Login or e-mail Password   

Identity Abuse

Recently the threat of identity theft has been often reported in the media. Identity abuse, given less attention, deserves a closer look. An identity thief steals someone's iden...
Views: 2.352 Created 11/28/2006

Recently the threat of identity theft has been often reported in the media. Identity abuse, given less attention, deserves a closer look. An identity thief steals someone's identity and assumes that identity, usually for material gain. On the other hand, an identity abuser does not necessarily assume the identity, but nonetheless causes harm to the owner of the identity.

Online we are identified primarily by e-mail address and homepage. We assign a significant personal value to these identities. Our friends and contacts have our e-mail address in their address books and our homepage bookmarked in their favourites. Anyone who has changed e-mail addresses knows the pain of notifying all your contacts and then still missing e-mails because people send them to the old address. If you've changed home page URLs you know the pain of waiting for the search engines to index your new location. If other sites have linked to your pages, you know the pain of getting them to link to your new site.

It's one thing to choose to change your online identity and quite another to have that change imposed on you. Rogers Communications, a high speed cable internet service provider in Canada, is a repeat identity abuser. Since launching their internet offering, Rogers has abused its users' identities 4 times. Most recently, it has joined up with Yahoo, requiring all users with websites to change their URLs. To add injury to injury, any new web sites have annoying geocities pop-up ads on them. Given Rogers' failed partnership with @Home you have to wonder how long Rogers' cosiness with Yahoo will last. Will Rogers users be left once again wandering in the Internet Identity Wilderness?

One method to protect yourself from identity abuse is to take full control of your online identity. Doing so requires some work, but the long-term benefits may be worth it. Here are the steps to taking control of your online identity:

  1. Register your own domain.
  2. Set up your own web site and email; OR,
  3. Use a forwarding service to redirect to your existing e-mail and web site.
  4. Assume your new identity and let everyone know.

Copyright SoftwarePress 2005

Short note about the author

Albert Scherbinsky has been leading successful software development teams and projects for over 6 years and has over 12 years experience in the high tech industry. He is Editor of http://SoftwarePress.com

Similar articles


6
comments: 0 | views: 3355
4
comments: 1 | views: 7737
2
comments: 1 | views: 3258
15
comments: 3 | views: 26555
6
comments: 0 | views: 2937
6
comments: 1 | views: 7912
6
comments: 0 | views: 7494
5
comments: 0 | views: 5418
 
Author
Article

Related topics






No messages


Add your opinion
You must be logged in to write a comment. If you're not a registered member, please register. It takes only few seconds, and you get an access to additional functions .
 


About EIOBA
Articles
Explore
Publish
Community
Statistics
Users online: 213
Registered: 107.587
Comments: 1.493
Articles: 7.191
© 2005-2018 EIOBA group.