Placeholder Content Image

Are older adults more vulnerable to scams? What psychologists have learned about who’s most susceptible, and when

<p><em><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554">Natalie C. Ebner</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p>About 1 in 6 Americans <a href="https://www.census.gov/library/stories/2023/05/2020-census-united-states-older-population-grew.html">are age 65 or older</a>, and that percentage <a href="https://www.ncoa.org/article/get-the-facts-on-older-americans">is projected to grow</a>. Older adults often hold positions of power, have retirement savings accumulated over the course of their lifetimes, and make important financial and health-related decisions – all of which makes them attractive targets for financial exploitation.</p> <p>In 2021, there were more than 90,000 older victims of fraud, according to the FBI. These cases resulted in <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3ElderFraudReport.pdf">US$1.7 billion in losses</a>, a 74% increase compared with 2020. Even so, that may be a significant undercount, since embarrassment or lack of awareness <a href="https://assets.aarp.org/rgcenter/econ/fraud-victims-11.pdf">keeps some victims from reporting</a>.</p> <p><a href="https://ncea.acl.gov/elder-abuse#gsc.tab=0">Financial exploitation</a> represents one of the most common forms of elder abuse. Perpetrators are often individuals in the victims’ inner social circles – family members, caregivers or friends – but can also be strangers.</p> <p>When older adults experience financial fraud, they typically <a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/AgeandFraud/Infographic">lose more money</a> than younger victims. Those losses can have <a href="https://doi.org/10.1057/sj.2012.11">devastating consequences</a>, especially since older adults have limited time to recoup – dramatically reducing their independence, health and well-being.</p> <p>But older adults have been largely neglected in research on this burgeoning type of crime. We are <a href="https://ebnerlab.psych.ufl.edu/natalie-c-ebner-phd/">psychologists who study social cognition</a> and <a href="https://ebnerlab.psych.ufl.edu/didem-pehlivanoglu/">decision-making</a>, and <a href="https://ebnerlab.psych.ufl.edu/">our research lab</a> at the University of Florida is aimed at understanding the factors that shape vulnerability to deception in adulthood and aging.</p> <h2>Defining vulnerability</h2> <p>Financial exploitation involves a variety of exploitative tactics, such as coercion, manipulation, undue influence and, frequently, some sort of deception.</p> <p>The majority of current research focuses on <a href="https://doi.org/10.1002/acp.3052">people’s ability to distinguish between truth and lies</a> during interpersonal communication. However, deception occurs in many contexts – increasingly, over the internet.</p> <p>Our lab conducts laboratory experiments and real-world studies to measure susceptibility under various conditions: investment games, lie/truth scenarios, phishing emails, text messages, fake news and deepfakes – fabricated videos or images that are created by artificial intelligence technology.</p> <p>To study how people respond to deception, we use measures like surveys, brain imaging, behavior, eye movement and heart rate. We also collect health-related biomarkers, such as being a carrier of <a href="https://pubmed.ncbi.nlm.nih.gov/8346443/">gene variants</a> that increase risk for Alzheimer’s disease, to identify individuals with particular vulnerability.</p> <p>And <a href="https://doi.org/10.20900/agmr20230007">our work</a> shows that an older adult’s ability to detect deception is not just about their individual characteristics. It also depends on how they are being targeted.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=339&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/593784/original/file-20240513-16-j9zy1i.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=426&amp;fit=crop&amp;dpr=3 2262w" alt="A figure with two circles and an arrow between them. One circle shows icons that symbolize individual susceptibility to deception -- like a brain, and a walking cane -- while the other has icons of types of deception, like mail or a text message." /></a><figcaption><span class="caption">Vulnerability depends not only on the person, but also the type of fraud being used.</span> <span class="attribution">Natalie Ebner and Didem Pehlivanoglu</span></figcaption></figure> <h2>Individual risk factors</h2> <p>Better cognition, social and emotional capacities, and brain health are all associated with less susceptibility to deception.</p> <p>Cognitive functions, such as how quickly our brain processes information and how well we remember it, <a href="https://doi.org/10.1177/1745691619827511">decline with age</a> and impact decision-making. For example, among people around 70 years of age or older, declines in analytical thinking are associated with <a href="https://doi.org/10.1037/xap0000426">reduced ability to detect false news stories</a>.