Ethics PowerPoint

Report
INTERNET CRIME:
DISAGREEING WITH IDENTITY THEFT AND
ONLINE MEDIA PIRACY
By: Amba Kasongo
Section: 006
WHAT IS IDENTITY THEFT?
Identity theft happens when someone steals your personal information and uses it
without your permission. It’s a serious crime that can wreak havoc with your finances,
credit history, and reputation — and can take time, money, and patience to resolve
http://www.consumer.ftc.gov/features/feature-0014-identity-theft
DIFFERENT TYPES OF IDENTITY THEFT
Non-technological types:
Dumpster Diving: When the identity thief goes through your trash to steal personal info
Shoulder Surfing: When the identity thief gets close enough to see you enter a password or PIN number
Stealing Personal Items: When the identity thief steals a wallet or purse when the victim isn’t paying close
attention to their personal belongings
Technological types:
Credit/Debit Card Theft: The use of someone else’s personal bank information for financial gain
Phishing Schemes: This is when a fraudster (an identity thief) uses different ways (i.e. the internet, social
networks, emails, text messages..etc) to gain personal information
SMiShing: The identity thief sends spam text messages posing as a financial institution or other legitimate
entity. The text message usually has a sense of urgency so it prompts victims to believe any claims
http://www.utica.edu/academic/institutes/cimip/idcrimes/schemes.cfm
IDENTITY THEFT STATISTICS
There have been more than 12 million incidences of identity theft has occurred in
2012
More than $21 Billion dollars have been stolen by fraudsters (Identity thieves) in
2012; this is the most since 2009
2 out of 3 Identity theft victims do not know the source of the crime
Lost/Stolen, checkbook or credit card accounts for 15.1%
Computer related identity crime accounts for 21.6%
Corrupt businesses or employees account for 11.6%
http://www.identitytheftassistance.org/pageview.php?cateid=47
LAWMAKERS DEBATING STRENGTHENING
IDENTITY THEFT LAWS
In this video, a man and his wife explain how he could not use his governmental
benefits after being badly injured in an accident that left him badly injured and so
he couldn’t use his benefits because someone was using his social security number,
acting as if the victim is working and healthy.
http://www.youtube.com/watch?v=pNJFH0-oIhk
SOLUTIONS TO IDENTITY THEFT
Shred everything you put in the trash that
has sensitive information on it
While using a PIN or password, be
aware of your surroundings and don’t be
afraid to ask someone to move back if
they’re too close to you
Writing CID (which means to “SEE ID”) on
your signature panel on a credit/debit
card requires a merchant to request
proper identification before a purchase is
made
http://www.utica.edu/academic/institutes/cimip/idcrimes/schemes.cfm
ONLINE MEDIA PIRACY
Media Piracy – also known as copyright
infringement – is the practice of using
and/or sharing works (that are under
copyright) without proper permission of
the creator.
DIFFERENT TYPES OF ONLINE MEDIA PIRACY
Books: Illegal photocopying and reproduction of books
Music: Unauthorized uploading and making public of music files
Films: Optical disk piracy (burning movies onto disks), theatrical camcorder piracy
(recording movies or plays), signal theft and broadcasting piracy (stealing
cable/internet or broadcasting films online)
Software: Unauthorized copying of computer software (creating/using duplicates of
Norton Anti-Virus, Microsoft Office, etc..)
Internet (on-line) piracy: Illicit downloads and sharing that occurs through file-sharing
networks, Illegal servers, websites and hacked computers
http://portal.unesco.org/culture/en/ev.php-URL_ID=39412&URL_DO=DO_TOPIC&URL_SECTION=201.html
ONLINE MEDIA PIRACY STATISTICS
70% of users find nothing wrong with piracy
22% of all global Internet Band-With is used for internet piracy
98.8% of data transferred using P2P networks is copyrighted
91.5% of files available for download on Cyberlockers sites (i.e. Rapidshare,
Megaupload, etc) are copyrighted material
Only 1 out of 10,000 pcs of the most popular content on the OpenBitTorrent tracker
is non-copyrighted
There’s an average of $12.5 Billion economic losses each year due to piracy in the
Music industry
71,060 jobs are lost a year in the United States due to online piracy
http://www.go-gulf.com/blog/online-piracy/
IS TRYING TO STOP ONLINE PIRACY A WASTE OF
TIME?
This video quickly explains how the fast matriculation of technology has catapulted
the majority of the piracy programs and its “success”. The video questions whether
there is a point of trying to stop it since the internet is only getting bigger and more
secretive in many different ways
http://www.youtube.com/watch?v=fakgM4SiE_c
SOLUTIONS TO ONLINE MEDIA PIRACY
Identify pirated content: If it is a product that is not an original copyrighted file, do
not use it. You can be at risk of being sued for using the product because you are
then technically pirating
Enforcement of copyright laws: when people are caught doing so, proper laws and
punishment should be enforced effectively so it doesn’t continue to happen
Stop downloading “free” music or movies and support artists’ work by actually
attending showings or purchasing music produced by these artists
The music, film and television industry should consider decreasing prices of some the
content that gets pirated so that they aren’t losing too much profit and are gaining
more than they are losing
PIRACY BY REGION
REFERENCES
Works Cited
"Consumer Information." Identity Theft. N.p., n.d. Web. 18 Nov. 2013. <http://www.consumer.ftc.gov/features/feature-0014identity-theft>.
"Identity Theft Research and Statistics - ITAC Victim Database - Surveys of identity theft victims." Identity Theft Research and
Statistics - ITAC Victim Database - Surveys of identity theft victims. N.p., n.d. Web. 18 Nov. 2013.
<http://www.identitytheftassistance.org/pageview.php?cateid=47>.
"Most Common Schemes - Identity Crimes - Center for Identity Management and Information Protection (CIMIP) - Utica
College." Most Common Schemes - Identity Crimes - Center for Identity Management and Information Protection (CIMIP) - Utica
College. N.p., n.d. Web. 18 Nov. 2013. <http://www.utica.edu/academic/institutes/cimip/idcrimes/schemes.cfm>.
"The Media Piracy Report." Media Piracy The American Assembly. N.p., n.d. Web. 18 Nov. 2013.
<http://piracy.americanassembly.org/the-report/>.
"Types of Piracy." United Nations Educational, Scientific and Cultural Organization. N.p., n.d. Web. 18 Nov. 2013.
<http://portal.unesco.org/culture/en/ev.php-URL_ID=39412&URL_DO=DO_TOPIC&URL_SECTION=201.html>.

похожие документы