logo

Thinking Activity - Desklib

   

Added on  2023-06-15

6 Pages1201 Words418 Views
 | 
 | 
 | 
Running head: THINKING ACTIVITY
THINKING ACTIVITY
Name of Student-
Name of University-
Author note-
Thinking Activity - Desklib_1

1THINKING ACTIVITY
Answer 1
After reading “The Scam that Will Not Die”, if I had received a similar email, I would
not have engaged in such activities. As mentioned in the article, some people simply ignore such
emails and some respond out of greed. I believe that greed is something which can never lead to
anything good. Usually, these types of emails are scams and these can lead to troubles. Firstly, it
is weird that an unknown person is suddenly asking for help regarding an act, which is very
risky. Secondly, I believe, that keeping myself engaged with my own work is the best thing
rather than involving myself with a scandalous work of another for greed. Therefore I prefer not
to engage myself in such activities.
Answer 2
The strain theory of Robert K. Merton, developed in 1938, is a sociology and
criminology theory that states that individuals are pressurized by the society for achieving
socially accepted goals, but lacks the means to achieve such goals, which creates strain and may
lead the individuals to commit crimes. Nigeria is a country which was divided due to political
fragmentation and is characterized with religious and cultural conflicts between the people. The
country was divided into two states. The social structure is characterized with inequalities. For
example, the south dominates the country and natives knowing English, have better
opportunities. A large amount of the population, thrive to achieve ‘wealth goals’ and due to such
social structure, they either commit crimes or become victims to fraud fee scams out of greed.
Thus, Merton’s strain theory can be applied in the Nigerian fraud fee scam.
Thinking Activity - Desklib_2

2THINKING ACTIVITY
Answer 3
There are various ways in which we are vulnerable to identity theft and credit card frauds
(Brickey & Taub, 2017). Some of the ways are:
Use of fraudulent websites that ask for personal information.
Fraudulent bank web pages asking for bank account or credit card numbers.
Lottery winning mails asking for account numbers for transferring money.
Fraudulent loan schemes with very less rates of interest, etc.
The ways which must be used for protection:
Clearing logins and passwords or changing passwords.
Using credit card services for online purchases, having better guarantees under
the federal law than the online payment services or personal debit card.
Staying alert regarding a trick, which is a spam or pop-ups duplicate legitimate
banks or business for obtaining personal information, used for accessing personal
accounts..
Monitoring of bank and credit card statements.
Monitoring credit card report, etc.
Answer 4
The American culture is characterized with the use of high-tech gadgets and computers
today. In this scenario, I attempted to spend 24 hours being ‘unplugged’. So, as a result I
decided to spend the whole day without internet, which made me realize certain major things
about the use of internet. I realized that internet has impacted our lives in a massive way. It has
Thinking Activity - Desklib_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents