Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Amba Kasongo Section: 006 INTERNET CRIME: DISAGREEING WITH IDENTITY THEFT AND ONLINE MEDIA PIRACY.

Similar presentations


Presentation on theme: "By: Amba Kasongo Section: 006 INTERNET CRIME: DISAGREEING WITH IDENTITY THEFT AND ONLINE MEDIA PIRACY."— Presentation transcript:

1

2 By: Amba Kasongo Section: 006 INTERNET CRIME: DISAGREEING WITH IDENTITY THEFT AND ONLINE MEDIA PIRACY

3 WHAT IS IDENTITY THEFT? Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can wreak havoc with your finances, credit history, and reputation — and can take time, money, and patience to resolve http://www.consumer.ftc.gov/features/feature-0014-identity-theft

4 DIFFERENT TYPES OF IDENTITY THEFT Non-technological types:  Dumpster Diving: When the identity thief goes through your trash to steal personal info  Shoulder Surfing: When the identity thief gets close enough to see you enter a password or PIN number  Stealing Personal Items: When the identity thief steals a wallet or purse when the victim isn’t paying close attention to their personal belongings Technological types:  Credit/Debit Card Theft: The use of someone else’s personal bank information for financial gain  Phishing Schemes: This is when a fraudster (an identity thief) uses different ways (i.e. the internet, social networks, emails, text messages..etc) to gain personal information  SMiShing: The identity thief sends spam text messages posing as a financial institution or other legitimate entity. The text message usually has a sense of urgency so it prompts victims to believe any claims http://www.utica.edu/academic/institutes/cimip/idcrimes/schemes.cfm

5 IDENTITY THEFT STATISTICS  There have been more than 12 million incidences of identity theft has occurred in 2012  More than $21 Billion dollars have been stolen by fraudsters (Identity thieves) in 2012; this is the most since 2009  2 out of 3 Identity theft victims do not know the source of the crime  Lost/Stolen, checkbook or credit card accounts for 15.1%  Computer related identity crime accounts for 21.6%  Corrupt businesses or employees account for 11.6% http://www.identitytheftassistance.org/pageview.php?cateid=47

6 LAWMAKERS DEBATING STRENGTHENING IDENTITY THEFT LAWS In this video, a man and his wife explain how he could not use his governmental benefits after being badly injured in an accident that left him badly injured and so he couldn’t use his benefits because someone was using his social security number, acting as if the victim is working and healthy. http://www.youtube.com/watch?v=pNJFH0-oIhk

7 SOLUTIONS TO IDENTITY THEFT  Shred everything you put in the trash that has sensitive information on it  While using a PIN or password, be aware of your surroundings and don’t be afraid to ask someone to move back if they’re too close to you  Writing CID (which means to “SEE ID”) on your signature panel on a credit/debit card requires a merchant to request proper identification before a purchase is made http://www.utica.edu/academic/institutes/cimip/idcrimes/schemes.cfm

8 ONLINE MEDIA PIRACY Media Piracy – also known as copyright infringement – is the practice of using and/or sharing works (that are under copyright) without proper permission of the creator.

9 DIFFERENT TYPES OF ONLINE MEDIA PIRACY  Books: Illegal photocopying and reproduction of books  Music: Unauthorized uploading and making public of music files  Films: Optical disk piracy (burning movies onto disks), theatrical camcorder piracy (recording movies or plays), signal theft and broadcasting piracy (stealing cable/internet or broadcasting films online)  Software: Unauthorized copying of computer software (creating/using duplicates of Norton Anti-Virus, Microsoft Office, etc..)  Internet (on-line) piracy: Illicit downloads and sharing that occurs through file-sharing networks, Illegal servers, websites and hacked computers http://portal.unesco.org/culture/en/ev.php-URL_ID=39412&URL_DO=DO_TOPIC&URL_SECTION=201.html

10 ONLINE MEDIA PIRACY STATISTICS  70% of users find nothing wrong with piracy  22% of all global Internet Band-With is used for internet piracy  98.8% of data transferred using P2P networks is copyrighted  91.5% of files available for download on Cyberlockers sites (i.e. Rapidshare, Megaupload, etc) are copyrighted material  Only 1 out of 10,000 pcs of the most popular content on the OpenBitTorrent tracker is non-copyrighted  There’s an average of $12.5 Billion economic losses each year due to piracy in the Music industry  71,060 jobs are lost a year in the United States due to online piracy http://www.go-gulf.com/blog/online-piracy/

11 IS TRYING TO STOP ONLINE PIRACY A WASTE OF TIME? This video quickly explains how the fast matriculation of technology has catapulted the majority of the piracy programs and its “success”. The video questions whether there is a point of trying to stop it since the internet is only getting bigger and more secretive in many different ways http://www.youtube.com/watch?v=fakgM4SiE_c

12 SOLUTIONS TO ONLINE MEDIA PIRACY  Identify pirated content: If it is a product that is not an original copyrighted file, do not use it. You can be at risk of being sued for using the product because you are then technically pirating  Enforcement of copyright laws: when people are caught doing so, proper laws and punishment should be enforced effectively so it doesn’t continue to happen  Stop downloading “free” music or movies and support artists’ work by actually attending showings or purchasing music produced by these artists  The music, film and television industry should consider decreasing prices of some the content that gets pirated so that they aren’t losing too much profit and are gaining more than they are losing

13 PIRACY BY REGION

14 REFERENCES Works Cited "Consumer Information." Identity Theft. N.p., n.d. Web. 18 Nov. 2013.. "Identity Theft Research and Statistics - ITAC Victim Database - Surveys of identity theft victims." Identity Theft Research and Statistics - ITAC Victim Database - Surveys of identity theft victims. N.p., n.d. Web. 18 Nov. 2013.. "Most Common Schemes - Identity Crimes - Center for Identity Management and Information Protection (CIMIP) - Utica College." Most Common Schemes - Identity Crimes - Center for Identity Management and Information Protection (CIMIP) - Utica College. N.p., n.d. Web. 18 Nov. 2013.. "The Media Piracy Report." Media Piracy The American Assembly. N.p., n.d. Web. 18 Nov. 2013.. "Types of Piracy." United Nations Educational, Scientific and Cultural Organization. N.p., n.d. Web. 18 Nov. 2013..


Download ppt "By: Amba Kasongo Section: 006 INTERNET CRIME: DISAGREEING WITH IDENTITY THEFT AND ONLINE MEDIA PIRACY."

Similar presentations


Ads by Google