</p> <p>Additionally, low memory function in aging is associated with <a href="https://doi.org/10.1093/geronb/gby036">greater susceptibility to email phishing</a>. Further, according to recent <a href="https://osf.io/preprints/osf/6f2y9">research</a>, this correlation is specifically pronounced among older adults who carry a gene variant that is a genetic risk factor for developing Alzheimer’s disease later in life. Indeed, some research suggests that greater financial exploitability may serve as <a href="https://doi.org/10.1016/j.neubiorev.2022.104773">an early marker</a> of disease-related cognitive decline.</p> <p>Social and emotional influences are also crucial. Negative mood can enhance somebody’s ability to detect lies, while <a href="https://doi.org/10.1037/xap0000426">positive mood in very old</a> age can impair a person’s ability to detect fake news.</p> <p>Lack of support and loneliness exacerbate susceptibility to deception. Social isolation during the COVID-19 pandemic has led to <a href="https://doi.org/10.1093/gerona/glaa077">increased reliance on online platforms</a>, and older adults with lower digital literacy are <a href="https://doi.org/10.1093/geront/gnac188">more vulnerable to fraudulent emails and robocalls</a>.</p> <p>Finally, an individual’s brain and body responses play a critical role in susceptibility to deception. One important factor is <a href="https://doi.org/10.1016/j.tins.2020.10.007">interoceptive awareness</a>: the ability to accurately read our own body’s signals, like a “gut feeling.” This awareness is correlated with <a href="https://doi.org/10.1093/geroni/igad104.3714">better lie detection</a> in older adults.</p> <p>According to <a href="https://doi.org/10.1093/gerona/glx051">a first study</a>, financially exploited older adults had a significantly smaller size of insula – a brain region key to integrating bodily signals with environmental cues – than older adults who had been exposed to the same threat but avoided it. Reduced insula activity is also related to greater difficulty <a href="https://doi.org/10.1073/pnas.1218518109">picking up on cues</a> that make someone appear less trustworthy.</p> <h2>Types of effective fraud</h2> <p>Not all deception is equally effective on everyone.</p> <p><a href="https://doi.org/10.1145/3336141">Our findings</a> show that email phishing that relies on reciprocation – people’s tendency to repay what another person has provided them – was more effective on older adults. Younger adults, on the other hand, were more likely to fall for phishing emails that employed scarcity: people’s tendency to perceive an opportunity as more valuable if they are told its availability is limited. For example, an email might alert you that a coin collection from the 1950s has become available for a special reduced price if purchased within the next 24 hours.</p> <p>There is also evidence that as we age, we have greater difficulty detecting the “wolf in sheep’s clothing”: someone who appears trustworthy, but is not acting in a trustworthy way. In <a href="https://doi.org/10.1038/s41598-023-50500-x">a card-based gambling game</a>, we found that compared with their younger counterparts, older adults are more likely to select decks presented with trustworthy-looking faces, even though those decks consistently resulted in negative payouts. Even after learning about untrustworthy behavior, older adults showed greater difficulty overcoming their initial impressions.</p> <h2>Reducing vulnerability</h2> <p>Identifying who is especially at risk for financial exploitation in aging is crucial for preventing victimization.</p> <p>We believe interventions should be tailored, instead of a one-size-fits-all approach. For example, perhaps machine learning algorithms could someday determine the most dangerous types of deceptive messages that certain groups encounter – such as in text messages, emails or social media platforms – and provide on-the-spot warnings. Black and Hispanic consumers are <a href="https://www.ftc.gov/system/files/documents/reports/combating-fraud-african-american-latino-communities-ftcs-comprehensive-strategic-plan-federal-trade/160615fraudreport.pdf">more likely to be victimized</a>, so there is also a dire need for interventions that resonate with their communities.</p> <p>Prevention efforts would benefit from taking a holistic approach to help older adults reduce their vulnerability to scams. Training in <a href="https://doi.org/10.1007/s40520-019-01259-7">financial, health</a> and <a href="https://www.nature.com/articles/s41598-022-08437-0.pdf">digital literacy</a> are important, but so are programs to <a href="https://doi.org/10.1186/s12889-021-10363-1">address loneliness</a>.</p> <p>People of all ages need to keep these lessons in mind when interacting with online content or strangers – but not only then. Unfortunately, financial exploitation often comes from individuals close to the victim.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/227991/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><a href="https://theconversation.com/profiles/natalie-c-ebner-1527554"><em>Natalie C. Ebner</em></a><em>, Professor of Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a> and <a href="https://theconversation.com/profiles/didem-pehlivanoglu-1527551">Didem Pehlivanoglu</a>, Postdoctoral Researcher, Psychology, <a href="https://theconversation.com/institutions/university-of-florida-1392">University of Florida</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/are-older-adults-more-vulnerable-to-scams-what-psychologists-have-learned-about-whos-most-susceptible-and-when-227991">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

