SlideShare una empresa de Scribd logo
1 de 50
Chapter 12: The Dark Side of  Computer-Mediated  Communication
Great CMC or source of Fraud? ,[object Object],[object Object]
Online Dating: Analyzing the Algorithms of Attraction ,[object Object],[object Object],[object Object]
Does online dating work? ,[object Object],[object Object],[object Object]
Truth about online dating ,[object Object]
A Crash Course in the Dangers of Computer Mediated Communication ,[object Object]
TINSTAAFL!! ,[object Object],Develop Good Consumer Skills
The Fox and The Crow
“ There’s a sucker born every minute.”
Internet Scams are happening all around you! Tribune Review “ Indiana Man Loses Thousands” May 25, 2004  Fake Cashiers Check For Car purchase – Sent a money order through Western Union for shipping.
[object Object],Emails, phone calls, text messages, strange “friend requests: Run Away! Beware of the “Push”, i.e. A Communication that You Did Not Initiate
Just how gullible are we?
75% of kids are willing to share personal information online about themselves and their family in exchange for goods and services.
FTC’S DIRTY DOZEN SCAMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHY DO WE FALL FOR IT?
Greed…..
Greed = Scam…..
Fear….
Fear = Scam MailFrontier recently claimed that  over 40% of recipients fell for the recent Citibank Email Phishing Scam .
Curiosity…..
Curiosity = Scam
Temptation….. Ref. Number:EGOGHS255125600419    Batch Number: 14/ 01259/ IPD    Ticket Number:113-2471-752-209    Serial Number: 5063-11    Attention     We are pleased to inform you  of the result of the Winners    in our UNIVERSAL STAKES Lottery Program held on the 20th    JULY, 2004.Your e-mail address attached to ticket number    27522465896-6453 with serial number 3772-554 drew lucky    numbers 7-14-18-31-45 which consequently won in the 2ND    category, you have therefore  been approved for a lump sum    pay out of USD$1,500,000  ( One Million Five Hundred    Dollars) Only  . CONGRATULATIONS!
If It’s Spam It’s Scam! A Safe Rule Of Thumb
Modeling Scams… a pathway for sex crimes
What makes them scams? ,[object Object],[object Object],[object Object],[object Object]
Besides the scam… ,[object Object],[object Object],[object Object]
Modeling Scams leading to Sex Crimes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Hey, that’s not me!
A new, targeted social media version of a very old scam -- the “Nigerian,” or “419,” ploy
The meteoric rise in social media use has also created a launch pad for identity thieves.  ,[object Object],Robert Siciliano  : CEO of IDTheftSecurity.com http://www.youtube.com/watch?v=JwFC0jfxTco
 
How did they do that? ,[object Object]
ttp://www.youtube.com/watch?v=6Y8cU4kVqHg&feature=channel  OMG
Privacy Paradox An Oxymoron Young people will freely give up personal information to join social networks on the Internet.  Afterwards, they are surprised when their parents read their journals.  " There's a big difference between publicly available data and publicized data.” Dr.  Dana Boyd,  co-author a newly published book:  Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning with New Media .
Social networks put careers at risk Recent  Market Research  Microsoft http://www.euractiv.com/en/Social-networks-careers-risk ,[object Object],[object Object],[object Object],Digital tattoos
Symantic  and Sperling’s Best Places  2010 Report Americas Riskiest Cities for Cybercrime ,[object Object]
Variables In Study  ,[object Object],[object Object],[object Object]
 
 
 
 
 
We are all victims! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Three  FREE “must have” online tools.. http://www.passwordchart.com/
http://www.passpack.com/en/home/
http://www.roboform.com/
Any Web site or print ad offering free credit reports has to display this disclosure across the top of each page: THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV. You have the right to a free credit report from A nnualCreditReport.com or 877-322-8228, the ONLY authorized source under federal law. In September 2010 the rules will go into effect for TV and radio ads. September 2010: New law goes into effect.
[object Object],[object Object],Become a Privacy Grouch
Want to know more!  My new course offered this fall.

