Credit Card Fraud: Research In Relation To CW1



Credit Card Fraud

Anyone who owns a credit card and has access to online banking could potentially become victim to credit card fraudsters. As careful and cautious as you may be it is truly easy to be taken in by simple scams. Surveillance from fraudsters happens against particular individuals and their behaviors. Fraudsters target a specific surveillance technique in order to attack particular information domains. Best (2010 p15) comments

'Rather than nebulous and far reaching, respondents fears about surveillance could be targeted to highly specific worries about finance. These fears were always set in the context of specific behaviors that could offset or promote risk.' Best (2010 p15)

These risks produced create a surveillance that can be controlled by fraudsters. Every detail that is being surveyed on the internet is being tracked down to commit crime at its worse level. The public's privatization is shrinking and the masses are only being surveyed as data samples and banks. This level of surveillance is causing the globe to be in a state of constant alert producing panic culture and also creating questions of security. Best (2010 p15) comments

'When asked if they were aware of or concerned about surveillance, many respondents pointed specifically to credit card and identity fraud, even though these could be seen as distinct processes concerning security more properly. When asked if they had heard any stories regarding surveillance, various types of financial fraud again played a prominent role. Specific scenarios painted were of identity theft, phishing scams involving fake websites, credit card information being kept or overheard and misused, and scams involving automatic teller machines.' Best (2010 p15)

The control of surveillance is continuous and unbounded creating a society wracked by anxiety. Corruption from fraudsters takes on a new power as they become the new business center and soul of surveillance.

Best, K. (2010) 'Living in the control society: surveillance, users and digital screen technologies', International Journal Of Cultural Studies, 13 (5) p110.

No comments:

Post a Comment