Реферат по предмету "Иностранный язык"


Security On Internet Essay Research Paper Internet

Security On Internet Essay, Research Paper

Internet has become an essential tool for daily tasks. The options people have

nowadays are limitless: banking, shopping, booking reservations, chatting, and

so on. However, several drawbacks have arisen that are of concern to all of the

internet users. Unfortunately, incidents of auction fraud, the sale of illegal

items, and criminal trespassing are booming in the e-commerce market. The nature

of the Internet and the ease of gaining anonymity on it, has made crime easy and

catching criminals much more difficult. Many cases of fraud have occurred:

people who collect payments from buyers and never ship the goods to them.

?Earlier in the summer, for example, former eBay seller Robert Guest pleaded

guilty to mail fraud. Prosecutors had accused Guest of collecting approximately

$37,000 from bidders for items he never shipped.? 1 Cases like these are a

real drawback for e-commerce. The lack of tangibility has been a major obstacle

in doing transactions online and these cases only serve to destroy the little

confidence that consumers have gained so far. Many people are hesitant to shop

online, for example, and when they hear of fraud cases it only serves to confirm

their initial fears. That is why organizations such as The Better Business

Bureau (BBB) and The Federal Trade Commission (FTC) are educating consumers to

protect themselves. These agencies know that thousands of consumers are taking

advantage of the opportunity to shop from the comfort of their homes via

personal computers. A person can buy anything and avoid crowded malls, long

lines and busy parking lots. Furthermore, the Internet is always open: 7 days a

week, 24 hours a day. In order to actually benefit from online shopping, certain

things must be taken into consideration. The BBB?s Web site contains a section

that offers tips on ?What You Need to Know About Cybershopping.? 2 The tips

are the following: ? When dealing with a new merchant, ask for its physical

location in order to check its reliability with consumer agencies (i.e. The

BBB). ? Determine the company?s refund and return policy before you place an

order. ? Never give out your Internet password. When creating a password avoid

using established numbers, such as your house number, birth date, telephone

number or Social Security number. If you are asked to create a new account,

never use the same password you use for other accounts. ? Be cautious if you

are asked to provide personal information (i.e. Social Security number or bank

account information). ? Look at the ?address? of the site, the URL ensures

that you are dealing with the right company. It is good to print out a copy of

your order and confirmation number for your records. ? Know your rights. The

same laws that protect you when you shop by phone or mail apply when you shop

online. Under the law, a company must ship your order within the time stated in

its ads. If no time is promised, the company should ship your order within 30

days after receiving it, or give you an ?option notice.? ? If you decide to

pay by credit card or charge card, your transaction will be protected by the

Fair Credit Billing Act. ?Under this law, consumers have the right to dispute

charges under certain circumstances and temporarily withhold payment while the

creditor is investigating them. In the case of unauthorized use of a

consumer?s credit card or charge card, consumers are generally held liable

only for the first $50 in charges.? 3 If you are not comfortable entering your

credit card or charge account number online, call it in to the company?s 800

number or fax it. The FTC also contains a section which offers consumers tips on

online safety. In addition to the ones made by the BBB, The FTC also suggests

that: ? Use a secure browser. This is the software that you use to navigate the

Internet. Your browser should comply with industry security standards, such as

Secure Sockets Layer (SSL) or Secure Electronic Transaction (SET). These

standards scramble the purchase information you send over the Internet, ensuring

the security of your transactions. Most computers come with a browser already

installed or you can download one over the Internet for free. ? Before signing

up for any service or buying any product, evaluate how the company is securing

your financial and personal information. Many companies explain their security

procedures on their Web site. Other companies give you options on their Web site

as to whether and how your personal information is used. Trespassing and

unsolicited e-mails Another main concern on the Internet is the trespassing.

Bulk e-mails are flooding our systems everyday. The main problem with these

unsolicited e-mails is that most of the times they are scams. The FTC made a

list that highlights the 12 scams that are most likely to arrive via bulk

e-mail. 1 Business opportunities. These e-mails make it sound very easy to start

a business that will bring lots of income without much work or cash. The scam:

they are usually illegal pyramid schemes. 2 Bulk e-mail. You receive offers to

sell you lists of e-mail addresses for your own bulk solicitations. The problem:

sending bulk e-mails violates the terms of most internet service providers. In

addition, some states have laws regulating the sending of unsolicited e-mail. 3

Chain letters. You?re asked to send a small amount of money to each of 4 or 5

names on a list, replace the names on the list with your own and forward. The

scam: chain letters are almost always illegal and most of the people who you

forward the message to, are not likely to pay. 4 Work-at-home schemes. These are

envelope-stuffing solicitations that promise steady income for minimal labor. In

most of the cases you have to send money for a start-up kit. The problem is that

once you pay the money, you either never hear from them again, or you receive a

kit that is clearly not worth the amount of money that you mailed. 5 Health and

diet scams. These e-mails offer pills that will let you loose weight without

exercise or changing your diet; cures for impotence or hair loss. The scam is

that these gimmicks don?t work. 6 Effortless income. Typically a

?get-rich-quick? scheme that offers unlimited profits. The problem is that

these systems don?t really work. If they did, wouldn?t everybody be rich? 7

Free goods. You are offered valuable goods for free after gaining a certain type

membership that you have to pay for. In reality, the goods aren?t free and in

some of the cases you don?t even receive the goods. 8 Investment opportunity.

