First, I would like to thank God and my family for giving me unconditional support through all my personal and professional development. I would also like to show my appreciation to a number of people that where key to the development of this study. First, I am very grateful with Mr. Alexander Bejarano from Ecopetrol for being very supportive and helpful with his wide knowledge and experience in the topic of study. I would also like to thank Mr. Juan Guillermo Perez and Mr. Nicolas Ingram for invaluable information and helping me with interviews. I am also grateful with Mrs. Clemencia for facilitating me first hand material that was critical for this study. I also thank the companies who took the time and actively participated in this study. Last but not least, I would like to thank my supervisor Daniele Archibugi, Department of Management for his useful advice and patience.
DECLARATION
I, (Your name), would like to declare that all contents included in this dissertation stand for my individual work without any aid, & this dissertation has not been submitted for any examination at academic as well as professional level previously. It also represents my own views & not essentially the ones associated with university.
Signed __________________ Date _________________
ABSTRACT
The Internet has brought about major positive beneficial changes in the world. In today's society, you often need to reveal personal bits of information about yourself, such as name, date of birth, a signature, address, phone numbers, and even banking and credit card information. If a thief is able to access this personal information, he or she can use it to commit fraud in your name. Identity theft is such a widespread computer issue which needs to be addressed through user awareness and training. This research will focus on defining, identifying and exploring what is meant by the term online identity theft, and formulate recommendations on how to manage and mitigate the risks of online identity crimes.
TABLE OF CONTENTS
ACKNOWLEDGEMENTSii
DECLARATIONiii
ABSTRACTiv
CHAPTER 1 : INTRODUCTION1
Background1
Problem Statement1
Aims and Objectives2
Significance of the Study2
Motivation of the study3
Purpose of the Study3
Rationale of the Study4
Research Questions5
CHAPTER 2: LITERATURE REVIEW6
Theoretical Framework6
Issues of Online Identity Theft6
Credit Fraud7
Threat of Credit Fraud7
Threats of Online Shopping8
CHAPTER 3 : RESEARCH METHODS10
Introduction10
Explanation of Methodology10
Strengths and Weakness of the Study11
Research philosophy11
Research approach: Deductive12
Research strategy: Pluralistic12
Selection of Research Method13
Research Design13
Literature Design14
Data collection methods and tools14
Data Analysis Methods15
CHAPTER 4: ANALYSIS AND RESULTS16
Survey Results16
Online Payments by Users16
Usage of Online Payment Facility17
Modes of Online Payment18
Usage of Antivirus or Antispyware Software19
Free Usage of Antivirus Software20
Security Level21
Victim of Online Identity22
Disposing off Old Personal Computers23
Promotion of Identity Theft Campaign24
Explaination of the Arguments25
CHAPTER 5: CONCLUSIONS26
Conclusion of Arguments26
REFERENCES28
APPENDIX32
CHAPTER 1 : INTRODUCTION
Background
The Internet has brought about major positive beneficial changes in the world. It makes it easier to keep in touch with our friends and family members and shopping online, but the internet is also behind many changes and adaptations in the way numerous crimes are committed. Vangie Beal (2006). The internet is providing new ways for people to steal personal information and to commit ...