Más contenido relacionado

La actualidad más candente

The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationminiaturequery546
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaPriyanka Aash
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”IDology, Inc
 
Dpd online reputation research overview
Dpd online reputation research overviewDpd online reputation research overview
Dpd online reputation research overviewMitya Voskresensky
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Ipsos UK
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersEnterprise Management Associates
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your AdvantageTrost, Micki
 
Trusting Our Internet
Trusting Our InternetTrusting Our Internet
Trusting Our Internettwizzler290
 
Exercise Internet Marketing Statement © , Net , Computer Information
Exercise Internet Marketing Statement © , Net , Computer InformationExercise Internet Marketing Statement © , Net , Computer Information
Exercise Internet Marketing Statement © , Net , Computer InformationTheawaster485
 
Quiz4 Powerpoint
Quiz4 PowerpointQuiz4 Powerpoint
Quiz4 Powerpointadv410
 
PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)Andy Polesovsky
 
Click Fraud and the Downfall of Google
Click Fraud and the Downfall of GoogleClick Fraud and the Downfall of Google
Click Fraud and the Downfall of GoogleTwinVasion
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 

La actualidad más candente (20)

The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal information
 
Quiz 4 Ppt
Quiz 4 PptQuiz 4 Ppt
Quiz 4 Ppt
 
The Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social MediaThe Newest Element of Risk Metrics: Social Media
The Newest Element of Risk Metrics: Social Media
 
Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”Age Verification / “Doing the Right Thing”
Age Verification / “Doing the Right Thing”
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Dpd online reputation research overview
Dpd online reputation research overviewDpd online reputation research overview
Dpd online reputation research overview
 
Online Piracy Paper
Online Piracy PaperOnline Piracy Paper
Online Piracy Paper
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
Trusting Our Internet
Trusting Our InternetTrusting Our Internet
Trusting Our Internet
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
CYBERCRIME IN BUSINESS
CYBERCRIME IN BUSINESSCYBERCRIME IN BUSINESS
CYBERCRIME IN BUSINESS
 
Exercise Internet Marketing Statement © , Net , Computer Information
Exercise Internet Marketing Statement © , Net , Computer InformationExercise Internet Marketing Statement © , Net , Computer Information
Exercise Internet Marketing Statement © , Net , Computer Information
 
Quiz4 Powerpoint
Quiz4 PowerpointQuiz4 Powerpoint
Quiz4 Powerpoint
 
PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)PSI Staff Report Final 5.18.2016 Update (1)
PSI Staff Report Final 5.18.2016 Update (1)
 
Click Fraud and the Downfall of Google
Click Fraud and the Downfall of GoogleClick Fraud and the Downfall of Google
Click Fraud and the Downfall of Google
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Litmus: Gender On The Net
Litmus: Gender On The NetLitmus: Gender On The Net
Litmus: Gender On The Net
 

Destacado

Communcation in the internet age (bener2 final)
Communcation in the internet age (bener2 final)Communcation in the internet age (bener2 final)
Communcation in the internet age (bener2 final)Nyoman Purnaya
 
Influence of the Internet on Communication and Journalism standards.
Influence of the Internet on Communication and Journalism standards.Influence of the Internet on Communication and Journalism standards.
Influence of the Internet on Communication and Journalism standards.Jeneil McDonald
 
Module 03 communication on internet
Module 03 communication on internetModule 03 communication on internet
Module 03 communication on internetthinkict
 
Tutorial 07 - Mass Communication on the Internet
Tutorial 07 - Mass Communication on the InternetTutorial 07 - Mass Communication on the Internet
Tutorial 07 - Mass Communication on the Internetdpd
 
Computer mediated communication
Computer mediated communicationComputer mediated communication
Computer mediated communicationMJ Ferdous
 
Technologically/Computer Mediated Communication
Technologically/Computer Mediated CommunicationTechnologically/Computer Mediated Communication
Technologically/Computer Mediated CommunicationAbid Zafar
 
Computer mediated communication slide
Computer mediated communication slideComputer mediated communication slide
Computer mediated communication slidemoona butt
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Emaildpd
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahSoham
 
Week 11 - Computer Mediated Communication
Week 11  - Computer Mediated CommunicationWeek 11  - Computer Mediated Communication
Week 11 - Computer Mediated CommunicationJoanne Tjahyana
 
Types of communication
Types of communicationTypes of communication
Types of communicationParmar Milan
 
MQTT - Communication in the Internet of Things
MQTT - Communication in the Internet of ThingsMQTT - Communication in the Internet of Things
MQTT - Communication in the Internet of ThingsChristian Götz
 
Computer mediated communication (cmc) as a subject
Computer mediated communication (cmc) as a subjectComputer mediated communication (cmc) as a subject
Computer mediated communication (cmc) as a subjectuhandai
 
Method of Determination of CMC
Method of Determination of CMCMethod of Determination of CMC
Method of Determination of CMCMadiha Mushtaque
 
Concept of MIcelle & CMC
Concept of MIcelle & CMCConcept of MIcelle & CMC
Concept of MIcelle & CMCAkshay Pawar
 
1. sales training buyer behaviour
1. sales training   buyer behaviour1. sales training   buyer behaviour
1. sales training buyer behaviourEarl Stevens
 

Destacado (18)

6. CMC
6. CMC6. CMC
6. CMC
 
Communcation in the internet age (bener2 final)
Communcation in the internet age (bener2 final)Communcation in the internet age (bener2 final)
Communcation in the internet age (bener2 final)
 
Influence of the Internet on Communication and Journalism standards.
Influence of the Internet on Communication and Journalism standards.Influence of the Internet on Communication and Journalism standards.
Influence of the Internet on Communication and Journalism standards.
 