The good, the bad and the awful – how businesses reacts to online reviews

<p><em><a href="https://theconversation.com/profiles/mina-tajvidi-1192090">Mina Tajvidi</a>, <a href="https://theconversation.com/institutions/queen-mary-university-of-london-1745">Queen Mary University of London</a>; <a href="https://theconversation.com/profiles/nick-hajli-1426223">Nick Hajli</a>, <a href="https://theconversation.com/institutions/loughborough-university-1336">Loughborough University</a>, and <a href="https://theconversation.com/profiles/tahir-m-nisar-1050021">Tahir M. Nisar</a>, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p>Every day travellers across the globe are flocking to popular destinations, eager to relax and create memories.</p> <p>Alongside packing and planning, many turn to online reviews to choose the perfect hotel, restaurant, or activity. These reviews, often shared enthusiastically or with a hint of frustration, play a key role in shaping our experiences. But what happens to these reviews once they are posted? Do businesses truly read them, and if so, do they make changes based on customer feedback?</p> <p>The short answer is yes, businesses do read reviews and often act on them. In fact, for many, it’s a crucial part of their <a href="https://www.sciencedirect.com/science/article/abs/pii/S004016252100384X">customer engagement strategy</a>. Reviews offer a treasure trove of insights, from customer satisfaction and service quality to product usability and pricing perceptions. But beyond the numbers and star ratings, reviews provide a story of the customer experience that can highlight strengths and reveal weaknesses.</p> <p>Businesses, particularly in competitive industries like hospitality, often have dedicated teams or <a href="https://broadly.com/blog/reputation-management-tools/">software tools</a> to monitor reviews across platforms like Tripadvisor, Google, and Yelp. These tools can aggregate reviews, analyse sentiments, and even benchmark against competitors.</p> <p>For example, a hotel chain may use these insights to identify common themes in guest feedback, such as complaints about check-in delays or praises for room cleanliness. By doing so, they can prioritise issues and respond effectively.</p> <p>However, reading reviews is just the beginning. The real value lies in how businesses respond to them, and whether they take actionable steps to address the feedback. In many cases, customer reviews have become catalysts for change. For instance, a recurring complaint about outdated decor might prompt a hotel to refurbish its rooms. Similarly, consistent praise for a friendly staff member can lead to rewards or recognition programmes, boosting employee morale and enhancing the overall guest experience.</p> <p><a href="https://ieeexplore.ieee.org/document/10614398">Some businesses</a> go a step further by engaging directly with reviewers. This engagement can take various forms, from public responses thanking customers for their feedback to private messages addressing specific concerns. <a href="https://www.emerald.com/insight/content/doi/10.1108/ITP-09-2018-0415/full/html">Such interactions</a> not only show that a business values its customers, but also humanises the brand, fostering trust and loyalty. A well-handled response to a negative review can even turn a dissatisfied customer into a loyal advocate.</p> <h2>The role of negative reviews</h2> <p>Negative reviews, while often dreaded by businesses, are an essential component of the feedback process. They provide honest, often blunt insights into what went wrong and where improvements are needed. For instance, during the holiday season, a restaurant might receive complaints about long wait times or underwhelming festive menus. Instead of viewing these reviews as setbacks, savvy businesses see them as opportunities to refine their offerings and enhance customer satisfaction.</p> <p>In some cases, businesses have <a href="https://ieeexplore.ieee.org/document/10614398">used negative reviews</a> as a springboard for innovation. A restaurant receiving feedback about limited vegetarian options might introduce new menu items, attracting a broader clientele and boosting sales. Similarly, a hotel criticised for lack of amenities might invest in additional facilities, improving its appeal and competitiveness.</p> <p>As technology evolves, the landscape of customer reviews and business responses is also changing. The rise of artificial intelligence and machine learning that uses algorithms has made it easier for businesses to analyse vast amounts of feedback and identify trends quickly. This capability allows for more proactive responses, with businesses anticipating issues before they become widespread problems.</p> <p>Moreover, the increasing use of video and photo reviews adds a new dimension to customer feedback. <a href="https://www.emerald.com/insight/content/doi/10.1108/JPBM-01-2019-2194/full/html?casa_token=adZDhhc3f0IAAAAA:7jPn1_y31gfB4BjJjLdl8QnnFixO3XCEOKbtemd0N2vhh_UCEHa1vjisRj3X3K1iw7UIRL1yylJGN6CCqPbW1Bs4CoSto1x0M1ntb_RtD7z-ZXHzj7Q">Visual reviews</a> can provide a more vivid portrayal of experiences, from showcasing a beautifully plated dish to highlighting a less-than-sparkling pool.</p> <p>Businesses are adapting to this trend by incorporating user-generated content into their marketing strategies, showcasing real-life customer experiences to attract new clients.</p> <p>However, the rise of fake reviews is a growing concern. In 2023, the popular travel website Tripadvisor <a href="https://www.tripadvisor.com/TransparencyReport2023#group-section-Fake-Reviews-HZjJZOxSZ4">saw an overwhelming influx</a> of user-generated content, with over 30 million reviews, however, amid this vast pool of feedback, 1.3 million reviews were flagged as fraudulent and subsequently removed.</p> <p>In the end, customer reviews are not just fleeting opinions left in the digital atmosphere. They are valuable conversations between businesses and their customers. For businesses, reviews offer an opportunity to understand their clients’ needs, address concerns, and celebrate successes. That is why businesses like <a href="https://www.aboutamazon.com/news/policy-news-views/how-ai-spots-fake-reviews-amazon">Amazon are using AI</a> to manage the reviews.</p> <p>By reading, responding, and, most importantly, acting on reviews, businesses can foster a loyal customer base and continually improve their offerings. So, the next time you leave a review, remember that someone is listening, and your words may just be the catalyst for positive change.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/236194/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/mina-tajvidi-1192090">Mina Tajvidi</a>, Lecturer in Digital Marketing, <a href="https://theconversation.com/institutions/queen-mary-university-of-london-1745">Queen Mary University of London</a>; <a href="https://theconversation.com/profiles/nick-hajli-1426223">Nick Hajli</a>, AI Strategist and Professor of Digital Strategy, <a href="https://theconversation.com/institutions/loughborough-university-1336">Loughborough University</a>, and <a href="https://theconversation.com/profiles/tahir-m-nisar-1050021">Tahir M. Nisar</a>, Professor of Strategy and Economic Organisation, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/the-good-the-bad-and-the-awful-how-business-reacts-to-online-reviews-236194">original article</a>.</em></p>

Travel Trouble

Placeholder Content Image

"This is horrific": Queen icon calls out convincing scam

<p>Brian May has spoken out after becoming the target of a dangerous scam, urging people to be careful online. </p> <p>The guitarist of iconic rock band Queen was made aware of the scam by a fan, who sent him the TikTok of what seems to be May himself offering concert tickets at a discount. </p> <p>The video, which is actually AI-generated and has nothing to do with May or with Queen, shows the rockstar offering music fans the chance to see a concert from backstage. </p> <p>“I hope you’re all well out there,” says the fake Brian May in the video. “Some good news. Backstage tickets for my next show in your cities are now going for only $800, which were previously $2000. I’m only selecting 10 people in the comments, so if you’re ready to make payment, comment, ‘ready’.”</p> <p>May responded to the post publicly, sharing his horror and anger with fans over the “creepy” video, saying, “My God. This is horrific.”</p> <p>“I suppose this is now so easy to do – and there are always people who will sink to any depths to try to make a quick buck. Disgusting.”</p> <p>He continued, “Thanks for the alert dear (TikTok username) stereojazz. I’ve alerted our team and hopefully we can squash this.”</p> <p>Fans were quick to comment that they had almost been fooled by the convincing video. </p> <p>“That they abuse your beautiful personality for this scam hurts even more and is really scary. I hate it,” commented one. </p> <p>“It is insanely terrifying what AI can do these days,” wrote another.</p> <p><em>Image credits: TikTok</em></p>

Legal

Placeholder Content Image

Readers response: How do you feel about online shopping compared to traditional in-store shopping?

