50
Chapter 12: Chapter 12: The Dark Side of The Dark Side of Computer-Mediated Computer-Mediated Communication Communication

Chapter 12: Computer Mediated Communicationcmc

Embed Size (px)

Citation preview

Page 1: Chapter 12: Computer Mediated Communicationcmc

Chapter 12:Chapter 12:The Dark Side of The Dark Side of

Computer-Mediated CommunicationComputer-Mediated Communication

Page 2: Chapter 12: Computer Mediated Communicationcmc

Great CMC or source of Fraud?Great CMC or source of Fraud?

The Internet Crime Complaint Center's 2007 INTERENET Crime Report found Internet fraud had risen and that online dating fraud was one of the most commonly reported complaints.

The top 5 types of abuse on online dating sites 1. Identity mining/phishing and/or 1-1 credit card fraud - 61% 2. Spam - 14% 3. Profile misrepresentation - 7.6% 4. General misconduct - 5.9% 5. Solicitation - 2.9% Source: Iovation compilation of incidents from online dating sites using its security services

Page 3: Chapter 12: Computer Mediated Communicationcmc

Online Dating: Online Dating: Analyzing the Analyzing the Algorithms of Algorithms of

AttractionAttractionThe company uses proprietary algorithms to score that

data against 29 “dimensions of compatibility”- such as values, personality styles, attitudes and interests -- and match up customers with the best possible prospects for a long-term relationship.

Online dating site visitors Snapshot: November 2008Total number of visitors to online dating sites:

22,274,000Male users: 52.4%Female users: 47.6%Source: comScore Media Metrix

Page 4: Chapter 12: Computer Mediated Communicationcmc

Does online dating work?

• eHarmony and other online dating sites have their own studies about the services, but no independent research has been completed that demonstrates the effectiveness of online dating services.

• Do the matching algorithms produce better matches that lead to long-term relationships? “ I don’t think so.” says Dr. Dan Ariely a professor of behavioral economics at MIT who continues to research the subject.

• So far, eHarmony has not produced much scientific evidence that its system works. It has started a longitudinal study comparing eHarmony couples with a control group but secrecy may be a smart business move, but it makes eHarmony a target for scientific critics, not to mention its rivals.

Page 5: Chapter 12: Computer Mediated Communicationcmc

Truth about online dating

One thing is already clear. People aren’t so good at picking their own mates online. Researchers who studied online dating found that the customers typically ended up going out with fewer than 1

percent of the people whose profiles they studied, and that those dates often ended up being huge

letdowns. The people make up impossible shopping lists for what they want in a partner, says Eli Finkel, a psychologist who studies dating at Northwestern

University Relationships Lab.

Page 6: Chapter 12: Computer Mediated Communicationcmc

A Crash Course in the Dangers of A Crash Course in the Dangers of Computer Mediated CommunicationComputer Mediated CommunicationMeet my Second Life Avatar: Talcott Barrymore

Page 7: Chapter 12: Computer Mediated Communicationcmc

TINSTAAFL!!TINSTAAFL!!(There is no such thing as a free lunch!)(There is no such thing as a free lunch!)

Develop Good Consumer Skills

Page 8: Chapter 12: Computer Mediated Communicationcmc

The Fox and The Crow

Page 9: Chapter 12: Computer Mediated Communicationcmc

““There’s a sucker born every minute.”There’s a sucker born every minute.”

Page 10: Chapter 12: Computer Mediated Communicationcmc

Internet Scams are happening all around you!

Tribune Review“Indiana Man Loses Thousands”

May 25, 2004

Fake Cashiers Check For Car purchase – Sent a money order through Western Union for shipping.

Page 11: Chapter 12: Computer Mediated Communicationcmc

PHISHING: Bad guys who want your money or your identity

Emails, phone calls, text messages, strange “friend requests:Emails, phone calls, text messages, strange “friend requests:

Run Away!Run Away!

Beware of the “Push”, i.e.Beware of the “Push”, i.e.A Communication that You Did Not InitiateA Communication that You Did Not Initiate

Page 12: Chapter 12: Computer Mediated Communicationcmc

Just how gullible are we?

Page 13: Chapter 12: Computer Mediated Communicationcmc

75% of kids are 75% of kids are willing to share willing to share

personal personal information information online about online about

themselves and themselves and their family in their family in exchange for exchange for

goods and goods and services.services.

