IM426 – business cases and Case studies in mis. 11 – 13 March 2014 Compiled and/or Prepared by – Celeste Ng. Case 1 – Facebook Used by Scammers for Profit . Top 5 social media scam (1).
An Image/Link below is provided (as is) to download presentationDownload Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.Content is provided to you AS IS for your information and personal use only. Download presentation by click this link.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.During download, if you can't get a presentation, the file might be deleted by the publisher.
E N D
Presentation Transcript
IM426 – business cases and Case studies in mis
11 – 13 March 2014 Compiled and/or Prepared by – Celeste Ng
Case 1 – Facebook Used by Scammers for Profit
Top 5 social media scam (1) “5. Chain Letters 連鎖信You’ve likely seen this one before -- ... It may appear in the form of, "Retweet this and Bill Gates will donate $5 million to charity!“ 4. Cash Grabs騙取現金 You just received an urgent request from one of your real friends who "lost his wallet on vacation and needs some cash to get home." So, being the helpful person you are, you send some money right away, …. But there’s a problem: Your friend never sent this request. In fact, he isn’t even aware of it. His malware-infected computer grabbed all of his contacts and forwarded the bogus email to everyone, waiting to see who would bite.” (Direct quote – source: http://us.norton.com/yoursecurityresource/detail.jsp?aid=social_media_scams )
Top 5 social media scam (2) “3. Hidden Charges隱藏收費"What type of STAR WARS character are you? Find out with our quiz! All of your friends have taken it!" … so you enter your info and cell number, as instructed. …that’s interesting … but not as much as your next month’s cell bill will be. You’ve also just unwittingly subscribed to some dubious service that charges $9.95 every month. 2. Phishing Requests網絡釣魚請求"Somebody just put up these pictures of you drunk at this wild party! Check 'em out here!" … you click on the enclosed link, which takes you to your Twitter or Facebook login page. There, you enter your account info -- and a cybercriminal now has your password, along with total control of your account. 1. Hidden URLs隱藏網址Beware of blindly clicking on shortened URLs. You'll see them everywhere on Twitter, but you never know where you're going to go since the URL ("Uniform Resource Locator," the Web address) hides the full location. Clicking on such a link could direct you to your intended site, or one that installs all sorts of malware on your computer.” (Direct quote – source: http://us.norton.com/yoursecurityresource/detail.jsp?aid=social_media_scams)
Online payment security (1) Anti-fraud measures “The first method is called AVS, or address verification service. This is the reason why every credit card form asks for your full address. This allows your shopping cart system to link the address entered by the user with what the credit card company has on file.” Another method is called CVV, and that is the security number printed at the back of the card. …. According to a study, asking for the full address and CVV number will decrease your conversion rate by up to 40%, which is huge.” -------------Direct quote SOURCE: http://www.techrepublic.com/blog/security/making-online-payments-safe-from-fraud-conversion-rate-vs-security/9203
Online payment security (2) Prevent fraud on online payments “Any modern shopping cart system should be able to track user behavior. [i.e.,] Is the user browsing through the site and then heading to the checkout page, or are you seeing a bunch of automated bots going straight to the checkout page without ever going to any other page? …. Sites like Amazon, eBay or PayPal all use advanced IP and geo tracking information as well. [e.g. IP address vs. card location checking, IP address vs. shipping address checking] … In the end most small businesses … either decide to outsource the process to someone else by using something like PayPal, CCbill, or Google Checkout, accepting the fact that they will have to pay a transaction fee for the convenience, or they try and implement their own process and quickly find themselves on the hackers’ most preferred sites” --------------- Direct quote SOURCE: http://www.techrepublic.com/blog/security/making-online-payments-safe-from-fraud-conversion-rate-vs-security/9203
Case 1 – Facebook Used by Scammers for Profit (1) The purpose of this case Is to increase social media users’ awareness of the potential fraudulent and scammer activities available in the social media Educate students the ethic issues and ethics required in the social media
Case 1 – Facebook Used by Scammers for Profit (2) outsmart=智取 spam=垃圾郵件 scam=詐欺 Phishing=網路釣魚 knockoff product=仿冒產品 Spamscam=垃圾郵件詐欺 premium-rate =溢價率
Case 1 – Facebook Used by Scammers for Profit (3) Question 2 The possible reasons Facebook scam warning message was ineffective: Users do not usually read the warning message Users are overly trusting their friends and social technologies The scams look really real Users are curious Users are ignorant of the real risks The scam method is new
Case 1 – Facebook Used by Scammers for Profit (4) Question 3 Recent Facebook scam - http://www.today.com/tech/6-biggest-facebook-scams-how-avoid-them-1C7447403 Comparing the recent Facebook Scams and the ones happened in April 2011 – http://www.hoax-slayer.com/facebook-related.html