<p>When it comes to shopping for things we want and need, many people have a preference over whether they shop in a physical store or online. </p> <p>We asked our readers which they prefer when shopping for food, clothes or anything else their hearts desire, and the response was overwhelming. Here's what they said.</p> <p><strong>Ellen Polsen</strong> - Why would one buy online? I like to feel and see the things I purchase, particularly garments, as fabrics today are mostly rubbish.</p> <p><strong>Jennie Craven</strong> - I do a little of each. But usually use stores that I know or brands where the sizing is correct for me. I always use a payment system that I understand. </p> <p><strong>Gail Ladds</strong> - I love online shopping! I often forget that I’ve bought something then get a nice surprise when it arrives lol.</p> <p><strong>Debra Coats</strong> - Online is okay when you cant go to the store. I did online shopping for about 8 months after open heart surgery but when i was given the all clear to shop and drive, I was in my element as its a moment of getting out of the house and seeing others around me.</p> <p><strong>Karen Peardon</strong> - I have done some online shopping (mainly craft supplies) only because I have been very ill for months but I love in-store shopping more. Retail therapy!!</p> <p><strong>Christine Whyte</strong> - Have not and will not ever do it, very old school and too wary of the dangers out there, besides I like getting out and choosing for myself.</p> <p><strong>Helga Bonello</strong> - I like to see feel and touch products before I buy. Online scammers are a worry, besides we need a reason to go out and be sociable.</p> <p><strong>Olimpia Palumbo</strong> - My family does on line shopping and usually end up with the worst fruit and sometimes the wrong items.</p> <p><em>Image credits: Shutterstock </em></p>

Money & Banking

Placeholder Content Image

Romance fraud doesn’t only happen online – it can turn into real-world deception

<div class="theconversation-article-body"><em><a href="https://theconversation.com/profiles/cassandra-cross-122865">Cassandra Cross</a>, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p>We often think of fraudsters as people on the opposite side of the world. They will manipulate and exploit victims through words on a computer screen, or loving messages through the phone. But romance fraud can also happen in person, with the fraudster sleeping in the bed beside you.</p> <p>This was the circumstance Australian writer Stephanie Wood found herself in. It’s also the basis for the new <a href="https://www.paramountanz.com.au/news/fake-breaks-subscription-and-streaming-records-on-paramount/">television series Fake</a>, currently screening on Paramount+. A dramatisation of Wood’s powerful memoir by the same name, the series outlines the many lies and betrayals of an intimate relationship.</p> <p>It’s a brutal insight into the world of deception which characterises romance fraud.</p> <h2>When love hurts</h2> <p>Romance fraud (or romance scams) is what it sounds like – offenders use the guise of a relationship to gain a financial reward. In most cases, it’s through the direct transfer of money from the victim, but it can also be through using personal credentials to commit identity crimes.</p> <p>From the outside, it’s hard to understand how romance fraud is so effective. However, <a href="https://eprints.qut.edu.au/233966/">research has documented</a> the range of grooming techniques, social engineering tactics and methods of psychological abuse deployed by offenders. Offenders know exactly what to do and say to gain the compliance of their victim.</p> <hr /> <hr /> <p>Offenders target a person’s vulnerability and work hard to build strong levels of trust. There are endless calls, texts and emails that create a bond. Then follows the inevitable “crisis”, whereby the offender needs money urgently for a health emergency, criminal justice situation, business need or even a <a href="https://www.accc.gov.au/media-release/romance-baiting-scams-on-the-rise">cryptocurrency investment</a> opportunity.</p> <p>For many, this can result in ongoing payments and substantial losses. Over <a href="https://www.accc.gov.au/about-us/publications/serial-publications/targeting-scams-reports-on-scams-activity/targeting-scams-report-of-the-accc-on-scams-activity-2023">A$200 million</a> was reported lost by Australians to this fraud type in 2023, but this is likely a gross underestimation of actual figures. It also doesn’t capture the many <a href="https://www.aic.gov.au/sites/default/files/2020-05/29-1314-FinalReport.pdf">non-financial harms</a>, including physical and emotional declines in wellbeing.</p> <p>When the relationship finally ends, it’s too late. The money is gone, the extent of the deception is laid bare, and recovery from the heartache and loss is a constant battle.</p> <p>There is a well-documented “<a href="https://journals.sagepub.com/doi/full/10.1177/1748895815603773">double hit</a>” of victimisation, with individuals needing to grieve the relationship as well as any financial losses.</p> <h2>Seeing is not believing</h2> <p>There are countless incidents of romance fraud where the offender and victim never meet: the deception takes place entirely online. But it’s important to know fraudsters also operate in person.</p> <p>Wood’s memoir details an extraordinary level of lies and dishonesty presented to her throughout her relationship. Stories that laid the groundwork for later fabrications. Stories that were deliberate and calculated in how they were used to gain her trust, and later used against her.</p> <p>The motivations of these real-world deceivers are not always straightforward. Often it’s about money, but not always. For Wood, not being asked for money allayed potential suspicions, but it didn’t reduce her feelings of loss and emotional devastation upon discovering the extent of the lies.</p> <figure><iframe src="https://www.youtube.com/embed/K_1Akqhjy6M?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe></figure> <p>Wood is by no means alone in her experience. Marketing executive Tracy Hall endured a similarly sophisticated and all-encompassing level of deceit in her relationship with <a href="https://www.theguardian.com/australia-news/2019/jun/20/conman-hamish-mclaren-jailed-for-up-to-16-years-after-swindling-76m-from-victims">convicted conman Hamish McLaren</a> (known to her as Max Tavita).</p> <p>In her book, <a href="https://tracyhall.com.au/the-last-victim">The Last Victim</a>, Hall recounts snippets of their daily lives over a 16-month period, with McLaren portraying himself as a successful professional in finance. His mail was addressed to Max Tavita and his phone conversations were with real people. Yet his whole identity and the world he represented to Hall was a complete fabrication.</p> <p>The experiences of Wood and Hall highlight the sheer depth of elaborate deception that can be perpetrated in an intimate relationship. Critically, it highlights romance fraud isn’t relegated to an online environment.</p> <h2>How can we prevent romance fraud?</h2> <p>There is an overwhelming amount of <a href="https://eprints.qut.edu.au/83702/">shame and stigma</a> associated with romance fraud. The dynamics of these deceptive relationships are misunderstood, and this perpetuates negative stereotypes and a discourse of victim blaming, even from friends and family.</p> <p>In hindsight, the warning signs might seem obvious, but fraudsters tend to effectively disguise these in real time and deploy deliberate tactics to overcome any suspicion.</p> <p>We must all create a culture that empowers victims to come forward to raise awareness. This isn’t intended to create fear or anxiety, but to normalise the threat fraud poses, and to allow for difficult conversations if it happens. Ongoing silence from victims only favours the offender.</p> <h2>How to protect yourself from romance fraud</h2> <p>It’s inevitable we’ll continue to swipe right in our efforts to find love. But keep a healthy level of scepticism and an open dialogue with family and friends in any quest for a new relationship.</p> <p>Don’t be afraid to conduct your own searches of people, places and situations presented to you in a relationship. There is a memorable moment in Fake where the protagonist refutes her friend’s offer of assistance, saying “this is a love story not an investigation”. Sadly, sometimes an investigation is necessary.</p> <p>No matter what the circumstance or the person, think carefully before sending any money. Only give what you are willing to lose.</p> <p>Deception comes in many forms. We must recognise it for what it is, and the impact it has on victims. But we must also not give into those who lie, and let them define who we are or dictate our ability to trust.</p> <p><em>If you or someone you know has been a victim of romance fraud, you can report it to <a href="https://www.cyber.gov.au/report-and-recover/report">ReportCyber</a>. For support, contact <a href="https://www.idcare.org/">iDcare</a>. For prevention advice, consult <a href="https://www.scamwatch.gov.au/">Scamwatch</a>.</em><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/237653/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/cassandra-cross-122865"><em>Cassandra Cross</em></a><em>, Associate Dean (Learning &amp; Teaching) Faculty of Creative Industries, Education and Social Justice, <a href="https://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/romance-fraud-doesnt-only-happen-online-it-can-turn-into-real-world-deception-237653">original article</a>.</em></p> </div>

