Download presentation
Presentation is loading. Please wait.
Published byGyles Fleming Modified over 9 years ago
1
By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE
2
COMPUTER FRAUD AND THEFT Crime committed by using a computer to post false information in the hopes of retrieving money or personal information Uses email, chat rooms, message boards, or websites Examples of fraud are: identity theft, phishing, online auction fraud Computer theft is taking another person’s property without his or her knowledge. Examples of theft are: piracy and hacking Kunz, M, & Wilson, P. (2006) Hankins, D. (2008). Hand with money. {photograph}. Creative commons
3
IDENTITY THEFT Stealing someone’s personal information without their knowledge of the theft either through discarded mail or the internet. Most identity theft happens from a relative, friend, or neighbor! Computer crimes account for 11.6% of identity theft www.scambusters.org Miss Movie Mogul. (2007). Man stealing cards. {photograph}. Creative commons
4
HOW DO YOU PROTECT YOURSELF? SShred documents with bank account information DDon’t keep mail lying around MMonitor your credit report. McKnight, G. (2009). Identity Theft. {Photograph}. Creative Commons
5
Deceiving emails or websites that appear to be from a credible company. They trick a person into giving personal information. Deceiving emails or websites that appear to be from a credible company. They trick a person into giving personal information. PHISHING Betacontinua. (2008). Phishing. {Photograph}. Creative Commons
6
IDENTIFYING PHISHING EMAILS Always includes a link that will prompt you for a user name and password Appears to be from a credible company for such as from PayPal Uses scare tactics to make you feel like you are a victim of fraud
7
INTERNET AUCTION FRAUD Buyers making a payment and not receiving the merchandise or receiving merchandise that is of poor quality. Sellers not receiving payment for their merchandise Drive up the bidding price: Bid Shilling or Bid Shielding Why haven’t my items shipped?
8
SOFTWARE PIRACY Copying software illegally. Piracy is a felony People copy software because of its high prices
9
LEGAL COPYING Allowed to copy software for archival purposes only but cannot be used when the original copy is owned. A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed. Copies from Public Domain are legal Shareware software through try it before you buy it. Allowed to copy software for archival purposes only but cannot be used when the original copy is owned. A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed. Copies from Public Domain are legal Shareware software through try it before you buy it.
10
COMPUTER HACKING Computer Hackers enjoy breaking into computer systems for the purpose of messing things up. Hackers break into financial institution’s computers with the intent to transfer money.
11
SOURCES Lanford, A., & Lanford, J. (n.d.). Facts about identity theft scams. Internet scams, identity theft, and urban legends: Are you at risk?. Retrieved February 9, 2012, from http://scambusters.org/identifythefacts.htmlhttp://scambusters.org/identifythefacts.html Littman, J. (1999). Hackers & Crackers. Popular Mechanics, 176(4), 62-65. Retrieved February 14, 2012, from the Proquest database. Morley, D. (2011). Computer Security. Understanding computers in a changing society (4 th ed., pp. 142,166). Boston, MA: Course Technology, Cengage Learning. Simpson, C. (2005). Computer software in schools. Copyright for schools a practical guide (4 th ed, pp. 155-156). Worthington, Ohio: Lincoln Pub. Synder, J. (2000). Online auction fraud: Are the auction houses doing all they should or could to stop online fraud?. Federal Communications Law Journal, 52(2), 453-472. Retrieved February 14, 2012, from the Proquest database. IMAGES Betacontinua.(2008). Phishing. Retrieved February 18, 2011 from www.flickr.com/photos/betacontinua/2737248327/in/photostream Hankins, D. (2008). Hand with money. Retrieved February 4, 2012. from www.flickr.com/photos/23905174@N00/2438005410/ McKnight, G.(2008).Identity theft. Retrieved February 7, 2012 from www.flickr.com/photos/glennmcknight/3347389082 Miss Movie Mogul. (2007).Man holding cards. Retrieved February 4, 2012 from www.flickr.com/photos/Miss_Movie_Mogul/448399144
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.