Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybercrime and Identity Theft (Research (Survey results Most people…
Cybercrime and Identity Theft
Research
Survey results
Most people didn’t know that grey hat hackers worked for the government, while white hate hackers work for private organisations.
Not all people knew that grooming could occur online.
People didn’t have a clear definition of cybercrime and identity theft.
There was a large variation in how often people hear about cybercrime and identity theft, so it would need to be reviewed whether news channels broach the issue enough. However, the data pool was too small to identify any particular trend.
My Research
Cybercrime = crimes against information systems and computers, where the hackers attempts to get unauthorised access to a device or lock out the legitimate user (i.e. phishing, identity theft, hacking, spreading hate and terrorism, sharing child pornography, grooming).
Identity theft = fraud that involves stealing a person’s identity for money/benefits (i.e. phishing, hacking, remote access scams, malware & ransomware, fake online profiles, document theft).
Protection methods = antivirus software, backups, advanced passwords, two-factor authentication, playing it safe.
Hacker = someone who knows all about computers and can get a computer to do whatever they want.
Types of hackers = black hat hackers (try to get unauthorised access into a system for malicious reasons), white hat hackers (legally employ security networks + share vulnerabilities, so the company can fix them), grey hat hackers (exploit computer systems and networks, but not for malicious reasons and share the loopholes and vulnerabilities to law enforcement or intelligence).
Online scams = fraud schemes involving messages, email, web sites, chat rooms to display fraudulent solicitations for fraudulent transactions.
Most at risk of cybercrime = elderly + people with low self-control.
Cybercrime is increasing rapidly (900 phishing attempts yearly, 9 000 attempts per technology company, 85 000 malicious IPs launched daily, bring reputable score of URLs to 65%, users have 30% chance of falling for phishing yearly, 72% of OS apps = suspicious, unwanted or malicious).
Cybercrime = more jobs in ICT industry (valued at $3.5 billion in 2004 to $78 billion in 2015).
Need better protection from cybercrime (30000 incidents yearly).
When hacked, contact police or (email, antivirus software, firewall, etc.) provider or install programs to defeat adware or spyware.
Theme
Moral
Technology is very useful, but we must be aware of the dangers and how to protect ourselves from them, as well as the people who will try to help and deceive us online.
Mood
Colours
The screen will have a black background, if the events are detrimental (the ransom note), or a white background, if the events occurring were beneficial (stopping the hacker, getting computer files back).
Sounds
Clicking sounds for buttons.
Ding for correct decision.
Buzz for incorrect choice.
Suspenseful music when detrimental events are occurring.
Lighthearted music when beneficial events occur.
Images
Computer/iPad screen.
Ransom note.
Totally black screen if wrong event is chosen
Title screen with three sections that are highlighted at different points: One screen will be dark with a shadowed form in it, the middle screen will be grey with a clear figure shown (but no face) and the last screen will be white, with a person dressed in the same colour. The title is written on top of these three sections.
User Interface
Language
English, formal, language that could be understood by teenagers.
Layout/Style
Text
Arial (font Google search uses), small size - 11/12, red for ransom note, black when it's advice from the different hackers, located in the bottom quarter of the screen.
Buttons
Multiple choice options with text over them, located in the bottom quarter of the screen.
Images
Rectangles, black border, located in the top 3/4 of the screen.
Interactive Experience
Educate Ideas
Screen where users must state which hacker is helping the government and which one is trying to hack in for malicious purposes.
With the help of white and grey hat hackers, the user must make the right decisions to stop the black hat hacker from getting access to their files, personal details, etc.
The white and grey hat hackers will explain what they do and give you advice on different options on what to do before, during and after being hacked.
Engage
Timeline Navigation
Go to appropriate screen depending on the user’s decision about cybercrime and identity theft.
If the user's answer is correct go to next screen.
If user's answer is incorrect show black screen (with the words incorrect) for 3 seconds, before returning to the previous screen.
Hover to reveal
After saying which hacker you believed hacked you, you must hover over the hacker’s form to reveal the truth.
After answering a multiple choice question, you must hover over a black rectangle in the centre of the top 3/4 of the screen to discover the truth.
Button Click
Musf click to say which type of hacker just hacked you.
Text Input
At the start you give personal details to a strange site.
Name of your business (which is hacked).
Drag, Drop and Lock
Must choose an anti-virus software and drop it onto the 'computer screen' to try and stop the hacker.
Nested Animation
Title screen with three sections that are highlighted at different points. One screen will be dark with a shadowed form in it, the middle screen will be grey with a clear figure shown (but no face) and the last screen will be white, with a person dressed in the same colour. Each screen will be temporarily highlighted and then be shadowed again as other screens are highlighted.