Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of online shopping
Updated security software+active fire wall
Password + change twice a year.
Stop + think click on links /attachments.
Stop + think sharing personal /financial information Padlock symbol
Web address https://
Green address bar
Use credit card
Log out of sites.
call the company
Wi-fi is always secure
Financial transactions public computers Passwords Why
shopping? Outline: * Back ground
* Alleviation strategies
* Discussion When did online shopping start? Product
selection Time saving what is online shopping? With regards to technical developments for online shopping. Do you think the benefits outweigh the drawbacks ?why? Discuss How to shop safely? is it safe? Any purchase of goods or services conducted on the internet between businesses, households, individuals or governments. Online shopping revolution spyware fraud fake websites product risk Financial risk Time / Convenience 1994 German company - first online shopping system 1996 Launched online shopping site 62 % of adults purchased a good or service online in the six months to April 2011.
ACMA (2011) unmatchable goods risk of weak passwords: Accessing your bank account
Purchasing items online with your money
Sending emails in your name How to choose the best password? Combination upper & lower case letters numbers & keyboard symbols ( SP1D3Rm@n ) Containing at least 8 characters.
harder for criminals to guess or break. Change your passwords regularly. identity theft stolen passwords cyber crimes stolen credit card details Trojans phishing Denial of Service attacks data destruction A fraudulent invitation,
offer- obtain personal information / a financial benefit by deception. Theft of existing identity without permission with personal details used in fraudulent activities. Convenience Less
costly Privacy Source: ACMA-commissioned survey, April 2011, n=1,428. Different payment methods Source: ACMA-commissioned survey, April 2011, n=1,770. No waiting G p p p o 2 p o o 1 o 3 Source: ACMA-commissioned surveys, November 2009, n=916
and April 2011, n=885. Spyware Secretly monitors online activity or scans a device for private information The major risks Fraud Phishing Scams hackers Contact from a trusted source,
for personal account information to be verified through website.
used steal the information
ACCC, Online shopping, When things go wrong, accessed 4 December 2012,< http://www.accc.gov.au/content/index.phtml/itemId/85568 >
AFP, Cybercrime, accessed 3 December 2012, < http://www.afp.gov.au >
Australian Bureau of Statistics, Personal fraud 2007, Accessed 4 December 2012 <Abs.gov.au>
,,. Australian Communications & Media Authority (ACMA) 2011, E-commerce market place in Australia: Online shopping
.Australian Competition & Consumer Commission (ACCC) 2010. Targeting scams: Report of the ACCC on scam activity 2010 4 OECD (2006) ABS (2008) Afnan Alkhayat source: Australian Competition & Consumer Commission (ACCC) 2010 ABS (2007) cost 1 B annually References: Figures: