Global Perspectives, Problems with
Social Networking
Assignment:
Social Networking & Identity Theft
Introduction – What is Identity Theft..?
 Identity theft is a crime in which a criminal obtains key pieces of personal
information, such as identification numbers or banking details, in order to
pose as someone else.
 The information can be used to...
– Gain access to the victim’s financial (bank or credit card) accounts.
– Obtain credit and purchase merchandise, or make cash advances.
– Secure social benefits, such as social security and drivers license numbers, or
obtain health and/or state welfare services.
 Identity theft can also provide a thief with false credentials for immigration
or other applications.
2 7/16/2015
One of the biggest problems with identity theft is that the victims of identity theft
are often accused and charged with crimes committed in the victim’s name.
The most common types of Identity Theft
The two main types of identity theft are:
 Account takeover identity theft
– A situation where an imposter uses the stolen personal
information to gain access to the person’s existing accounts.
Often the identity thief will use the stolen identity to acquire
even more credit products by changing the victim’s address so
that you credit card bills are not sent to the victim.
 True name identity theft
– When an imposter uses the information to open new accounts.
Such as a new credit card account, or cellular services, or even to
open a new checking account in order to obtain blank checks.
3 7/16/2015
Alarming statistics about Identity Theft |1
 A recent study from Javelin Strategy and Research shows that over 12 million Americans using social
media services were victims of Identity Theft in 2012.
 According to a report issued from the FBI in 2013, Identity Theft is the fastest growing crime in
America.
7/16/20154
34%
24%
20%
Target of an
identity threat
54% Had an account accessed
without their permission
15%
Socially engineered to
disclose password or
other information
13%
Asked to visit a
scam website via
a private message
70%Psychological
Manipulation
Phishing Scams
Alarming statistics about Identity Theft |2
 A PC World poll conducted in 2012 reports that one-third of members using social
networking sites have at least three pieces of personal information posted on
their profile that can make stealing their identity easy.
– 80% of those polled said they were concerned about their privacy, while 60% said they
had no idea what their privacy settings were and who could see their personal
information on those sites.
 A study conducted at Indiana University indicates that 16% of students became
victims of a controlled phishing scam, of which 72% believed it was their friend
who sent them the fraudulent link.
 The highest percentage of victims were age 20-29. It is thought that this age
group more susceptible because they are less likely to regularly track bank
account and credit card activity, pay for identity theft monitoring services, or use
discretion when sharing information on social media
5 7/16/2015
Research shows that millions of people are affected each year, costing victims anywhere from 30~130 hours
of personal time and thousands of dollars to recover and repair their identities.
What some people think about Identity Theft..
 Really no big deal.
 Only individuals who lack basic common sense become victims of Identity
Theft.
 Primarily a crime targeting the elderly.
 Statistics are inconsistent and often fabricated by companies selling Identity
“Theft Prevention” services.
 It will never happen to me.
 A low-risk, high reward crime.
 If you steal someone’s identity you can spend all the money you want without
having to pay.
6 7/16/2015
Regardless of the many opinions on the subject, prudence is often equally as
rewarding as risk..
Consequences and penalties of Identity Theft
 Before the Restitution Act of 2008, in the United States prosecutors
had to prove $5,000 in damages before accusing someone of Identity
Theft.
 Under the new law prosecutors merely need to prove that personal
data was intentionally accessed.
 Depending on the nature and degree of theft penalties may vary:
– Repayment of the victim’s losses.
– Repayment of the victim’s losses, plus a $5,000 penalty and 2 years
imprisonment.
– $100,000 in penalties and 5 years imprisonment.
7 7/16/2015
How to prevent identity theft on Social Media sites
 Install theft protection software on all of the computers you use to access social media
accounts.
 Make sure never to click the box to save your password when you are on a public, work or
laptop computer.
 Avoid giving out personal information on social media sites, such as address, phone number
or your birth date.
 Change your privacy settings on all your social media accounts, so that you have control of
all the information that is posted.
 Type in the name of the social media site, or use a bookmark, instead of clicking on email
links.
 Create complicated passwords when you sign up for social media accounts.
8 7/16/2015
Tip: Some hackers use the "Forgot your Password" link in order to break into your account.
Make sure your security question is not something that could be easily found, such as your
mother's maiden name, your birth date or the city where you were born. Make up your own
questions, or make up the answers so scams cannot use your personal information against
you.