Page 14: Chapter 12: Computer Mediated Communicationcmc

FTC’S DIRTY DOZEN SCAMS1. Business Opportunities2. Make Money By Sending Bulk E-mail3. Chain Letters4. Work-at-home Schemes5. Health & Diet Scams6. Effortless Income7. Free Goods8. Investment Opportunities.9. Cable De-Scrambler Kits10. Guaranteed Loans –Easy Terms.11. Credit Repair Scams12. Vacation Prize Promotions.

Page 15: Chapter 12: Computer Mediated Communicationcmc

WHY DO WE FALL FOR IT?WHY DO WE FALL FOR IT?

Page 16: Chapter 12: Computer Mediated Communicationcmc

Greed…..Greed…..

Page 17: Chapter 12: Computer Mediated Communicationcmc

Greed = Scam…..Greed = Scam…..

Page 18: Chapter 12: Computer Mediated Communicationcmc

Fear….Fear….

Page 19: Chapter 12: Computer Mediated Communicationcmc

Fear = ScamFear = Scam

MailFrontier recently claimed that over 40% of recipients fell for the recent Citibank Email Phishing Scam.

Page 20: Chapter 12: Computer Mediated Communicationcmc

Curiosity…..Curiosity…..

Page 21: Chapter 12: Computer Mediated Communicationcmc

Curiosity = ScamCuriosity = Scam

Page 22: Chapter 12: Computer Mediated Communicationcmc

Temptation…..Temptation…..Ref. Number:EGOGHS255125600419 Batch Number: 14/ 01259/ IPD Ticket Number:113-2471-752-209 Serial Number: 5063-11

Attention

We are pleased to inform you of the result of the Winners in our UNIVERSAL STAKES Lottery Program held on the 20th JULY, 2004.Your e-mail address attached to ticket number 27522465896-6453 with serial number 3772-554 drew lucky numbers 7-14-18-31-45 which consequently won in the 2ND category, you have therefore been approved for a lump sum pay out of USD$1,500,000 ( One Million Five Hundred Dollars) Only .CONGRATULATIONS!

Page 23: Chapter 12: Computer Mediated Communicationcmc

If It’s Spam If It’s Spam It’s Scam!It’s Scam!

A Safe Rule Of Thumb

Page 24: Chapter 12: Computer Mediated Communicationcmc

Modeling Scams…a pathway for sex crimes

Page 25: Chapter 12: Computer Mediated Communicationcmc

What makes them scams?

• Most often:– Upfront fees…illegal to collect– Promises of work…never happens– Promises of photographs…never received

Page 26: Chapter 12: Computer Mediated Communicationcmc

Besides the scam…

• Photos posted on-line can be altered• Webcams can lead to questionable videos• World wide demand by pedophiles

Page 27: Chapter 12: Computer Mediated Communicationcmc

Modeling Scams leading to Sex CrimesModeling Scams leading to Sex Crimes

• Police search for victims of MySpace sex predatorhttp://www.mycrimespace.com/2009/05/15/police-search-for-victims-of myspace-

sex-predator/

• Man Uses Modeling Scam to Lure Girlshttp://www.cfrb.com/node/347303

• Modeling Scam Suspect Accused Of Sex Crimes

http://www.wftv.com/news/2321802/detail.html

Page 28: Chapter 12: Computer Mediated Communicationcmc
Page 29: Chapter 12: Computer Mediated Communicationcmc

Hey, that’s not me!Hey, that’s not me!

Page 30: Chapter 12: Computer Mediated Communicationcmc

A new, targeted social media A new, targeted social media version of a very old scam -- the version of a very old scam -- the

“Nigerian,” or “419,” ploy“Nigerian,” or “419,” ploy

Page 31: Chapter 12: Computer Mediated Communicationcmc

The meteoric rise in social media use has also The meteoric rise in social media use has also created a launch pad for identity thieves. created a launch pad for identity thieves.

“My prediction for 2010 is that the increase in social networking activity, along with a user’s

failure to implement security and privacy settings and protocols, will lead to an increased exposure of not only the user’s personal information but not only the user’s personal information but

possibly that of their “friends”.possibly that of their “friends”.

Robert Siciliano : CEO of IDTheftSecurity.comhttp://www.youtube.com/watch?v=JwFC0jfxTco

Page 32: Chapter 12: Computer Mediated Communicationcmc
Page 33: Chapter 12: Computer Mediated Communicationcmc

How did they do that?How did they do that?

