SlideShare a Scribd company logo
The Dark Side of the
Web: Scam, Fraud and
Phishing
Presented By:
Harsh Patel
Kush Patel
Shivang Goyal
Shubham Chaudhari
Yousuf Mohd Sayeed
Dr. Minha R Ha.
Guided By:
Problem Definition
Frauds, scams, and phishing are major threats
to individuals and organizations worldwide,
causing substantial financial losses and
reputational damage. These criminal activities
exploit vulnerabilities in the online world,
targeting unsuspecting victims who may not
have the necessary knowledge to protect
themselves. To address this problem,
awareness must be raised, and our group aims
to research strategies that can be used to
tackle this problem.
Introduction
Scam, Fraud and Phishing
Scam:
• False promises, misinformation, and
psychological manipulation
• Fake websites, telemarketing calls
Fraud:
• Deception or misrepresentation
• Identity theft, credit card fraud
Phishing:
• Cyber criminals
• Fraudulent emails, text messages
Motivation
Financial
gain
Revenge
Personal
Gain
Political
or social
Thrill-
seeking
What drives scammers to do such activities?
Impact of Fraud, Scams, and Phishing
Factors that enable
these criminal activities:
Scammer/
Fraudsters
Group Leader
Researcher
Planner
Executor
Victims
Students
Foreigners
Job Seekers
Elderly
people
Third Party
Scam Leader
Organizations
Cyber-police
Mechanisms
Technology
Provide the
infrastructure
that allows
scammers to
reach a wider
audience
Payment
Methods
Global Reach
Lack of
Awareness
Makes more
vulnerable to
falling victim
Trust Issues
Lack of
Regulations
Not enough
security
Cyber police
not as
effective
Key Actors:
INSIDE THE MIND OF SCAMMER
Root Causes
• Technology is constantly evolving
• Where are we going wrong?
Why is it important
• Prevent scams and be cautious
• Intervene by law enforcements to
track down scammers, identify
their victims
• To help individuals rehabilitate
and prevent recidivism.
• Rationalization
• Empathy deficit
• Narcissism
• Skilful manipulation
Traits
INSIDE THE MIND OF SCAMMER
• Rationalization –
1. Believe system is unfair, blame the victims
AL Capone – An American Gangster
"I have spent the best years of my life-giving people the lighter
pleasures, helping them have a good time, and all I get is abuse, the
existence of a hunted man."
• Empathy deficit –
1. Treat Victims as objects for personal gain,
2. avoid feeling guilty or remorseful
• Narcissism -
1. An inflated sense of self-importance and a constant need for attention
and admiration.
2. Motivated by the desire to impress others or to feel important and
powerful
• Skillful manipulation
1. Tactics to gain trust, including flattery, emotional appeals, and false
promises.
THE FOOT IN THE DOOR TECHNIQUE
LET US LEARN FROM NETFLIX
PSYCHOLOGY OF VICTIMS
Desperation Trust
Over
confidence
Fear of
missing out
Greed
Protecting Yourself from Scam, Phishing, and Fraud
Use strong passwords and two-
factor authentication to protect
online accounts
Be cautious when opening
emails or clicking on links from
unknown sources
Keep personal information
private and always verify the
legitimacy of requests for
personal information
Use anti-virus software
and keep it updated to
protect against malware
and other threats
Regularly monitor
bank and credit card
statements for
suspicious activity
Act quickly if you
suspect you have
become a victim of
scam, phishing, or fraud
Seek assistance from
specialized
organizations and
resources
What if you are already scammed?
Don’t be depressed/ Stay calm
Report the incident to authorities
Contact your bank or credit card company
Seek legal assistance
• Building awareness :
1. Educating oneself about common scam tactics and being
skeptical of unsolicited offers or requests can help reduce
the likelihood of falling victim to a scam.
• Avoiding emotional decision-making:
1. Be aware of your emotions and avoid making decisions
