Cyberspace fraud and abuse

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Fact or Fake Out Education is the best defense against fraud.
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Consumer Issues Chapter 28.
Financial Scams & Schemes Scams & Schemes. Financial Scams & Schemes Scam Fraudulent or deceptive schemes.
Computer Fraud Pertemuan XVII Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Lesson 5: Avoiding Fraud and Scams Module 10: Small Steps to Health and Wealth TM for Older Adults.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
Online Shopping Take Charge of Your Finances
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
Internet Safety Dr. Steve Broskoske Misericordia University.
Introduction to Business © Thomson South-Western ChapterChapter Consumers in the Global Economy Consumer Buying Decisions Consumer Rights.
E-commerce Fraud: The New Reality Thomas Chim Raj Nair Chris Geegan Mike Grimsley.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
1 FSAIF – Florida Seniors Against Investment Fraud Provided by:
Personal Finance Unit 2.02 Understand Threats to Financial Security.
Business & Personal Finance CONSUMER RESPONSIBILITIES.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
UNIT VII – Personal Financial Literacy Consumer Protection & Fraud.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
+ Warm up In 3-5 words, define each of the following: 1. Phishing 2. Skimming 3. Pyramid scheme 4. Ponzi scheme Answer the following question: 1. How can.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Kyle Purchase and Matt Mastrogiovanni
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.
ECONOMIC EDUCATION FOR CONSUMERS ○ Chapter 3 WHAT’S AHEAD 3.1Consumer Rights and Responsibilities 3.2Government and Consumer Protection 3.3Deception and.
Standard 3 Objective 4 Describe the rights and responsibilities of buyers and sellers under consumer protection laws.
Unit 7 Day 5 Consumer Protection & Fraud. Consumer Credit What is Credit? the ability of a customer to obtain goods/services before payment, based on.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
 Have you ever bought anything through the Internet?  How did you pay for it?  Did you receive the goods you bought safely?  Were the goods of satisfactory.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Cyberspace fraud and abuse
Consumer protection is a group of laws and organizations designed to ensure the rights of consumers as well as fair trade competition and the free flow.
Media education: from passive consumers to active creators
Internet Fraud..
Fraud Protection.
Fraud protection.
Done by… Hanoof Al-Khaldi Information Assurance
Advanced Income Tax Law
Banking.
Learn how to protect yourself against common attacks
Digital Citizenship Middle School
III. INVESTING Investing Options 4. Real Estate – Property
Chapter 9 Credit Problems and Laws
Internet Fraud By (NAMES).
Credit Cards: More Than Plastic
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
LESSON TWO: PERSONAL SPENDING
Credit Cards and Online Shopping
Internet Safety Vocabulary
Electronic Transactions
Protecting Yourself from Fraud including Identity Theft
Investing and Consumer Fraud
Protecting Yourself from Fraud including Identity Theft
Lesson 2- Protecting Yourself Online
Protecting Yourself from Fraud including Identity Theft
Identity Theft By Omer Ersen.
Presentation transcript:

Cyberspace fraud and abuse

Introduction Have you ever bought anything through the Internet? How did you pay for it? Did you receive the goods you bought safely? Were the goods of satisfactory quality? What guarantee did you have that you would get what you paid for?

Reading task Read the text Cyberspace fraud and abuse and answer the following questions: What are the main types of investment fraud reported in the text? How does the text define cyberspace? How do criminals exploit anonymity on the Internet? Which organisations could you inform if you were a victim of a scam on the Internet? Which crime has increased most in the last year or so, according to the text? Do most victims of fraud use traditional payment methods?

IFW What does the acronym IFW stand for? What does IFW recommend to buyers? How does escrow service work? What are the most common types of Internet fraud according to IFW?

IFW – Internet Fraud Watch IFW recommendation: use escrow services Escrow services hold money in a special account until the buyer has received the goods in satisfactory condition, then they release it to the seller Web auctions, the sale of general merchandise, Internet services, hardware or software, multi-level marketing or pyramid schemes, franchises, credit ‘repair’ and credit card issuing

Discussion point Are cyberspace frauds really any different from frauds committed through more traditional communication channels?

Definitions

Answer key a) 3 - Internet services b) 8 - advance for loans c) 6 - Business opportunities or franchises d) 5 - multi-level marketing or pyramid schemes e) 7 - work-at-home plans f) 9 - credit ‘repair’ g)10 - credit card issuing h) 2 - Sales of general merchandise i) 4 - computer equipment (hardware or software) j) 1 - Web auctions

Vocabulary tasks

Answer key Illicit – against the law Stock manipulations – illegally influencing share prices Spread like wildfire – spread very rapidly To the hilt – to maximum advantage Piece work – being paid for each item produced Contingent on – dependent on Disbursed – paid money out Up-front fees – money paid before receiving goods Find Croatian equivalents for the above phrases!

Complete the sentence:

Answer key The courts made two important rulings on the Internet and free speech in the US. There most be ways to seek redress for losses suffered because of electronic fraud. There will be attempts to prevent fraudulent trading. When an issuer is found to be in the wrong, they will be liable for some form of compensation to the victim. In the US, very heavy fines have been levied on certain abusers of the Internet. The Commission is also keen to prevent crimes of forgery like counterfeiting. Many victims receive goods which are different from what they expect – the sellers are guilty of misrepresentation. Other cases are when the goods received are faulty and do not work. Some credit cards can be issued under a false name. Translate the above sentences!

Terms of payment

Answer key 2. Can I pay by credit card or by cheque? 3. E- commerce chiefly operates with offline payments. 4. Money up-front is the same as paying in advance. 5. What is the difference between a money order and a cheque? 6. The safest way to pay for expensive items is to open an escrow fund. 7. One scam works by asking for advance loan fees, but in the end no loan is given.

Discussion Who can you trust on the Internet? How can you check on a business or individual? How careful are you online? How much should one reveal on social networks?

National Consumers League Fraud.org is a project of the National Consumers League (NCL), a nonprofit advocacy organization based in Washington, DC. NCL was founded in 1899 to promote the interests of consumers and workers in the United States and abroad. In 1992, in response to the growth in telemarketing and Internet fraud, NCL launched the National Fraud Information Center.

By contacting www. fraud By contacting www.fraud.org, consumers from all over the world can get tips on how to avoid scams and report fraud Top 10 scams are published annually

Top ten scams in 2015

Read the text and answer the questions: http://www.fraud.org/2015_top_ten What has changed since 1998? What is phishing/spoofing? Do you agree with the following statement: Regardless of the type of scam, many instances of fraud can be avoided by remembering the old rule of thumb: if something seems too good to be true, it probably is.

Phishing Identity thefts Phishing is defined as pretending to be financial institution or company and sending spam or pop-up messages to get people to reveal personal information https://www.youtube.com/watch?v=7MtYVSG e1ME Keyboard spyware

Thank you for your attention!