• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Credit card fraud.

Extracts from this document...

Introduction

Credit card fraud Criterion A - Describing the Issue: Describe correctly the underlying issue with an extended reference to a social context. (4 marks) As soon as you access the World Wide Web you become susceptible to hackers who are able to access your computer, your files and your internet records. A hacker is able to access a store's database, which are usually private but an experienced hacker might be able to enter it anyway, from this database he can obtain information about the store's customers such as their names, addresses and even credit card numbers. Parting from this point a hacker can use the information within the same store to purchase things using a customers name and credit card and send it to his own address (Helft, 2002). This way both the store and the customers lose. Credit card customers who don't report this on time are viable to end up paying for the product the hacker has purchased. ...read more.

Middle

If the employees have access to this database then they need only to access it, obtain the information and use it elsewhere in the name of their customers, if the data is not accessible to anyone and it's not a public database, then any hacker (with or without much experience) will be able to enter the database and extract this information without being noticed until after the crime is committed. Codes and passwords can be easily decrypted and found as stated in the articles "Introduction to hacking" (The Mentor, 2002), "How do I hack" (j0662, 2002) and "Password Cracking" (Kitten, 2002). The issue with ATMs (Automatic Teller Machines) is that there's not much privacy when inputting the PIN number (a well located camera could easily tape this) or when retrieving both money and the card. Even inexperienced `hackers' are able to do this by sticking gum into the card slot and later retrieving it with tweezers after learning the PIN entered by the card's owner. ...read more.

Conclusion

(6 marks) People should be able to make their transactions free of peril and harm but this isn't the case in most parts of our country and people usually don't trust ATMs which are in public places, though employees in companies and businesses aren't keen to credit card fraud (as far as I'm concerned) in fear that they'd lose their jobs but it might become a greater issue as jobs are assured and they become accessible to computers. This problem might be solved in different ways: 1. Avoid using a `third party' for credit card transactions and teach customers to do this on their own. 2. Keep the POS machines nearby so the employee doesn't have time to note down any information such as the credit card numbers, expiration date and name on the card. 3. Forbid companies to have and/or distribute customers' information, included credit card numbers. Criterion E - Selecting and Using Sources: Two or more appropriate sources are referenced in this section and cited in the document body. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. REPORT ON THE BUSINESS OF MARKS & SPENCER

    The production is responsible for making sure raw materials are processed into the finished good effectively. The new designs can be used to attract new customers to Marks and Spencer. In January 2001 Roger Holmes, Managing Director of UK Retail, joined the company, he appointed new design talent to deliver

  2. Implementation of ATMS at SBI. Banks in India are looking at deploying biometric ATMs ...

    These were all standalone ATMs. In 1997, the Indian Banks Association promoted a network of ATMs in Mumbai called 'SWADHAN' providing facility of cash withdrawal at ATMs of any of the member banks. This network provided only offline services and consequently, did not become popular.

  1. Access to computing

    Until the testing and training is complete the system will only allow limited access to staff members. B) Hardware There is a range of different equipment which is available for these changes. However there are certain specifications which need to be met and I do not recommend purchase hardware or

  2. Proposals to introduce a national identity card in the UK have always generated hot ...

    But the 'rules' have changed from what they were fifty years ago and the debate must now take into consideration a number of factors, among which is information technology and its use in our present society. Nothing epitomizes modern life better than computers.

  1. Dell - The reason for selecting Hong Kong.

    finance - not only focus on electronic money but also new bank-customer relationship through Internet and online/wireless investment etc Shipping, freight forwarding and logistics - electronic data interchange and Internet-based networks to transmit information and documents with traders Wholesale and retailing - installed bar-coding and point-of-sale (POS)

  2. Business report on Marks and Spencer.

    2 I will use the Annual Report on Mark and Spencer web site. 3 I have also been reading the Financial Times to see if there is any useful information, I can use for the business I is investigating. 4 I have also used the Internet to find more information on the business.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work