More Related Content

PPTX
Identity Theft Presentation
PPTX
Phishing ppt
PPTX
Cyber crime types
PPTX
Phishing
PPTX
Cyber crime and its types
PPT
Identity theft power_point
PPT
Identity Theft: How to Avoid It
PPT
Internet Fraud
Identity Theft Presentation
Phishing ppt
Cyber crime types
Phishing
Cyber crime and its types
Identity theft power_point
Identity Theft: How to Avoid It
Internet Fraud

What's hot (20)

PPTX
CYBER CRIME
PPTX
Phishing Presentation
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PPTX
Email phishing and countermeasures
PPTX
Invasion of privacy
PPTX
Phishing awareness
PPT
Identity theft
PPT
Phishing: Swiming with the sharks
PPTX
Identity theft ppt
PPTX
Different Types of Phishing Attacks
PPT
Cyber Security and Cyber Awareness
PPTX
Online privacy & security
PPTX
Data breach
KEY
Identity theft
PPTX
PPTX
Cybercrime Investigation | Cybersecurity | PPT
PPT
“Privacy Today” Slide Presentation
PPTX
Security awareness
PPTX
Cyber crime against children
PPT
Indentify Theft Slide Show
CYBER CRIME
Phishing Presentation
Phishing Scams: 8 Helpful Tips to Keep You Safe
Email phishing and countermeasures
Invasion of privacy
Phishing awareness
Identity theft
Phishing: Swiming with the sharks
Identity theft ppt
Different Types of Phishing Attacks
Cyber Security and Cyber Awareness
Online privacy & security
Data breach
Identity theft
Cybercrime Investigation | Cybersecurity | PPT
“Privacy Today” Slide Presentation
Security awareness
Cyber crime against children
Indentify Theft Slide Show
Ad

Viewers also liked (9)

PDF
DCI NetApp Benefits
PPT
Comparision
PPTX
The New Enterprise Data Platform
PDF
Condition monitoring of steam turbines
PDF
Construction Insurance
PDF
Pre-Con Ed: Covering Your "Assets" - Don't get Caught with Your [Software] Pa...
PPT
Resilency
PPTX
Best professional indemnity insurance quote
PDF
Believe In Story - The Power of Content Creation Management
DCI NetApp Benefits
Comparision
The New Enterprise Data Platform
Condition monitoring of steam turbines
Construction Insurance
Pre-Con Ed: Covering Your "Assets" - Don't get Caught with Your [Software] Pa...
Resilency
Best professional indemnity insurance quote
Believe In Story - The Power of Content Creation Management
Ad

Similar to Social networking and identity theft (20)

PDF
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
PPTX
Identity Theft.pptx
PDF
Identity Theft 101
PPTX
12002040701065 SEMINAR this is ppt in pd
PDF
What You Need to Know to Avoid Identity Theft
PPTX
Identity thefts
PDF
Youth Protection Guide - Canada
PDF
Identity theft in internet
PPTX
PROTECTION PERSONAL PRIVACY
PPTX
Protecting Personal Privacy
DOCX
Identity theft in the internet
PPT
Cyber Crime Identity Theft
PDF
All about identity_theft
PPTX
ASIS Phoenix February Presentation
PDF
Identity Theft: The Other You
PDF
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PPT
Idt Jc 02 09
PDF
Identity Theft
PDF
All about identity theft
PDF
Identity Privacy 101 - Quicken Loans Zing Blog
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Identity Theft.pptx
Identity Theft 101
12002040701065 SEMINAR this is ppt in pd
What You Need to Know to Avoid Identity Theft
Identity thefts
Youth Protection Guide - Canada
Identity theft in internet
PROTECTION PERSONAL PRIVACY
Protecting Personal Privacy
Identity theft in the internet
Cyber Crime Identity Theft
All about identity_theft
ASIS Phoenix February Presentation
Identity Theft: The Other You
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
Idt Jc 02 09
Identity Theft
All about identity theft
Identity Privacy 101 - Quicken Loans Zing Blog

