Due to technological advances, this has been extended to include data such as e-mail addresses, credit card numbers and log files.This increases the vulnerability of cyberspace users, and Park described the use of RR numbers as ???open sesame.??????Every door is opened with the RR number.