11
By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE

By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT Crime committed by using a computer to post false information in the hopes of

Embed Size (px)

Citation preview

Page 1: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

By:

Beth Fulks

COMPUTER CRIMES IN CYBERSPACE

Page 2: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

COMPUTER FRAUD AND THEFT

Crime committed by using a computer to post false information in the hopes of retrieving money or personal information

Uses email, chat rooms, message boards, or websites

Examples of fraud are: identity theft, phishing, online auction fraud

Computer theft is taking another person’s property without his or her knowledge.

Examples of theft are: piracy and hacking

Kunz, M, & Wilson, P. (2006)

Hankins, D. (2008). Hand with money. {photograph}. Creative commons

Page 3: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

IDENTITY THEFT

Stealing someone’s personal information without their knowledge of the theft either through discarded mail or the internet.

Most identity theft happens from a relative, friend, or neighbor!

Computer crimes account for 11.6% of identity theft

www.scambusters.org

Miss Movie Mogul. (2007). Man stealing cards. {photograph}. Creative commons

Page 4: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

HOW DO YOU PROTECT YOURSELF?

Shred documents with bank account information

Don’t keep mail lying around

Monitor your credit report.

McKnight, G. (2009). Identity Theft. {Photograph}. Creative Commons

Page 5: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

Deceiving emails or websites that appear to be from a credible company.

They trick a person into giving personal information.

PHISHING

Betacontinua. (2008). Phishing. {Photograph}. Creative Commons

Page 6: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

IDENTIFYING PHISHING EMAILS

Always includes a link that will prompt you for a user name and password

Appears to be from a credible company for such as from PayPal

Uses scare tactics to make you feel like you are a victim of fraud

Page 7: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

INTERNET AUCTION FRAUD

Buyers making a payment and not receiving the merchandise or receiving merchandise that is of poor quality.

Sellers not receiving payment for their merchandise

Drive up the bidding price: Bid Shilling or Bid Shielding

Why haven’t

my items

shipped?

Page 8: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

SOFTWARE PIRACY

Copying software illegally.

Piracy is a felony

People copy software because of its high prices

Page 9: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

LEGAL COPYING

Allowed to copy software for archival purposes only but cannot be used

when the original copy is owned.

A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed.

Copies from Public Domain are legal

Shareware software through try it before you buy it.

Allowed to copy software for archival purposes only but cannot be used

when the original copy is owned.

A copy made by the computer to the hard disc is acceptable because the computer erases it once the program is installed.

Copies from Public Domain are legal

Shareware software through try it before you buy it.

Page 10: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

COMPUTER HACKING Computer Hackers enjoy

breaking into computer systems for the purpose of messing things up.

Hackers break into financial institution’s computers with the intent to transfer money.

Page 11: By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of

SOURCESLanford, A., & Lanford, J. (n.d.). Facts about identity theft scams. Internet scams, identity theft, and urban legends: Are you at risk?. Retrieved February 9, 2012, from http://scambusters.org/identifythefacts.html

Littman, J. (1999). Hackers & Crackers. Popular Mechanics, 176(4), 62-65. Retrieved February 14, 2012, from the Proquest database.

Morley, D. (2011). Computer Security. Understanding computers in a changing society (4th ed., pp. 142,166). Boston, MA: Course Technology, Cengage Learning.

Simpson, C. (2005). Computer software in schools. Copyright for schools a practical guide (4th ed, pp. 155-156). Worthington, Ohio: Lincoln Pub.

Synder, J. (2000). Online auction fraud: Are the auction houses doing all they should or could to stop online fraud?. Federal Communications Law Journal, 52(2), 453-472. Retrieved February 14, 2012, from the Proquest database.

IMAGESBetacontinua.(2008). Phishing. Retrieved February 18, 2011 from www.flickr.com/photos/betacontinua/2737248327/in/photostream

Hankins, D. (2008). Hand with money. Retrieved February 4, 2012. from www.flickr.com/photos/23905174@N00/2438005410/

McKnight, G.(2008).Identity theft. Retrieved February 7, 2012 from www.flickr.com/photos/glennmcknight/3347389082

Miss Movie Mogul. (2007).Man holding cards. Retrieved February 4, 2012 from www.flickr.com/photos/Miss_Movie_Mogul/448399144