Recently uploaded (20)

PPTX
Download_HitPaw Video Converter Crack free
PDF
The Black Turn Best Music Distribution In India
PPTX
MP3jam 1.1.6.14 Crack Free Download Latest
PDF
People in Delhi call cheerful girls for celebrations
PDF
The Best of the Best_ Top 10 Safe Places to Buy Verified Cash App Accounts.pdf
PPTX
Lesson 3: person and his/her relationship with the others NSTP 1
PPTX
Social Media Optimization Services to Grow Your Brand Online
PPTX
Philippine-Pop-Culture.pptx.hhtps.com.ph
PDF
A guide to using Social Media For Business
PDF
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
PDF
Presentation-Popular-Culture-in-the-Philippines.pdf
PPTX
GridinSoft Anti-Malware 4.3.31 Crack & Activation Code
PDF
Faculty of E languageTruongMinhThien.pdf
PDF
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
PPTX
Illuminati free in Uganda +256787776712,0741715666
PPTX
Mindfulness_and_Coping_Workshop in workplace
PPTX
Power BI DAX Formulas and fast easy technical learning
PDF
Why AI-Savvy Freelance Digital Marketers Have a Competitive Edge!.pdf
PDF
GOM Player Plus 2.3.93.5364 Crack latest version
PDF
IDM UltraCompare Professional 24.1.0.5 Crack
Download_HitPaw Video Converter Crack free
The Black Turn Best Music Distribution In India
MP3jam 1.1.6.14 Crack Free Download Latest
People in Delhi call cheerful girls for celebrations
The Best of the Best_ Top 10 Safe Places to Buy Verified Cash App Accounts.pdf
Lesson 3: person and his/her relationship with the others NSTP 1
Social Media Optimization Services to Grow Your Brand Online
Philippine-Pop-Culture.pptx.hhtps.com.ph
A guide to using Social Media For Business
Implementation of Total Quality Management (TQM) in Plywood Production Contro...
Presentation-Popular-Culture-in-the-Philippines.pdf
GridinSoft Anti-Malware 4.3.31 Crack & Activation Code
Faculty of E languageTruongMinhThien.pdf
What is TikTok Cyberbullying_ 15 Smart Ways to Prevent It.pdf
Illuminati free in Uganda +256787776712,0741715666
Mindfulness_and_Coping_Workshop in workplace
Power BI DAX Formulas and fast easy technical learning
Why AI-Savvy Freelance Digital Marketers Have a Competitive Edge!.pdf
GOM Player Plus 2.3.93.5364 Crack latest version
IDM UltraCompare Professional 24.1.0.5 Crack