You are offered outrageously high returns with no risk. You usually have to send

money and after you do, you never hear from these people again. 9 Cable

?descrambler? kits. For a small amount of money you can buy a kit to

assemble a cable descrambler that supposedly allows you to receive cable TV

transmission without paying any subscription. The scam: it?s not going to work

and you can?t even complain to authorities because you were engaging in

something illegal by trying to steal cable service. 10 Guaranteed loans or

credit, on easy terms. This turns out to be a useless list of lenders who will

turn you down if you don?t meet their qualifications. 11 Credit repair. These

are offers to erase negative information from your credit file. The people who

promote these services usually can?t deliver and they can in fact get you in

trouble with the law because the advice you to lie on loan/credit applications

or to misrepresent your Social Security number. 12 Vacation prize promotions.

Typically you win a fabulous vacation. The truth is that this is an easy way to

collect information form you, for marketing purposes. Also, most of the times

you end up paying for specific dates and upgrading. 4 There are however, ways in

which to eliminate or at least reduce the amount of bulk e-mails that are sent

to you. In most of the cases you can remove yourself from the sender?s mailing

list. In addition there are organizations that are formed with the purpose of

filtering information. One of the most known organizations is TRUSTe. TRUSTe is

an independent, non-profit organization whose mission is to build users? trust

and confidence in the Internet by promoting the use of fair information

practices. OptList is a Web site designed to filter the information that you

receive via e-mail. Its privacy practices have been reviewed for compliance by

TRUSTe. OptList wants to demonstrate its commitment to consumer privacy. By

displaying the TRUSTe trustmark, this web site has agreed to notify Internet

users of: 1. What personal or identifiable information is being collected from

the web user 2. The organization collecting the information. 3. How the

information is used. 4. With whom the information may be shared. 5. What choices

are available to you regarding collection, use and distribution of the

information. 6. The kind of security procedures that are in place to protect the

loss, misuse or alteration of information under OptList, Inc. control. 7. How

you can correct any inaccuracies in the information. 5 The OptList Web site is

committed to filtering the information that you do not want. ?Our mission is

to help reduce the unsolicited e-mail traffic on the Internet. To help consumers

gain control over the flow of unsolicited e-mail into their inboxes. To help

ISPs gain control over the flow of unsolicited e-mail into their mail servers

and to help marketers comply with the preferences of consumers and ISPs.? 6

Companies can really make a difference in addressing consumers needs. There are

many tools available out there in order to protect consumers from Internet scams

and fraudulent deals. The important thing is to be well informed and use common

sense.

1 http://news.cnet.com/news/0-100/-202-830601.html 2 http://www.bbb.org/library/cybershop.html

3 http://www.tfc.gov 4 http://www.tfc.gov 5 http://www.OptList.com 6 http://www.OptList.com




Не сдавайте скачаную работу преподавателю!
Данный реферат Вы можете использовать для подготовки курсовых проектов.

Поделись с друзьями, за репост + 100 мильонов к студенческой карме :

Пишем реферат самостоятельно:
! Как писать рефераты
Практические рекомендации по написанию студенческих рефератов.
! План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом.
! Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач.
! Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты.
! Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ.

Читайте также:
Виды рефератов Какими бывают рефераты по своему назначению и структуре.

Сейчас смотрят :

Реферат Macbeth Essay Research Paper Nostalgia in
Реферат Education (Образование в англоязычных странах)
Реферат Требования к составлению и оформлению должностной инструкции на примере должностной инструкции
Реферат Учет и анализ показателей по труду в промышленных предприятиях
Реферат Television Censorship Essay Research Paper It is
Реферат Правове регулювання безпеки життєдіяльності управління та нагляд за безпекою життєдіяльності 2
Реферат Особенности денежного оборота в разных моделях экономики
Реферат Промышленное получение кормовых дрожжей на мелассно-спиртовых заводах
Реферат Hard Times Essay Research Paper Hard TimesAll
Реферат Использование ЭВМ при обучении математике
Реферат Контрольная рабоат по Охране труда
Реферат Lea Valley 2
Реферат Краткое содержание Разбойники Фридрих Шиллер
Реферат Количественный и качественный анализ акцентуаций характера старших школьников
Реферат Муниципальная собственность как основа местного самоуправления