when you are feeling overwhelmed or stressed.
2. Taking a step back, assessing the situation logically, and
consulting with trusted advisors can help prevent making
impulsive decisions.
• Developing healthy skepticism:
1. Be skeptical of anything that seems too good to be true
2. Questioning information and verifying sources can help
prevent falling for false or misleading information. This can
also help avoid confirmation bias, where one is more likely
to believe information that confirms pre-existing beliefs.
• Building resilience:
1. Developing resilience through social support, self-care, and
positive coping mechanisms can help reduce vulnerability to
scams.
PSYCHOLOGICAL STRATEGIES
• Use cognitive reframing:
1. Cognitive reframing involves changing the way you think about a
situation to reduce negative emotions or behaviors.
2. When you receive a suspicious email or message, try reframing
your thoughts by considering alternative explanations or
questioning the authenticity of the message. This can help
reduce the emotional impact and make it easier to make
rational decisions.
• Use self-control strategies:
1. Self-control strategies such as distraction, delay, or self-talk can
help reduce impulsive decision-making and increase the
likelihood that you will make rational decisions.
2. If you receive a message asking you to take action, try delaying
your response and taking some time to think it over.
• Use mindfulness techniques:.
1. Mindfulness techniques such as deep breathing, meditation, or
body scan can help reduce stress and improve your ability to
make rational decisions when faced with a potential scam.
2. If you feel overwhelmed or stressed by a message or offer, try
practicing mindfulness to help calm your mind and reduce the
emotional impact.
PSYCHOLOGICAL STRATEGIES
PREVENTION IS BETTER THAN CURE !
FAKE! • FAKE phishing links, QR’s
• Blockchain- Sense of urgency, FOMO
DON’T CATCH THE FALLING KNIFE!
• Understand the Purpose of Bitcoin. A 500 $
investment cannot transfer you 250,000
BTC
1BTC = 30,000 CAD
• Look for the 🔒 symbol on the websites.
• Cryptocurrency exchanges are not Banks.
FTX collapse, VAULD suspends Withdrawals
NOT YOUR KEYS, NOT YOUR CRYPTO
Fraud in the age of AI
• The use of AI in scams and fraud is a
growing concern.
• Scammers can use AI to create
realistic deepfake videos and voice
recordings.
• AI-powered chatbots can be used to
scam people by mimicking human
conversations.
• AI can be used to analyze data and
create targeted phishing campaigns.
Our Role as Engineering Leaders
• Character- Desire to innovate and solve
societal problems in an ethical and
responsible way.
• Vision- Providing Platform and Creating
Awareness around the world and starting
from the Leaders itself!
• Competency- Knowledge and skills to
identify scams. Staying informed about the
tactics and train our teams to do the same.
• Involvement- Creating a culture of
vigilance, and providing necessary support
to help people stay safe online
• Collaboration- Build strong partnership
with other leaders, experts, stakeholders to
address the issue on a broader scale.
References
Konnikova, M. (2016, July 27). The psychology of con artists, and how to avoid them [Video].
YouTube. https://www.youtube.com/watch?v=hSlBiMdlyyU&t=133s
Norris, G., Brookes, A. & Dowell, D. The Psychology of Internet Fraud Victimisation: a Systematic
Review. J Police Crim Psych 34, 231–245 (2019). https://doi.org/10.1007/s11896-019-09334-5
Watts, S. (2019, March 21). The Psychology Behind Scamming. Forbes. Retrieved from
https://www.forbes.com/sites/sarahwatts/2019/03/21/the-psychology-behind-
scamming/?sh=62e56f953447
Vircom. (n.d.). Phishing Examples, Techniques, and Motivations. Retrieved March 26, 2023, from
https://www.vircom.com/blog/phishing-examples-techniques-motivations/
Final - Scam, Fraud and Phishing-Resubmission.pptx