CMC
CMCCMC
CMC
 
Module 03 communication on internet
Module 03 communication on internetModule 03 communication on internet
Module 03 communication on internet
 
Tutorial 07 - Mass Communication on the Internet
Tutorial 07 - Mass Communication on the InternetTutorial 07 - Mass Communication on the Internet
Tutorial 07 - Mass Communication on the Internet
 
Computer mediated communication
Computer mediated communicationComputer mediated communication
Computer mediated communication
 
Technologically/Computer Mediated Communication
Technologically/Computer Mediated CommunicationTechnologically/Computer Mediated Communication
Technologically/Computer Mediated Communication
 
Computer mediated communication slide
Computer mediated communication slideComputer mediated communication slide
Computer mediated communication slide
 
Tutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: EmailTutorial 2 - Basic Communication on the Internet: Email
Tutorial 2 - Basic Communication on the Internet: Email
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam Shah
 
Week 11 - Computer Mediated Communication
Week 11  - Computer Mediated CommunicationWeek 11  - Computer Mediated Communication
Week 11 - Computer Mediated Communication
 
Types of communication
Types of communicationTypes of communication
Types of communication
 
MQTT - Communication in the Internet of Things
MQTT - Communication in the Internet of ThingsMQTT - Communication in the Internet of Things
MQTT - Communication in the Internet of Things
 
Computer mediated communication (cmc) as a subject
Computer mediated communication (cmc) as a subjectComputer mediated communication (cmc) as a subject
Computer mediated communication (cmc) as a subject
 
Method of Determination of CMC
Method of Determination of CMCMethod of Determination of CMC
Method of Determination of CMC
 
Concept of MIcelle & CMC
Concept of MIcelle & CMCConcept of MIcelle & CMC
Concept of MIcelle & CMC
 
1. sales training buyer behaviour
1. sales training   buyer behaviour1. sales training   buyer behaviour
1. sales training buyer behaviour
 

Similar a Chapter 12: Computer Mediated Communicationcmc

Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentationRay Brannon
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsRay Brannon
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 
My Online Image
My Online ImageMy Online Image
My Online Imagealuthe
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & ThievesLorena Magee
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 

Similar a Chapter 12: Computer Mediated Communicationcmc (20)

Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentation
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber Threats
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
My Online Image
My Online ImageMy Online Image
My Online Image
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Facebook
FacebookFacebook
Facebook
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 

Más de Ray Brannon

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedRay Brannon
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociologyRay Brannon
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Ray Brannon
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics Ray Brannon
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Ray Brannon
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to thinkRay Brannon
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Ray Brannon
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Ray Brannon
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story RevisedRay Brannon
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.Ray Brannon
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speechesRay Brannon
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body languageRay Brannon
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Ray Brannon
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study Ray Brannon
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsRay Brannon
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsRay Brannon
 

Más de Ray Brannon (20)

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revised
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociology
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18
 
Stratification
Stratification Stratification
Stratification
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to think
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story Revised
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speeches
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body language
 
Get A Job 2016
Get A Job 2016Get A Job 2016
Get A Job 2016
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your Presentations
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tips
 

