Upload
gyles-fleming
View
224
Download
1
Embed Size (px)
Citation preview
By:
Beth Fulks
COMPUTER CRIMES IN CYBERSPACE
COMPUTER FRAUD AND THEFT
Crime committed by using a computer to post false information in the hopes of retrieving money or personal information
Uses email, chat rooms, message boards, or websites
Examples of fraud are: identity theft, phishing, online auction fraud
Computer theft is taking another person’s property without his or her knowledge.
Examples of theft are: piracy and hacking
Kunz, M, & Wilson, P. (2006)
Hankins, D. (2008). Hand with money. {photograph}. Creative commons
IDENTITY THEFT
Stealing someone’s personal information without their knowledge of the theft either through discarded mail or the internet.
Most identity theft happens from a relative, friend, or neighbor!
Computer crimes account for 11.6% of identity theft
www.scambusters.org
Miss Movie Mogul. (2007). Man stealing cards. {photograph}. Creative commons
HOW DO YOU PROTECT YOURSELF?
Shred documents with bank account information
Don’t keep mail lying around
Monitor your credit report.
McKnight, G. (2009). Identity Theft. {Photograph}. Creative Commons
Deceiving emails or websites that appear to be from a credible company.
They trick a person into giving personal information.
PHISHING
Betacontinua. (2008). Phishing. {Photograph}. Creative Commons
IDENTIFYING PHISHING EMAILS
Always includes a link that will prompt you for a user name and password
Appears to be from a credible company for such as from PayPal
Uses scare tactics to make you feel like you are a victim of fraud
INTERNET AUCTION FRAUD
Buyers making a payment and not receiving the merchandise or receiving merchandise that is of poor quality.
Sellers not receiving payment for their merchandise
Drive up the bidding price: Bid Shilling or Bid Shielding
Why haven’t
my items
shipped?
SOFTWARE PIRACY
Copying software illegally.
Piracy is a felony
People copy software because of its high prices
LEGAL COPYING
Allowed to copy software for archival purposes only but cannot be used
when the original copy is owned.
A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed.
Copies from Public Domain are legal
Shareware software through try it before you buy it.
Allowed to copy software for archival purposes only but cannot be used
when the original copy is owned.
A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed.
Copies from Public Domain are legal
Shareware software through try it before you buy it.
COMPUTER HACKING Computer Hackers enjoy
breaking into computer systems for the purpose of messing things up.
Hackers break into financial institution’s computers with the intent to transfer money.
SOURCESLanford, A., & Lanford, J. (n.d.). Facts about identity theft scams. Internet scams, identity theft, and urban legends: Are you at risk?. Retrieved February 9, 2012, from http://scambusters.org/identifythefacts.html
Littman, J. (1999). Hackers & Crackers. Popular Mechanics, 176(4), 62-65. Retrieved February 14, 2012, from the Proquest database.
Morley, D. (2011). Computer Security. Understanding computers in a changing society (4th ed., pp. 142,166). Boston, MA: Course Technology, Cengage Learning.
Simpson, C. (2005). Computer software in schools. Copyright for schools a practical guide (4th ed, pp. 155-156). Worthington, Ohio: Lincoln Pub.
Synder, J. (2000). Online auction fraud: Are the auction houses doing all they should or could to stop online fraud?. Federal Communications Law Journal, 52(2), 453-472. Retrieved February 14, 2012, from the Proquest database.
IMAGESBetacontinua.(2008). Phishing. Retrieved February 18, 2011 from www.flickr.com/photos/betacontinua/2737248327/in/photostream
Hankins, D. (2008). Hand with money. Retrieved February 4, 2012. from www.flickr.com/photos/23905174@N00/2438005410/
McKnight, G.(2008).Identity theft. Retrieved February 7, 2012 from www.flickr.com/photos/glennmcknight/3347389082
Miss Movie Mogul. (2007).Man holding cards. Retrieved February 4, 2012 from www.flickr.com/photos/Miss_Movie_Mogul/448399144