More Related Content

Similar to Final - Scam, Fraud and Phishing-Resubmission.pptx

Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Beth Sallay
 
Informed Investor: Social Media
Informed Investor: Social Media Informed Investor: Social Media
Informed Investor: Social Media
INInvestWatch
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
Sara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
Sara-Jayne Terp
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
jennblair0830
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
 
Avoid Fraud -- and Secure the Life You Want
Avoid Fraud -- and Secure the Life You Want Avoid Fraud -- and Secure the Life You Want
Avoid Fraud -- and Secure the Life You Want
Brian Weatherdon
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
afiyashaikh25
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
Stephen Jesukanth Martin
 
Describe Your Background Essay Example
Describe Your Background Essay ExampleDescribe Your Background Essay Example
Describe Your Background Essay Example
Andrea Lawson
 
A criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative frameworkA criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative framework
Sameer Dasaka
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
Abdah Munirah
 
When bureaucrats met twitter
When bureaucrats met twitterWhen bureaucrats met twitter
When bureaucrats met twitter
Kevin Kim
 
Social Dilemma.pptx
Social Dilemma.pptxSocial Dilemma.pptx
Social Dilemma.pptx
crystalhafley
 
Test your Unconscious Bias
Test your Unconscious BiasTest your Unconscious Bias
Test your Unconscious Bias
Kwintessential Consulting Ltd.
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
Rahil Foundation
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Ethics In A Digital Age
Ethics In A Digital AgeEthics In A Digital Age
Ethics In A Digital Age
Louise Stanger Ed.D, LCSW, CDWF, CIP
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
Suman Thapaliya
 
Seductive security - Art of seduction
Seductive security - Art of seductionSeductive security - Art of seduction
Seductive security - Art of seduction
b coatesworth
 

Similar to Final - Scam, Fraud and Phishing-Resubmission.pptx (20)

Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
Informed Investor: Social Media
Informed Investor: Social Media Informed Investor: Social Media
Informed Investor: Social Media
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Avoid Fraud -- and Secure the Life You Want
Avoid Fraud -- and Secure the Life You Want Avoid Fraud -- and Secure the Life You Want
Avoid Fraud -- and Secure the Life You Want
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Describe Your Background Essay Example
Describe Your Background Essay ExampleDescribe Your Background Essay Example
Describe Your Background Essay Example
 
A criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative frameworkA criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative framework
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
When bureaucrats met twitter
When bureaucrats met twitterWhen bureaucrats met twitter
When bureaucrats met twitter
 
Social Dilemma.pptx
Social Dilemma.pptxSocial Dilemma.pptx
Social Dilemma.pptx
 
Test your Unconscious Bias
Test your Unconscious BiasTest your Unconscious Bias
Test your Unconscious Bias
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Ethics In A Digital Age
Ethics In A Digital AgeEthics In A Digital Age
Ethics In A Digital Age
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Seductive security - Art of seduction
Seductive security - Art of seductionSeductive security - Art of seduction
Seductive security - Art of seduction
 

Recently uploaded

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 

Recently uploaded (20)

