Your SlideShare is downloading. ×
Internet scams
Internet scams
Internet scams
Internet scams
Internet scams
Internet scams
Internet scams
Internet scams
Internet scams
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Internet scams

495

Published on

Published in: Economy & Finance, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
495
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Brittany Clout – u3008480
  • 2. Types of internet scams  Email scams  Credit card skimming  Fake fraud alerts from banks  Get rich quick schemes  Weight loss scams  ‘Guaranteed’ employment  Money transfer  Guaranteed visas
  • 3. Increasing Threat  The Present  Scams have become a regular part of our internet experience  Global Financial Crisis has been attributed to an increase in illegal activity  Generation Y uses technological skills to increase wealth  The Future  These scams are not likely to be extinct in the near future  Online community needs to work with governing agencies to combat illegal activities
  • 4. A Common scam - ‘419’ Emails  Nigerian term for online/financial fraud  Apply discourse strategies:  Socio-cultural greeting formulas  Self identification  Reassurance/confidence building  Action prompting strategies to maintain interest
  • 5. Types of 419 Emails  Online lottery winning announcements  Acting as next of kin for unknown deceased relative  Rich business man needs help distributing money to charity  Email ‘business proposals’: ○ Money transfers ○ Claims of dormant bank accounts
  • 6. Example of a 419 email Action prompting strategy Self identification Confidence building
  • 7. Self Identification Reassurance
  • 8. My Report  Research:  Qualitative research ○ survey of 20 people  Quantitative research ○ theories, journals, case studies, reports  Findings:  Common scams  High number of people surveyed experienced a form of scamming/fraudulent behaviour
  • 9. My Report  Outcomes  Using theories to overcome cyber-crime ○ Government versus governance ○ E.g.. Foucault’s Model of Governance  Strategies for deterring Internet fraud  Network of relations and capacities within the Internet community.

×