Chapter 12: Computer Mediated Communicationcmc

  • 1. Chapter 12: The Dark Side of Computer-Mediated Communication
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. The Fox and The Crow
  • 9. “ There’s a sucker born every minute.”
  • 10. Internet Scams are happening all around you! Tribune Review “ Indiana Man Loses Thousands” May 25, 2004 Fake Cashiers Check For Car purchase – Sent a money order through Western Union for shipping.
  • 11.
  • 12. Just how gullible are we?
  • 13. 75% of kids are willing to share personal information online about themselves and their family in exchange for goods and services.
  • 14.
  • 15. WHY DO WE FALL FOR IT?
  • 19. Fear = Scam MailFrontier recently claimed that over 40% of recipients fell for the recent Citibank Email Phishing Scam .
  • 22. Temptation….. Ref. Number:EGOGHS255125600419   Batch Number: 14/ 01259/ IPD   Ticket Number:113-2471-752-209   Serial Number: 5063-11   Attention   We are pleased to inform you of the result of the Winners   in our UNIVERSAL STAKES Lottery Program held on the 20th   JULY, 2004.Your e-mail address attached to ticket number   27522465896-6453 with serial number 3772-554 drew lucky   numbers 7-14-18-31-45 which consequently won in the 2ND   category, you have therefore been approved for a lump sum   pay out of USD$1,500,000 ( One Million Five Hundred   Dollars) Only . CONGRATULATIONS!
  • 23. If It’s Spam It’s Scam! A Safe Rule Of Thumb
  • 24. Modeling Scams… a pathway for sex crimes
  • 25.
  • 26.
  • 27.
  • 28.  
  • 30. A new, targeted social media version of a very old scam -- the “Nigerian,” or “419,” ploy
  • 31.
  • 32.  
  • 33.
  • 35. Privacy Paradox An Oxymoron Young people will freely give up personal information to join social networks on the Internet. Afterwards, they are surprised when their parents read their journals. " There's a big difference between publicly available data and publicized data.” Dr. Dana Boyd, co-author a newly published book:  Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning with New Media .
  • 36.
  • 37.
  • 38.
  • 39.  
  • 40.  
  • 41.  
  • 42.  
  • 43.  
  • 44.
  • 45. Three FREE “must have” online tools.. http://www.passwordchart.com/
  • 48. Any Web site or print ad offering free credit reports has to display this disclosure across the top of each page: THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV. You have the right to a free credit report from A nnualCreditReport.com or 877-322-8228, the ONLY authorized source under federal law. In September 2010 the rules will go into effect for TV and radio ads. September 2010: New law goes into effect.
  • 49.
  • 50. Want to know more! My new course offered this fall.

Notas del editor

  1. If its span its scam is a safe approach to online merchants offering things to good to be true.
  2. Some viewers of Gilligan’s Island apparently took the show seriously in the 1960s. The U.S. Coast Guard received several telegrams from concerned citizens asking why they didn’t rescue the Minnow’s crew. This has been an excellent week. I have received four or five emails from London and Africa announcing that I have been selected to receive, from each of them, sums in eXcess of ten million dollars The quite remarkable fact seems to be that one fellow’s plane crash, another’s unexpected demise—apparently run over by a herd of elephants— a third’s cruel wife, have all resulted in me being just the right person on the planet to receive millions of dollars which was left in their estates. Not only that: Several lotteries have paid off this week as well, and, just like the poor African ministers who want to share their millions with me, the lottery companies are happy to send money as well. It seems all I have to do is let any one of these secret correspondents know a few details about my bank account and social security number and my life worries will be over.
  3. Illegal pyramid schemes. Sell YOU e-mail lists. Illegal and everyone loses money. Stuffing envelopes You pay to register- you send same ad to others. Gimmick cures and “scientific breakthroughs”. Don’t work. World currency market scam – beware. Free goods like computer – have to pay to join – bring in other memebers – disguised pyramid plan. Ponzi schemes – paid from money from later investors and told to invest more money… Kits don’t work and if they did they are illegal and cable companies are aggressively prosecuting. You pay up front costs but loans don’t come through Promise to erase negative information – promoters of this scam cannot deliver – if you lie on a loan app about your income, ss# you could be committing fraud and violation federal laws You “won” a vacation on a deluxe cruise chip – more like a tugboat with expensive upgrades – hotel accommodations are shabby.
  4. Today in the game -MISSING we have learned grooming techniques of on-line predators -Airdogs- theft, fraud, bullying The next area of concern are modeling scams… Modeling agencies prepare prospective models for the industry by enhancing their appearance, training them on the catwalk, photo shots, and arrange jobs for the models. What can sometimes happens is the modeling agencies are fronts for scams and other criminal activity
  5. What makes them scams… Several years ago I became a partner in a retail clothing company and part of my responsibilities were the advertising and marketing of the company -I signed up with a local modeling agency (in an professional office) to participate in a workshop and photo shot to build a portfolio. I learned how to “work” the catwalk, makeup and clothing and photography. I paid for my photos (slides) Was sent on a “job” hair model…never paid, never called again Learned what I needed to know for my work However, there are other scams that lead to very different situations….
  6. (After reading slide) My experience: -Cattle call…eliminated down, called back to meet in a hotel room…at my age and experience ….RED FLAG!
  7. Web criminals are getting much more personal in their attacks, using social networking sites and other databases to make their story lines much more believable. Bryan Rutberg's daughter was among the first to notice something odd about her dad's Facebook page. At about 8 p.m. on Jan. 21, she ran into his bedroom and asked why he'd changed his status to: “BRYAN IS IN URGENT NEED OF HELP!!!“ In Rutberg's case, criminals managed to steal his Facebook login password, steal his Facebook identity, and change his page to make it appear he was in trouble. Next, the criminals sent e-mails to dozens of friends, begging them for help.