Legal

Placeholder Content Image

Readers response: What are your thoughts on online dating or dating apps for seniors?

<p>When it comes to dating, there are many ways people find their perfect person, and for many that happens online. </p> <p>We asked our readers what their thoughts are on an online dating app for seniors, and the responses were overwhelming. Here's what they said. </p> <p><strong>Kristeen Bon</strong> - I tried it for a bit, but found the men to be so unrealistic in their expectations. What they say they want and what they REALLY want are poles apart.</p> <p><strong>Helen Smith</strong> - It works great but men really need to look in a mirror now and then.</p> <p><strong>Sue Rowley</strong> - Personally, I’m happy on my own, but if you’re looking for a partner where else is there to meet someone? Pub, supermarket, dog walking? Not many options really, especially when you’re older.</p> <p><strong>Jenny Gordon</strong> - Would not consider it. Would prefer to stay single than see how friends and relatives have been affected by using them.</p> <p><strong>Ali Veldman</strong> - Risky at any age, in my opinion.</p> <p><strong>Diane Derby</strong> - I’d never entertain one. I like being by myself, plus two much catfishing and ghosting to be able to find a decent type.</p> <p><strong>Margaret Godfrey</strong> - Tried it. A dismal failure in a small population. What is the point of men interstate responding when you live a plane flight away?</p> <p><strong>John Coffey</strong> - Met my late partner online, and had a great 10 years. It can be a minefield though.</p> <p><em>Image credits: Shutterstock </em></p>

