Ronald J. Leach's lectures on identity theft have been attended by more than 1,200 people. Many more have heard him on closed-circuit television. This experience, and his long experience as a professor of computer science make him uniquely qualified to write this book.
Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases? What about when you are using email, web surfing, texting, or social networking? If you don't, then Identity Theft in the Cyber Age is the book for you.
This easy-to-understand book, intended for the general, non-specialist reader, will tell you what to do and what to avoid when preparing your taxes; going to a bank, pharmacy, or doctor; shopping in person; traveling; or using any kind of electronic commerce. You’ll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain software systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of “Pameiob.” You'll learn how you have to protect yourself from the kinds of identity theft that can occur even if YOU never do any online shopping.
This book is a comprehensive, easy-to-understand guide that is dedicated to keeping your assets and identity safe while navigating this dangerous world. The book is based on the author's experiences as a long-term identity theft consultant and lecturer and computer scientist. Major topics in this complex subject are illustrated by case studies describing the personal experiences of some of the author's friends and acquaintances, and by experiences of some prominent public figures. You'll learn about the potential profit margins that make cybercrime so appealing to criminals - and why such crime is so hard to prosecute.
In this book you will learn just how pervasive the crime of identity theft is, and how you are at risk even if you don't do any online banking or make any online purchases using a credit card. We'll discuss some simple strategies that can help you cope with the side effects of the increase in digital information that is already available to potential identity thieves.
There are four main chapters. Chapter 1 is entitled "Identity Theft: How Bad Is It?" and provides an overview of this all too common problem.
Chapter two, entitled "Identity Theft: How Vulnerable are You?," provides examples of actual cases of the most common types of identity theft that occur today.
The third chapter is entitled "Protect Yourself From Identity Theft" and contains a set of strategies that can be used to greatly reduce the chances of you suffering identity theft.
The fourth chapter is entitled "What To Do If You Are An Identity Victim." It provides a set of overall strategies and specific actions you should take if you are the victim of identity theft.
There are three appendices. The first appendix contains contact information for the Federal Trade Commission, the three major credit reporting agencies, many US banks, many consumer protection organizations, and a few of the more established companies that specialize in identity theft protection and recovery. The second appendix contains a checklist for protecting yourself from identity theft. Appendix three also contains a checklist; this one is used to aid you in recovering from identity theft if you are a victim.
|Series:||Identity Theft , #1|
|Sold by:||Barnes & Noble|
|File size:||4 MB|
About the Author
He recently retired as Professor and Chair Emeritus from the Department of Systems and Computer Science at Howard University, where he had taught since 1969. He received the B.S., M.S., and Ph.D. degrees from the University of Maryland at College Park and the M. S. degree in Computer Science from Johns Hopkins University. His research interests include distributed systems, performance modeling and capacity planning; and most areas of software engineering, especially software reuse, fault-tolerance, and software performance measurement and their empirical foundations. Some of his current work includes the application of computing to the social sciences, especially in the area of name matching within historical documents, using both his computer search skills and genealogical knowledge. He is an experienced cruise ship lecturer, with special emphasis on identity theft and computer forensics. He also lectures to other groups.
Ron Leach is the author of seven print books: "Using C in Software Design," Academic Press Professional,"Advanced Topics in UNIX," John Wiley; "Object-Oriented Design and Programming in C++," Academic Press Professional, Software Reuse: Methods, Models, and Costs," McGraw-Hill, "Introduction to Software Engineering," CRC Press, "Genealogy for the Information Age," Disruptive Publishing, and "Relative Genealogy," Disruptive Publishing. He has published two books on the subject of identity theft: "Twelve and a Half Steps to Avoid Identity Theft," as an ebook, and "Identity Theft in the Cyber Age," which is available as both an ebook and in print. Revised editions of many of these are available as ebooks.
Dr. Leach has offered technical training and seminars on software reuse, reengineering, and testing on three continents. He has lectured on a variety of other topics between continents! He is also the author or co-author of more than one hundred technical papers. In his spare time, he is the co-Editor of the Maryland Genealogical Society Journal and is webmaster for its newly designed website.