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 

Final - Scam, Fraud and Phishing-Resubmission.pptx

  • 1.
  • 2. The Dark Side of the Web: Scam, Fraud and Phishing Presented By: Harsh Patel Kush Patel Shivang Goyal Shubham Chaudhari Yousuf Mohd Sayeed Dr. Minha R Ha. Guided By:
  • 3. Problem Definition Frauds, scams, and phishing are major threats to individuals and organizations worldwide, causing substantial financial losses and reputational damage. These criminal activities exploit vulnerabilities in the online world, targeting unsuspecting victims who may not have the necessary knowledge to protect themselves. To address this problem, awareness must be raised, and our group aims to research strategies that can be used to tackle this problem.
  • 4. Introduction Scam, Fraud and Phishing Scam: • False promises, misinformation, and psychological manipulation • Fake websites, telemarketing calls Fraud: • Deception or misrepresentation • Identity theft, credit card fraud Phishing: • Cyber criminals • Fraudulent emails, text messages
  • 6. Impact of Fraud, Scams, and Phishing
  • 7. Factors that enable these criminal activities: Scammer/ Fraudsters Group Leader Researcher Planner Executor Victims Students Foreigners Job Seekers Elderly people Third Party Scam Leader Organizations Cyber-police Mechanisms Technology Provide the infrastructure that allows scammers to reach a wider audience Payment Methods Global Reach Lack of Awareness Makes more vulnerable to falling victim Trust Issues Lack of Regulations Not enough security Cyber police not as effective Key Actors:
  • 8. INSIDE THE MIND OF SCAMMER Root Causes • Technology is constantly evolving • Where are we going wrong? Why is it important • Prevent scams and be cautious • Intervene by law enforcements to track down scammers, identify their victims • To help individuals rehabilitate and prevent recidivism. • Rationalization • Empathy deficit • Narcissism • Skilful manipulation Traits
  • 9. INSIDE THE MIND OF SCAMMER • Rationalization – 1. Believe system is unfair, blame the victims AL Capone – An American Gangster "I have spent the best years of my life-giving people the lighter pleasures, helping them have a good time, and all I get is abuse, the existence of a hunted man." • Empathy deficit – 1. Treat Victims as objects for personal gain, 2. avoid feeling guilty or remorseful • Narcissism - 1. An inflated sense of self-importance and a constant need for attention and admiration. 2. Motivated by the desire to impress others or to feel important and powerful • Skillful manipulation 1. Tactics to gain trust, including flattery, emotional appeals, and false promises. THE FOOT IN THE DOOR TECHNIQUE LET US LEARN FROM NETFLIX
  • 10. PSYCHOLOGY OF VICTIMS Desperation Trust Over confidence Fear of missing out Greed
  • 11. Protecting Yourself from Scam, Phishing, and Fraud Use strong passwords and two- factor authentication to protect online accounts Be cautious when opening emails or clicking on links from unknown sources Keep personal information private and always verify the legitimacy of requests for personal information Use anti-virus software and keep it updated to protect against malware and other threats Regularly monitor bank and credit card statements for suspicious activity Act quickly if you suspect you have become a victim of scam, phishing, or fraud Seek assistance from specialized organizations and resources
  • 12. What if you are already scammed? Don’t be depressed/ Stay calm Report the incident to authorities Contact your bank or credit card company Seek legal assistance
  • 13. • Building awareness : 1. Educating oneself about common scam tactics and being skeptical of unsolicited offers or requests can help reduce the likelihood of falling victim to a scam. • Avoiding emotional decision-making: 1. Be aware of your emotions and avoid making decisions when you are feeling overwhelmed or stressed. 2. Taking a step back, assessing the situation logically, and consulting with trusted advisors can help prevent making impulsive decisions. • Developing healthy skepticism: 1. Be skeptical of anything that seems too good to be true 2. Questioning information and verifying sources can help prevent falling for false or misleading information. This can also help avoid confirmation bias, where one is more likely to believe information that confirms pre-existing beliefs. • Building resilience: 1. Developing resilience through social support, self-care, and positive coping mechanisms can help reduce vulnerability to scams. PSYCHOLOGICAL STRATEGIES
  • 14. • Use cognitive reframing: 1. Cognitive reframing involves changing the way you think about a situation to reduce negative emotions or behaviors. 2. When you receive a suspicious email or message, try reframing your thoughts by considering alternative explanations or questioning the authenticity of the message. This can help reduce the emotional impact and make it easier to make rational decisions. • Use self-control strategies: 1. Self-control strategies such as distraction, delay, or self-talk can help reduce impulsive decision-making and increase the likelihood that you will make rational decisions. 2. If you receive a message asking you to take action, try delaying your response and taking some time to think it over. • Use mindfulness techniques:. 1. Mindfulness techniques such as deep breathing, meditation, or body scan can help reduce stress and improve your ability to make rational decisions when faced with a potential scam. 2. If you feel overwhelmed or stressed by a message or offer, try practicing mindfulness to help calm your mind and reduce the emotional impact. PSYCHOLOGICAL STRATEGIES
  • 15. PREVENTION IS BETTER THAN CURE ! FAKE! • FAKE phishing links, QR’s • Blockchain- Sense of urgency, FOMO DON’T CATCH THE FALLING KNIFE! • Understand the Purpose of Bitcoin. A 500 $ investment cannot transfer you 250,000 BTC 1BTC = 30,000 CAD • Look for the 🔒 symbol on the websites. • Cryptocurrency exchanges are not Banks. FTX collapse, VAULD suspends Withdrawals NOT YOUR KEYS, NOT YOUR CRYPTO
  • 16. Fraud in the age of AI • The use of AI in scams and fraud is a growing concern. • Scammers can use AI to create realistic deepfake videos and voice recordings. • AI-powered chatbots can be used to scam people by mimicking human conversations. • AI can be used to analyze data and create targeted phishing campaigns.
  • 17. Our Role as Engineering Leaders • Character- Desire to innovate and solve societal problems in an ethical and responsible way. • Vision- Providing Platform and Creating Awareness around the world and starting from the Leaders itself! • Competency- Knowledge and skills to identify scams. Staying informed about the tactics and train our teams to do the same. • Involvement- Creating a culture of vigilance, and providing necessary support to help people stay safe online • Collaboration- Build strong partnership with other leaders, experts, stakeholders to address the issue on a broader scale.
  • 18. References Konnikova, M. (2016, July 27). The psychology of con artists, and how to avoid them [Video]. YouTube. https://www.youtube.com/watch?v=hSlBiMdlyyU&t=133s Norris, G., Brookes, A. & Dowell, D. The Psychology of Internet Fraud Victimisation: a Systematic Review. J Police Crim Psych 34, 231–245 (2019). https://doi.org/10.1007/s11896-019-09334-5 Watts, S. (2019, March 21). The Psychology Behind Scamming. Forbes. Retrieved from https://www.forbes.com/sites/sarahwatts/2019/03/21/the-psychology-behind- scamming/?sh=62e56f953447 Vircom. (n.d.). Phishing Examples, Techniques, and Motivations. Retrieved March 26, 2023, from https://www.vircom.com/blog/phishing-examples-techniques-motivations/