting from this point a hacker can use the information within the same store to purchase things using a customers name and credit card and send it to his own address (Helft, 2002). This way both the store and the customers lose. Credit card customers who don't report this on time are viable to end up paying for the product the hacker has purchased. ...read more.


If the employees have access to this database then they need only to access it, obtain the information and use it elsewhere in the name of their customers, if the data is not accessible to anyone and it's not a public database, then any hacker (with or without much experience) will be able to enter the database and extract this information without being noticed until after the crime is committed. Codes and passwords can be easily decrypted and found as stated in the articles "Introduction to hacking" (The Mentor, 2002), "How do I hack" (j0662, 2002) and "Password Cracking" (Kitten, 2002). The issue with ATMs (Automatic Teller Machines) is that there's not much privacy when inputting the PIN number (a well located camera could easily tape this) or when retrieving both money and the card. Even inexperienced `hackers' are able to do this by sticking gum into the card slot and later retrieving it with tweezers after learning the PIN entered by the card's owner. ...read more.


(6 marks) People should be able to make their transactions free of peril and harm but this isn't the case in most parts of our country and people usually don't trust ATMs which are in public places, though employees in companies and businesses aren't keen to credit card fraud (as far as I'm concerned) in fear that they'd lose their jobs but it might become a greater issue as jobs are assured and they become accessible to computers. This problem might be solved in different ways: 1. Avoid using a `third party' for credit card transactions and teach customers to do this on their own. 2. Keep the POS machines nearby so the employee doesn't have time to note down any information such as the credit card numbers, expiration date and name on the card. 3. Forbid companies to have and/or distribute customers' information, included credit card numbers. Criterion E - Selecting and Using Sources: Two or more appropriate sources are referenced in this section and cited in the document body. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays


    The production is responsible for making sure raw materials are processed into the finished good effectively. The new designs can be used to attract new customers to Marks and Spencer. In January 2001 Roger Holmes, Managing Director of UK Retail, joined the company, he appointed new design talent to deliver

  2. Business report on Marks and Spencer.

    Marks and Spencer also have to attract new customers, they must target the younger market, and this could help to boost their sales. The chairman and Chief Executive Luc Vandevelde also want to attract new customers, so that the UK sales increase.

  1. Implementation of ATMS at SBI. Banks in India are looking at deploying biometric ATMs ...

    The solution uses voice channel, unlike traditional GPRS (General Packet Radio Service) connectivity using data, making it more reliable and fast. Banks will be able to increase their ATM penetration with reduced overhead costs, faster deployments, better security, improved efficiency and functionality compared to other legacy technology being used.

  2. Dell - The reason for selecting Hong Kong.

    office leasing system, individual consultant: expert purchasing, decentralization small business center: buyer centre, centralization, system purchases medium and large business: sealed bidding, contractual arrangement Buying criteria competitive price (cost saving) emphasis on terms and condition, high technologies knowledge request (demanding quality and product performance)

  1. Access to computing

    Because of these changes the partners may need to install some rules and regulation and they will also have to make sure that health and safety regulations are being followed by all members of staff. The design cycle consist of planning, design, implementation, testing, training and maintenance.

  2. Proposals to introduce a national identity card in the UK have always generated hot ...

    Ann Cavoukian1 As with any controversial issue, there are the proponents of the cause, those who support the idea because they think it could reduce crime as a whole, and we have the opponents who believe that the cards would cut back on their personal freedom.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work