Social networking and identity theft

  • 1. Global Perspectives, Problems with Social Networking Assignment: Social Networking & Identity Theft
  • 2. Introduction – What is Identity Theft..?  Identity theft is a crime in which a criminal obtains key pieces of personal information, such as identification numbers or banking details, in order to pose as someone else.  The information can be used to... – Gain access to the victim’s financial (bank or credit card) accounts. – Obtain credit and purchase merchandise, or make cash advances. – Secure social benefits, such as social security and drivers license numbers, or obtain health and/or state welfare services.  Identity theft can also provide a thief with false credentials for immigration or other applications. 2 7/16/2015 One of the biggest problems with identity theft is that the victims of identity theft are often accused and charged with crimes committed in the victim’s name.
  • 3. The most common types of Identity Theft The two main types of identity theft are:  Account takeover identity theft – A situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to acquire even more credit products by changing the victim’s address so that you credit card bills are not sent to the victim.  True name identity theft – When an imposter uses the information to open new accounts. Such as a new credit card account, or cellular services, or even to open a new checking account in order to obtain blank checks. 3 7/16/2015
  • 4. Alarming statistics about Identity Theft |1  A recent study from Javelin Strategy and Research shows that over 12 million Americans using social media services were victims of Identity Theft in 2012.  According to a report issued from the FBI in 2013, Identity Theft is the fastest growing crime in America. 7/16/20154 34% 24% 20% Target of an identity threat 54% Had an account accessed without their permission 15% Socially engineered to disclose password or other information 13% Asked to visit a scam website via a private message 70%Psychological Manipulation Phishing Scams
  • 5. Alarming statistics about Identity Theft |2  A PC World poll conducted in 2012 reports that one-third of members using social networking sites have at least three pieces of personal information posted on their profile that can make stealing their identity easy. – 80% of those polled said they were concerned about their privacy, while 60% said they had no idea what their privacy settings were and who could see their personal information on those sites.  A study conducted at Indiana University indicates that 16% of students became victims of a controlled phishing scam, of which 72% believed it was their friend who sent them the fraudulent link.  The highest percentage of victims were age 20-29. It is thought that this age group more susceptible because they are less likely to regularly track bank account and credit card activity, pay for identity theft monitoring services, or use discretion when sharing information on social media 5 7/16/2015 Research shows that millions of people are affected each year, costing victims anywhere from 30~130 hours of personal time and thousands of dollars to recover and repair their identities.
  • 6. What some people think about Identity Theft..  Really no big deal.  Only individuals who lack basic common sense become victims of Identity Theft.  Primarily a crime targeting the elderly.  Statistics are inconsistent and often fabricated by companies selling Identity “Theft Prevention” services.  It will never happen to me.  A low-risk, high reward crime.  If you steal someone’s identity you can spend all the money you want without having to pay. 6 7/16/2015 Regardless of the many opinions on the subject, prudence is often equally as rewarding as risk..
  • 7. Consequences and penalties of Identity Theft  Before the Restitution Act of 2008, in the United States prosecutors had to prove $5,000 in damages before accusing someone of Identity Theft.  Under the new law prosecutors merely need to prove that personal data was intentionally accessed.  Depending on the nature and degree of theft penalties may vary: – Repayment of the victim’s losses. – Repayment of the victim’s losses, plus a $5,000 penalty and 2 years imprisonment. – $100,000 in penalties and 5 years imprisonment. 7 7/16/2015
  • 8. How to prevent identity theft on Social Media sites  Install theft protection software on all of the computers you use to access social media accounts.  Make sure never to click the box to save your password when you are on a public, work or laptop computer.  Avoid giving out personal information on social media sites, such as address, phone number or your birth date.  Change your privacy settings on all your social media accounts, so that you have control of all the information that is posted.  Type in the name of the social media site, or use a bookmark, instead of clicking on email links.  Create complicated passwords when you sign up for social media accounts. 8 7/16/2015 Tip: Some hackers use the "Forgot your Password" link in order to break into your account. Make sure your security question is not something that could be easily found, such as your mother's maiden name, your birth date or the city where you were born. Make up your own questions, or make up the answers so scams cannot use your personal information against you.

Editor's Notes

  • #3: References What is Identity Theft Jerri Ledford, About.com Author unknown, Identitytheftcreditfraud.com
  • #4: References: Author unknown, Identitytheftassistance.org
  • #5: References: 2013, FBI statistics via fraudfighters.com 2012, PC World via fraudavengers.org May 2012, Matt Cullina, idt911blog.com 2012, Javelin Strategy & Research
  • #6: References: 2013, FBI statistics via fraudfighters.com 2012, PC World via fraudavengers.org May 2012, Matt Cullina, idt911blog.com 2012, Javelin Strategy & Research
  • #7: Source: Comments from various blog sites