Relationships

Placeholder Content Image

Been scammed? Here's how to financially recover

<p>Many people feel shame and embarrassment after realising they have been scammed. But you shouldn’t. You did nothing wrong; you are the victim of a crime. </p> <p>Not only are such feelings bad for your mental wellbeing, but they also often stop people reporting the scam or taking action to avoid further losses. </p> <p>Remember too that you’re not alone: victims reported more than 601,000 scams to the ACCC in 2023, together losing a staggering $2.74 billion. People of all ages, professions, and backgrounds have been affected. </p> <p>As hard as it may be, try to leave emotion aside and approach this like any other money matter – logically and methodically. Doing so will help you act faster and more decisively, which is crucial to your financial recovery. </p> <p>The following checklist will help you through this process:</p> <ul> <li><strong>Step 1 – Try to recoup your stolen money</strong></li> </ul> <p>Report the scam immediately. Contact your bank or card provider to stop the transaction being processed. Notify the company or marketplace where it occurred – they may have options to reverse the payment or for you to claim compensation for fraud. </p> <p>Also inform the ACCC’s Scamwatch and police if relevant, which may aid in tracking down the scammer and will help them alert the wider public on what to look out for. </p> <p>Unfortunately, the money is likely gone for good, but prompt action may just help you get some or all of it back. </p> <ul> <li><strong>Step 2 – Secure your accounts from further thefts</strong></li> </ul> <p>Once scammers have found a way to steal money, they often go back to try for more. Don’t let them! </p> <p>Freeze or cancel affected debit and credit cards, accounts etc. Change and strengthen all your passwords. Set up two-factor authentication if you haven’t already. Remove any suspicious applications on electronic devices. </p> <p>Double check the registrations of any business, adviser or tradesperson before engaging their services. Regularly check your superannuation, investments etc. to monitor for any inconsistencies.</p> <ul> <li><strong>Step 3 – Safeguard your cash flow</strong></li> </ul> <p>Don’t multiplying your losses by racking up new debts to cover the stolen money. That means limiting the use of credit cards, payday lenders and Buy Now, Pay Later schemes. Consider paying with cash instead to help you stick to a budget.</p> <p>If you have lost everything, register with Centrelink for income support. You may also be able to apply for hardship provisions with your bank, phone and energy providers and other essential services.</p> <ul> <li><strong>Step 4 – Get reputable advice</strong></li> </ul> <p>Legal advice may be able to get you out of bogus contracts, like loans or phone plans, and help you in the event your personal information has been stolen (which can be used in various ways to steal money). If you can’t afford a lawyer, there are free alternatives such as Legal Aid or Community Legal Centres. Specialist services such as the Women’s Legal Service may offer support where partner coercion or domestic abuse is involved.</p> <p>Accounting and financial advice may also help you navigate assistance options and longer term recovery efforts.</p> <ul> <li><strong>Step 5 – Rebuild your finances</strong></li> </ul> <p>Your ability to rebuild your finances after a scam will depend on a range of factors, including how much was lost plus your age and circumstances.</p> <p>You could seek to increase your earnings and/or cut your spending by tweaking your household budget, delaying retirement, or temporarily taking a second job to boost your income. </p> <p>Another option is to make your remaining finances work harder than before, such as adjusting your investment strategies (e.g. changing your risk weightings or selling assets) including within your superannuation or accessing equity in your home.</p> <p>If you’re a self-funded retiree, you may now qualify for a part or full pension if your scam losses push your total assets below the means test threshold.</p> <p>Ultimately, the most important things when dealing with the fallout from a scam is to look after yourself and protect what you have left.</p> <p>Scammers have already taken off with your dollars. Don’t let them steal your sense too!</p> <p><em><strong>Helen Baker is a licensed Australian financial adviser and author of On Your Own Two Feet: The Essential Guide to Financial Independence for all Women. Helen is among the 1% of financial planners who hold a master’s degree in the field. Proceeds from book sales are donated to charities supporting disadvantaged women and children. Find out more at <a href="http://www.onyourowntwofeet.com.au/">www.onyourowntwofeet.com.au</a></strong></em></p> <p><em><strong>Disclaimer: The information in this article is of a general nature only and does not constitute personal financial or product advice. Any opinions or views expressed are those of the authors and do not represent those of people, institutions or organisations the owner may be associated with in a professional or personal capacity unless explicitly stated. Helen Baker is an authorised representative of BPW Partners Pty Ltd AFSL 548754.</strong></em></p> <p><em>Image </em><em>credits: Shutterstock </em></p>

Money & Banking

Placeholder Content Image

Costly mistakes to avoid when travelling

<p dir="ltr">While travelling the world is an exciting and joyous way to spend your time, getting caught up in devious scams can sour even the best holiday.</p> <p dir="ltr">Whenever you hit the road, there are a few measures you can take to avoid being hit by hackers and sneaky scammers, and enjoy your holiday to the fullest. </p> <p dir="ltr">When it comes to online scams, some countries are more vulnerable than others, as NAB Executive, Group Investigations Chris Sheehan says.</p> <p dir="ltr">"Just like you'd plan visas and check the weather at your destination, it's also vital to be aware of common scams in the countries you're visiting so you can recognise the red flags and protect yourself," he said. </p> <p dir="ltr">When travelling in a new country, it’s important to be wary of accommodation or booking website impersonation scams, ticket scams for major events, as well as overcharging or wrong charge scams.</p> <p dir="ltr">"The pressure to act now is a red flag in ticket and accommodation scams, while overcharging or wrong charging scams play on distraction and a lack of detail," Chris says.</p> <p dir="ltr">"Letting your bank know where and when you're travelling can help with more accurately monitoring your transactions for suspicious activity while you're away."</p> <p dir="ltr">Another thing to be wary of when on holiday is to avoid posting your real-time location on social media, or inadvertently sharing sensitive travel documents can expose you to serious risks.</p> <p dir="ltr">Broadcasting your whereabouts can make you vulnerable to various risks, including burglary, stalking, and other personal safety threats, while criminals can take advantage of the information you share to target you or your unoccupied home.</p> <p dir="ltr">Travel expert Trevor Cooke from <a href="https://earthweb.com/">EarthWeb</a> says its best to wait until you’ve moved on until you share your location online. </p> <p dir="ltr">"If you really want to share the location of where you travelled to, wait until you're already at the next location or back home," he says.</p> <p dir="ltr">"By delaying your posts, you can still share your experiences without compromising your safety."</p> <p dir="ltr">Another thing to keep in mind when you’re next hitting the road is to be wary about unknowingly posting personal information online, such as your boarding pass. </p> <p dir="ltr">"Many people don't realise how much personal information is on your boarding pass and other temporary travel documents," says security expert Trevor.</p> <p dir="ltr">"Boarding passes, for instance, contain sensitive data such as your full name, frequent flyer number, and a barcode that can be scanned to reveal even more information. This data can be used by criminals for identity theft, unauthorised access to your accounts, and other malicious activities."</p> <p dir="ltr">"To protect yourself, always double-check that any picture you upload does not include your boarding pass, travel itinerary, hotel receipts, or any other sensitive information," Trevor adds.</p> <p dir="ltr"><em>Image credits: Shutterstock </em></p>

