These IB HL Geography Notes cover all aspects of the syllabus for the Unit 3 topic Global Risks and Resilience. They are typed, organised, include diagrams and graphs, and are for the new specification, first examinations in 2019.
Threats to individuals and businesses:
• hacking, identity theft and the implications of surveillance for personal freedoms
Average cost of cybercrime is $7.7 million/year
Highest total average cost of cybercrime is in the USA at $15 million, Russia has the lowest at
$2.37 million
Hacking:
Major threat to all internet users: individuals, national governments, internet providers and
TNCs
Mobile devices and PCs often vulnerable through documents
Likely that attacks will increase in complexity
Largest attack was on Twitter, PayPal, the New York Times, CNN and the Wall Street Journal,
which was linked to a Chinese company XiongMai Technologies.
Identity theft:
Fastest-growing white-collar crimes in the USA
Incidences are expected to rise because of the increase in the number of databases, many of
which have insufficient protection
Low prosecution rates and lenient sentencing make identity theft appealing
People at risk: university students, military personnel, medical patients and even the
deceased
South-western and western states of the USA had much higher rates than the Midwest and
the east coast
Increase in identity theft in 2006 is believed to have been triggered by Hurricane Katrina
Forms of identity theft:
o Trashing: retrieval of documents from rubbish bins or a burglary
o Phishing: relies on emails to trick people into revealing personal and financial
information
o Pharming/ spoofing: information that appears relevant to recipient and encourages
them to open the email
o Smishing: sending of text messages to potential victims
o Vishing: messages sent by voice designed to corrupt the recipient's voicemail and
phone
o Data collected from lost, stolen or discarded laptops
Implications of surveillance for personal freedoms:
State surveillance of communications undermines citizens' ability to enjoy a private life,
freely express themselves and enjoy their other fundamental human rights
Growing use of surveillance after 9/11 attacks
Methods used to monitor private communications have expanded and evolved
Technological advancements mean that the effectiveness of states in conducting surveillance
is no longer limited by scale or duration
Individuals and businesses choose to store the content of their communications e.g.
Voicemails, emails and documents, with third-party service providers. Access to such
communications data is an increasingly valuable surveillance technique employed by states
Legislation has not kept pace with the changes in technology
UN report recommendations:
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MargauxG. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £4.49. You're not tied to anything after your purchase.