By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE
COMPUTER FRAUD AND THEFT Crime committed by using a computer to post false information in the hopes of retrieving money or personal information Uses , chat rooms, message boards, or websites Examples of fraud are: identity theft, phishing, online auction fraud Computer theft is taking another person’s property without his or her knowledge. Examples of theft are: piracy and hacking Kunz, M, & Wilson, P. (2006) Hankins, D. (2008). Hand with money. {photograph}. Creative commons
IDENTITY THEFT Stealing someone’s personal information without their knowledge of the theft either through discarded mail or the internet. Most identity theft happens from a relative, friend, or neighbor! Computer crimes account for 11.6% of identity theft Miss Movie Mogul. (2007). Man stealing cards. {photograph}. Creative commons
HOW DO YOU PROTECT YOURSELF? SShred documents with bank account information DDon’t keep mail lying around MMonitor your credit report. McKnight, G. (2009). Identity Theft. {Photograph}. Creative Commons
Deceiving s or websites that appear to be from a credible company. They trick a person into giving personal information. Deceiving s or websites that appear to be from a credible company. They trick a person into giving personal information. PHISHING Betacontinua. (2008). Phishing. {Photograph}. Creative Commons
IDENTIFYING PHISHING S Always includes a link that will prompt you for a user name and password Appears to be from a credible company for such as from PayPal Uses scare tactics to make you feel like you are a victim of fraud
INTERNET AUCTION FRAUD Buyers making a payment and not receiving the merchandise or receiving merchandise that is of poor quality. Sellers not receiving payment for their merchandise Drive up the bidding price: Bid Shilling or Bid Shielding Why haven’t my items shipped?
SOFTWARE PIRACY Copying software illegally. Piracy is a felony People copy software because of its high prices
LEGAL COPYING Allowed to copy software for archival purposes only but cannot be used when the original copy is owned. A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed. Copies from Public Domain are legal Shareware software through try it before you buy it. Allowed to copy software for archival purposes only but cannot be used when the original copy is owned. A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed. Copies from Public Domain are legal Shareware software through try it before you buy it.
COMPUTER HACKING Computer Hackers enjoy breaking into computer systems for the purpose of messing things up. Hackers break into financial institution’s computers with the intent to transfer money.
SOURCES Lanford, A., & Lanford, J. (n.d.). Facts about identity theft scams. Internet scams, identity theft, and urban legends: Are you at risk?. Retrieved February 9, 2012, from Littman, J. (1999). Hackers & Crackers. Popular Mechanics, 176(4), Retrieved February 14, 2012, from the Proquest database. Morley, D. (2011). Computer Security. Understanding computers in a changing society (4 th ed., pp. 142,166). Boston, MA: Course Technology, Cengage Learning. Simpson, C. (2005). Computer software in schools. Copyright for schools a practical guide (4 th ed, pp ). Worthington, Ohio: Lincoln Pub. Synder, J. (2000). Online auction fraud: Are the auction houses doing all they should or could to stop online fraud?. Federal Communications Law Journal, 52(2), Retrieved February 14, 2012, from the Proquest database. IMAGES Betacontinua.(2008). Phishing. Retrieved February 18, 2011 from Hankins, D. (2008). Hand with money. Retrieved February 4, from McKnight, G.(2008).Identity theft. Retrieved February 7, 2012 from Miss Movie Mogul. (2007).Man holding cards. Retrieved February 4, 2012 from