Because Facebook regularly contacts its users through e-mail, and includes links in those e-mails to login pages, the format is ripe for phishers. It's easy to imitate Facebook e-mails and simply send users clicking to a look-a-like login page that steal passwords.

Page 34: Chapter 12: Computer Mediated Communicationcmc

ttp://www.youtube.com/watch?v=6Y8cU4kVqHg&feature=channel

OMGOMG

Page 35: Chapter 12: Computer Mediated Communicationcmc

Privacy ParadoxPrivacy ParadoxAn OxymoronAn Oxymoron

Young people will freely give up personal information to join social networks on the Internet.

Afterwards, they are surprised when their parents read their journals.

"There's a big difference between publicly available data and publicized data.”

Dr. Dana Boyd, co-author a newly published book: Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning with New Media.

Page 36: Chapter 12: Computer Mediated Communicationcmc

Social networks put careers at risk

Recent Market Research Microsoft

http://www.euractiv.com/en/Social-networks-careers-risk

• US, where 79% of HR experts scan the Web in search of personal information for recruiting purposes.

• 23% are rejected outright because of online reputation, outlandish photos and social artifacts.

• Research by Symantec found that the under-25 age group appear to be the least apprehensive about their digital tattoos and have a careless attitude towards the distribution of their personal details.

Digital tattoos

Page 37: Chapter 12: Computer Mediated Communicationcmc

Symantic and Sperling’s Best Places 2010 Report

Americas Riskiest Cities for CybercrimeAmericas Riskiest Cities for Cybercrime

• "I look at it like driving a car," said Dan Nadir, the director of product management for Symantec. "Your risk of an accident is going to be greater the more you drive. If you're online more, you need to be more cautious, just like the more you're on the road, the more you should wear your seatbelt, have airbags and rotate your tires."

Page 38: Chapter 12: Computer Mediated Communicationcmc

Variables In Study

• Sins of Commission: risky online activities, including online banking and online shopping.

• Sins of Omission: Also factored into the rankings was the number of free WiFi hotspots per capita. "WiFi is a big concern," acknowledged Nadir, "because it's something most people don't understand, and most don't know who is behind that hotspot, or if it's even legitimate.“

What counters the risk? Awareness through education!!What counters the risk? Awareness through education!!

Page 39: Chapter 12: Computer Mediated Communicationcmc
Page 40: Chapter 12: Computer Mediated Communicationcmc
Page 41: Chapter 12: Computer Mediated Communicationcmc
Page 42: Chapter 12: Computer Mediated Communicationcmc
Page 43: Chapter 12: Computer Mediated Communicationcmc
Page 44: Chapter 12: Computer Mediated Communicationcmc

We are all victims!We are all victims!• 1700 new victims in the course of this meeting.• By the end of the decade someone in your family will be

a victim.• Lowest estimate of projected damage is $5000.• Only 1 in 700 is investigated.• 1 year or less in jail.• 70 – 80 % involve illegal dugs• FBI reports 30,000 computer a week are taken over.

Page 45: Chapter 12: Computer Mediated Communicationcmc

Three FREE “must have” online Three FREE “must have” online tools..tools..

http://www.passwordchart.com/

Page 46: Chapter 12: Computer Mediated Communicationcmc

http://www.passpack.com/en/home/

Page 47: Chapter 12: Computer Mediated Communicationcmc

http://www.roboform.com/

Page 48: Chapter 12: Computer Mediated Communicationcmc

Any Web site or print ad offering free credit reports has to display this disclosure across the top of each page:

THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.

You have the right to a free credit report You have the right to a free credit report from Afrom AnnualCreditReport.comnnualCreditReport.com

or 877-322-8228, the ONLY authorized or 877-322-8228, the ONLY authorized source under federal law.source under federal law.

In September 2010 the rules will go into effect for TV and radio ads.

September 2010: New law goes into effect.

Page 49: Chapter 12: Computer Mediated Communicationcmc

• Do not respond to any request for information in an email or by phone. Not your bank, your credit card company, your hospital or other so called “legitimate” company.

• When in doubt CALL THEM AND ASK IF THEY SENT SUCH A REQUEST!

Become a Privacy Grouch

Page 50: Chapter 12: Computer Mediated Communicationcmc

Want to know more!Want to know more! My new course offered this fall. My new course offered this fall.