By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Part I: Making Good Online Choices
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
Internet Safety/Cyber Ethics
Security, Privacy, and Ethics Online Computer Crimes.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
Scams Stevie's Scam School videos
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Possible WebQuest type links  
Identity Theft Kayla Brooks 7 th Grade Marshall Middle School Mr. Dryer.
Digital Citizenship By: Miranda Scorver.
Personal Finance Unit 2.02 Understand Threats to Financial Security.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Mrs. Jefferson Business Information Management I.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BRADLEY BARNES DIGITAL CITIZENSHIP. NETIQUETTE ON SOCIAL MEDIA SITES Netiquette is the etiquette guidelines that govern behavior when communicating on.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Internet Safety Internet Safety LPM
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
The Concerns  Acceptable Use Policies  Cyberbullying  Cyberpredators  Identity Safety  Piracy and Plagiarism.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer crimes.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Issues for Computer Users, Electronic Devices, Computer and Safety.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Identity Theft It’s a crime!
Computer Security Fundamentals
Cyber Security Awareness Workshop
Chapter 11 crime and security in the networked economy
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE

COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of retrieving money or personal information  Uses , chat rooms, message boards, or websites  Examples of fraud are: identity theft, phishing, online auction fraud  Computer theft is taking another person’s property without his or her knowledge.  Examples of theft are: piracy and hacking  Kunz, M, & Wilson, P. (2006) Hankins, D. (2008). Hand with money. {photograph}. Creative commons

IDENTITY THEFT  Stealing someone’s personal information without their knowledge of the theft either through discarded mail or the internet.  Most identity theft happens from a relative, friend, or neighbor!  Computer crimes account for 11.6% of identity theft Miss Movie Mogul. (2007). Man stealing cards. {photograph}. Creative commons

HOW DO YOU PROTECT YOURSELF? SShred documents with bank account information DDon’t keep mail lying around MMonitor your credit report. McKnight, G. (2009). Identity Theft. {Photograph}. Creative Commons

Deceiving s or websites that appear to be from a credible company. They trick a person into giving personal information. Deceiving s or websites that appear to be from a credible company. They trick a person into giving personal information. PHISHING Betacontinua. (2008). Phishing. {Photograph}. Creative Commons

IDENTIFYING PHISHING S Always includes a link that will prompt you for a user name and password Appears to be from a credible company for such as from PayPal Uses scare tactics to make you feel like you are a victim of fraud

INTERNET AUCTION FRAUD  Buyers making a payment and not receiving the merchandise or receiving merchandise that is of poor quality.  Sellers not receiving payment for their merchandise  Drive up the bidding price: Bid Shilling or Bid Shielding Why haven’t my items shipped?

SOFTWARE PIRACY  Copying software illegally.  Piracy is a felony  People copy software because of its high prices

LEGAL COPYING  Allowed to copy software for archival purposes only but cannot be used when the original copy is owned. A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed. Copies from Public Domain are legal Shareware software through try it before you buy it.  Allowed to copy software for archival purposes only but cannot be used when the original copy is owned. A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed. Copies from Public Domain are legal Shareware software through try it before you buy it.

COMPUTER HACKING  Computer Hackers enjoy breaking into computer systems for the purpose of messing things up.  Hackers break into financial institution’s computers with the intent to transfer money.

SOURCES Lanford, A., & Lanford, J. (n.d.). Facts about identity theft scams. Internet scams, identity theft, and urban legends: Are you at risk?. Retrieved February 9, 2012, from Littman, J. (1999). Hackers & Crackers. Popular Mechanics, 176(4), Retrieved February 14, 2012, from the Proquest database. Morley, D. (2011). Computer Security. Understanding computers in a changing society (4 th ed., pp. 142,166). Boston, MA: Course Technology, Cengage Learning. Simpson, C. (2005). Computer software in schools. Copyright for schools a practical guide (4 th ed, pp ). Worthington, Ohio: Lincoln Pub. Synder, J. (2000). Online auction fraud: Are the auction houses doing all they should or could to stop online fraud?. Federal Communications Law Journal, 52(2), Retrieved February 14, 2012, from the Proquest database. IMAGES Betacontinua.(2008). Phishing. Retrieved February 18, 2011 from Hankins, D. (2008). Hand with money. Retrieved February 4, from McKnight, G.(2008).Identity theft. Retrieved February 7, 2012 from Miss Movie Mogul. (2007).Man holding cards. Retrieved February 4, 2012 from