Travel Tips

Placeholder Content Image

How to avoid 6 common tourist scams

<p>Often when people are on holidays their focus is on relaxing or seeing the sights of the area. But if you don’t keep your wits about you, it’s possible you might end up losing everything to scammers who will do anything to get their hands on your belongings.</p> <p>Here we have six common scams to look out for while you are travelling abroad.</p> <p><strong>Scam 1:</strong> You are in a busy bar in a tourist friendly area when some locals ask where you’re from and offer to buy you a drink. Without thinking, you accept the drink and then find yourself waking up hours later without any of your belongings as you’ve had your drink spiked.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> If people seem too friendly, be aware that they may be scammers. Don’t accept drinks from people you don’t know, and don’t leave your drink unattended to use the bathroom.</p> <p><strong>Scam 2:</strong> You are about to put your handbag and computer on the conveyer belt to go through the scanner. The people in front of you walk through the metal detector and while one goes through, the other sets off the alarms. They step back into where you are standing and take their time removing wallets and coins from their pockets. While you are waiting for your turn to walk through the metal detector, the other person has taken your belongings and is long gone.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Don’t place your items on the conveyer belt until there is no one else waiting in front of you to go through the metal detector.</p> <p><strong>Scam 3:</strong> In a busy area such as after a concert or a busy night like New Year’s Eve it can be impossible to get public transport or a taxi back to your hotel. A friendly looking guy comes by and offers you a lift for a reasonable fee using his private car. The scam itself can then range from being charged an exorbitant amount when you arrive at your hotel – or you could even find yourself robbed and dropped by the side of the road with no way home.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> However tempting it is, never get in the car with an unlicensed taxi driver. This is even more important to note if you are travelling alone.</p> <p><strong>Scam 4:</strong> While you are waiting with your luggage for a train or bus, a passer-by appears to drop their wallet and walk off without noticing. You might try to do the right thing by grabbing the wallet and running after the person to return it. By the time you get back, your luggage is missing.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> When travelling alone, never leave your items unattended even if it means you don’t help someone when you normally would. This is especially true in airports where baggage will quickly be confiscated if left alone.</p> <p><strong>Scam 5:</strong> You’re taking in the sights when a couple of men dressed as policemen approach you. They demand to see your wallet and let you know that counterfeit money has been given to tourists in the area. When your wallet is returned it has had much of the contents removed.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Police would never demand to see your wallet. If something doesn’t feel right, suggest that you continue the discussion at the nearest police station as you don’t feel comfortable. Most likely they will not push their luck.</p> <p><strong>Scam 6:</strong> You receive a phone call in your hotel room late at night from someone claiming to be from the front desk. They apologise for the late call but request that you just confirm your credit card details as their system is playing up. You read out the numbers and hang up. Before too long your credit card has rung up a huge bill as this was a scammer calling you, not a staff member.</p> <p><span style="text-decoration: underline;"><em>Solution:</em></span> Organise payment in person by letting the caller know that you will come down to the front desk to discuss it.</p> <p><em>Image credits: Getty Images </em></p>

Travel Tips

Placeholder Content Image

What ‘psychological warfare’ tactics do scammers use, and how can you protect yourself?

