Scams and Hoaxes By: Group 2 Krista Brumbaugh, Justin Gfeller, Taylor Dunham, Cody Flowers, and Danielle Yadon By: Group 2 Krista Brumbaugh, Justin Gfeller,

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Charity Fraud Has anyone ever asked you to donate to charity?
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
© 2005 Convio, Inc. NTEN Webinar: Protecting your organization and donors from online scams February 23, 2006.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
Hurricane Katrina Avoid Falling Prey to Donation Scams - Click to Proceed - Brought to you by The Louisiana State Fire Marshal.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Cyber Security and Fraud By: Connor Warden and Nicole Speck Social Networking Payment Cards Job Offer Scams West African False Charities.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
Telemarketing fraud is when people call you up and act like they’re from a professional company or agency and tell you you’ve won some sort of amazing.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Health Care Scams What are health care scams? Health Care Scams You might get (or see): A TV ad An A phone call.
Internet Fraud By: Shanna. Explanation of Fraud Internet fraud is a crime in which a person develops a way to invade your privacy by retrieving your personal.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Beware! Consumer Fraud Module 9.1.
Social impacts of the use of it By: Mohamed Abdalla.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Internet Hoaxes Charles Hornat April 29, 2003.
Personal Finance Unit 2.02 Understand Threats to Financial Security.
Staying Safe in Cyberspace Jessica Kohler ITC 525 Jessica Kohler ITC 525.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
FRAUD. Fraud involves obtaining property illegally by intentionally making a misrepresentation with the purpose of deceiving another party (e.g., a person,
Reliability & Desirability of Data
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
The Internet contains an infinite number of high- quality, interesting, intriguing, and well-designed sites, and surfing on the Web is usually a source.
Warm Up – Pick which bank you would like to deposit your money in. Give 2 reasons for picking the bank. CriteriaWells FargoA Plus FCUBank of America Savings.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
How to Read Outlook . Make sure the computer is on.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
I promise…. To always ask my parents before going online.
Crime Slides by Rachel Wood-Ross CSCI 101 Thu 2pm Class.
Kyle Purchase and Matt Mastrogiovanni
 people will go through your trash to get credit card numbers. Like old mail that you threw away, had your number on it a lot of the time its with.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
By :Mitchell Christie by :Mitchell Christie safety.
Understanding Business and Personal Law Consumer Protection Section 15.1 Consumer Protection and Product Liability Years ago, caveat emptor, which means.
Unit 8: Assignment 1 – Task
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Can one imagine working for the following company? It has a little over 500 employees with the following statistics :
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Carly and Scott are targets Lesson 6: Scams Targeting Students.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Mrs. Esman Computer Special
Fraud Protection.
Fraud protection.
Lesson 3 Safe Computing.
Lesson 2- Protecting Yourself Online
Ethics Tutorial Assignment#2
Lesson 2- Protecting Yourself Online
Be sure that your presentation includes…
Presentation transcript:

Scams and Hoaxes By: Group 2 Krista Brumbaugh, Justin Gfeller, Taylor Dunham, Cody Flowers, and Danielle Yadon By: Group 2 Krista Brumbaugh, Justin Gfeller, Taylor Dunham, Cody Flowers, and Danielle Yadon

Definitions  Scams- A fake business  Hoaxes- An act intended to deceive or trick The definition for Hoaxes is from Dictionary.com  Scams- A fake business  Hoaxes- An act intended to deceive or trick The definition for Hoaxes is from Dictionary.com

Why People Do This?  They get money from or other internet programs.  They also get peoples addresses, credit card numbers, and other important information.  They get money from or other internet programs.  They also get peoples addresses, credit card numbers, and other important information.

Benefits and How They Scam People. Scammers get money They make-up fake charities, ads, chain letters, and calls. They get other people to send the chain letters so they spread faster.Then there could be more scammers. Scammers get money They make-up fake charities, ads, chain letters, and calls. They get other people to send the chain letters so they spread faster.Then there could be more scammers.

Negative Causes  People don’t get what they paid for.  You can’t find the person that scammed you because they use fake names or addresses.  People don’t get what they paid for.  You can’t find the person that scammed you because they use fake names or addresses.

The Ethical Issues  Lying- You pay for something that’s not what they say it is or you don’t get it.  Fraud- They make the fake s and fake names.  Lying- You pay for something that’s not what they say it is or you don’t get it.  Fraud- They make the fake s and fake names.

The Law  It is against the law. They can get charged with fraud.  It is illegal to send a chain letter.  It is against the law. They can get charged with fraud.  It is illegal to send a chain letter.

What to Think About.  How do we know it’s not fake?  Can there be good chain mail?  What kind of sites would be easy to tell if they are frauds?  Tell us what you think in the discussion.  What if you are promised a college degree or money to attend college and it is a scam? How would that effect your life? How much money would you loose?  How do we know it’s not fake?  Can there be good chain mail?  What kind of sites would be easy to tell if they are frauds?  Tell us what you think in the discussion.  What if you are promised a college degree or money to attend college and it is a scam? How would that effect your life? How much money would you loose?