Chapter 11 The Internet Technology and Identity Theft Learning Objectives Introduction The Internet Consumption Patterns Search Engines Web search engines are software programs They compile information and make it available ID: 782640
Download The PPT/PDF document "Consumer Economics Copyright©2009 Tayl..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Consumer Economics
Copyright©2009 Taylor & Francis Group, an informa business
Chapter 11
The Internet, Technology, and Identity Theft
Slide2Learning Objectives
Slide3Introduction
Slide4The Internet: Consumption Patterns
Slide5Search Engines
Web search engines are software programs
They
compile information and make it available
Search engines are a profitable source of advertising revenue
Slide6Typical Online Auction Categories
Smartphones and tablets
High-end clothing and accessories
Art and musical instruments
Sports and fitness equipment
Antiques and collectibles
Home furnishings and electronics
Travel packages/hotels
Cars
Slide7Security and Trust
Trust is needed in the process, fairness, and institutions
Many federal regulations address privacy issues
Benefits of shopping include 24/7, comparison shopping, and safety if good practices are followed
Privacy is easily compromised
Slide8Children as Online Consumers
Slide9Environmental Impact of the Internet
The Internet has both positive and negative influences on the environment
The Internet saves paper
The Internet uses electricity
Reduces need for warehouses and excess transportation
Slide10Biometrics
Using one’s unique physical traits for ID
Although spreading, raises privacy issues
Slide11Identity Theft and Privacy Protection
The Internet increases threats to privacy
Many Federal statutes address these issues
The Internet increases identity theft
Slide12Identity Theft: Methods and Protections
Watch credit card statementsGuard checkbooks, pay stubs, credit card receipts, credit & ATM cards, driver’s licenses, and health insurance cards.
Use difficult passwords
Secure personal information at work
Update virus protection regularly
Never click on hyperlinks from strangers
Log off computers when finished
Use post office for mailing
Use a “wipe” program to protect personal information on the computer
Copyright©2009 Taylor & Francis Group, an informa business
Slide13Self-Background Checks
Use Google to check yourself
Use Experian, TransUnion, or Equifax to monitor your credit score and identity safety
More and more organizations are using background checks
Slide14Recourse for Victims of Identity Theft
Contact the local police
Contact fraud departments of the three credit reporting bureaus
Contact your financial institutions
File a complaint with the FTC. This can be done online
Slide15Charities
Confirm the genuineness of the charity before donating
Evaluate how efficiently the charity spends its money
Many charities use the Internet to solicit donations
Ask how the money is spent
Slide16Chapter Summary