<p><em><a href="https://theconversation.com/profiles/mike-johnstone-106590">Mike Johnstone</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/georgia-psaroulis-1513050">Georgia Psaroulis</a>, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a></em></p> <p>Not a day goes by without a headline <a href="https://www.vice.com/en/article/qjvaym/people-share-worst-scam-stories">about a victim being scammed</a> and losing money. We are constantly warned about new scams and staying safe from cybercriminals. Scamwatch has <a href="https://www.scamwatch.gov.au/research-and-resources/tools-resources/online-resources/spot-the-scam-signs">no shortage of resources</a>, too.</p> <p>So why are people still getting scammed, and sometimes spectacularly so?</p> <p>Scammers use sophisticated psychological techniques. They exploit our deepest human vulnerabilities and bypass rational thought to tap into our emotional responses.</p> <p>This “<a href="https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html">psychological warfare</a>” coerces victims into making impulsive decisions. Sometimes scammers spread their methods around many potential victims to see who is vulnerable. Other times, criminals focus on a specific person.</p> <p>Let’s unpack some of these psychological techniques, and how you can defend against them.</p> <h2>1. Random phone calls</h2> <p>Scammers start with small requests to establish a sense of commitment. After agreeing to these minor requests, we are more likely to comply with larger demands, driven by a desire to act consistently.</p> <p>The call won’t come from a number in your contacts or one you recognise, but the scammer may pretend to be someone you’ve engaged to work on your house, or perhaps one of your children using a friend’s phone to call you.</p> <p>If it is a scammer, maybe keeping you on the phone for a long time gives them an opportunity to find out things about you or people you know. They can use this info either immediately or at a later date.</p> <h2>2. Creating a sense of urgency</h2> <p>Scammers fabricate scenarios that require immediate action, like claiming a bank account is at risk of closure or an offer is about to expire. This tactic aims to prevent victims from assessing the situation logically or seeking advice, pressuring them into rushed decisions.</p> <p>The scammer creates an artificial situation in which you are frightened into doing something you wouldn’t ordinarily do. Scam calls <a href="https://theconversation.com/we-have-filed-a-case-under-your-name-beware-of-tax-scams-theyll-be-everywhere-this-eofy-162171">alleging to be from the Australian Tax Office</a> (ATO) are a great example. You have a debt to pay (apparently) and things will go badly if you don’t pay <em>right now</em>.</p> <p>Scammers play on your emotions to provoke reactions that cloud judgement. They may threaten legal trouble to instil fear, promise high investment returns to exploit greed, or share fabricated distressing stories to elicit sympathy and financial assistance.</p> <h2>3. Building rapport with casual talk</h2> <p>Through extended conversation, scammers build a psychological commitment to their scheme. No one gets very far by just demanding your password, but it’s natural to be friendly with people who are friendly towards us.</p> <p>After staying on the line for long periods of time, the victim also becomes cognitively fatigued. This not only makes the victim more open to suggestions, but also isolates them from friends or family who might recognise and counteract the scam.</p> <h2>4. Help me to help you</h2> <p>In this case, the scammer creates a situation where they help you to solve a real or imaginary problem (that they actually created). They work their “IT magic” and the problem goes away.</p> <p>Later, they ask you for something you wouldn’t normally do, and you do it because of the “social debt”: they helped you first.</p> <p>For example, a hacker might attack a corporate network, causing it to slow down. Then they call you, pretending to be from your organisation, perhaps as a recent hire not yet on the company’s contact list. They “help” you by turning off the attack, leaving you suitably grateful.</p> <p>Perhaps a week later, they call again and ask for sensitive information, such as the CEO’s password. You <em>know</em> company policy is to not divulge it, but the scammer will ask if you remember them (of course you do) and come up with an excuse for why they really need this password.</p> <p>The balance of the social debt says you will help them.</p> <h2>5. Appealing to authority</h2> <p>By posing as line managers, officials from government agencies, banks, or other authoritative bodies, scammers exploit our natural tendency to obey authority.</p> <p>Such scams operate at varying levels of sophistication. The simple version: your manager messages you with an <em>urgent</em> request to purchase some gift cards and send through their numbers.</p> <p>The complex version: your manager calls and asks to urgently transfer a large sum of money to an account you don’t recognise. You do this because <a href="https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402">it sounds exactly</a> like your manager on the phone – but the scammer <a href="https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=1329b80e7559">is using a voice deepfake</a>. In a recent major case in Hong Kong, such a scam even involved a <a href="https://edition.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html">deepfake video call</a>.</p> <p>This is deeply challenging because artificial intelligence tools, such as Microsoft’s VALL-E, can create <a href="https://arstechnica.com/information-technology/2023/01/microsofts-new-ai-can-simulate-anyones-voice-with-3-seconds-of-audio/">a voice deepfake</a> using just three seconds of sampled audio from a real person.</p> <h2>How can you defend against a scam?</h2> <p>First and foremost, <strong>verify identity</strong>. Find another way to contact the person to verify who they are. For example, you can call a generic number for the business and ask to be connected.</p> <p>In the face of rampant voice deepfakes, it can be helpful to <strong>agree on a “safe word” with your family members</strong>. If they call from an unrecognised number and you don’t hear the safe word just hang up.</p> <p>Watch out for <strong>pressure tactics</strong>. If the conversation is moving too fast, remember that someone else’s problem is not yours to solve. Stop and run the problem past a colleague or family member for a sanity check. A legitimate business will have no problem with you doing this.</p> <p>Lastly, if you are not sure about even the slightest detail, the simplest thing is to hang up or not respond. If you really owe a tax debt, the ATO will write to you.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/223959/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/mike-johnstone-106590"><em>Mike Johnstone</em></a><em>, Security Researcher, Associate Professor in Resilient Systems, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a> and <a href="https://theconversation.com/profiles/georgia-psaroulis-1513050">Georgia Psaroulis</a>, Postdoctoral research fellow, <a href="https://theconversation.com/institutions/edith-cowan-university-720">Edith Cowan University</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/what-psychological-warfare-tactics-do-scammers-use-and-how-can-you-protect-yourself-223959">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

How to protect yourself from cyber-scammers over the festive period

<p><em><a href="https://theconversation.com/profiles/rachael-medhurst-1408437">Rachael Medhurst</a>, <a href="https://theconversation.com/institutions/university-of-south-wales-1586">University of South Wales</a></em></p> <p>The festive season is a time for joy, family and festive cheer. However, it’s also a prime target for cybercriminals. As online shopping ramps up, so does the risk of falling prey to cyber-attacks. That’s why it’s crucial to be extra vigilant about your <a href="https://blog.tctg.co.uk/12-cyber-security-tips-of-christmas">cybersecurity</a> during this time.</p> <p>Here are some essential tips to safeguard yourself and your data during the festive period:</p> <h2>Phishing</h2> <p>Phishing is when criminals use scam emails, text messages or phone calls to trick their victims. Their <a href="https://www.ncsc.gov.uk/collection/phishing-scams">goal</a> is often to make you visit a certain website, which may download a virus on to your computer, or steal bank details or other personal data.</p> <p>This type of scam tends to <a href="https://www.egress.com/blog/phishing/holiday-phishing-scam-guide">increase</a> at this time due to the amount of people having bought or received new gadgets and technology.</p> <p>Look out for there being no direct reference to your name in any communications, with wording such as “Dear Sir/Madam” or other terms such as “valued customer” being used instead. Grammar and spelling mistakes are also often present.</p> <p>Be wary of any suspicious links or attachments within emails too, and don’t click them. It’s better to contact the company directly to check if the message is genuine. You can also <a href="https://www.ncsc.gov.uk/collection/phishing-scams">report</a> suspicious messages and phishing scams to the government’s National Cyber Security Centre.</p> <h2>Shopping safely online</h2> <p>The convenience of online shopping is undeniable, especially during the festive season. However, it’s crucial to prioritise your security when buying online.</p> <p>Before entering your personal and financial information on any website, ensure it’s legitimate and secure. Look for the “https” in the address bar and a <a href="https://theconversation.com/the-vast-majority-of-us-have-no-idea-what-the-padlock-icon-on-our-internet-browser-is-and-its-putting-us-at-risk-216581">padlock</a> icon, which indicates a secure and encrypted connection.</p> <p>When creating passwords for online shopping accounts, use strong, unique combinations of letters, numbers and symbols. Avoid using the same password for multiple accounts, as a breach on one site could compromise all your others.</p> <p>As with shopping in the real world, be cautious when encountering offers that are significantly below usual prices or which make extravagant promises. Always conduct thorough research on the seller and product before making a purchase. If a deal seems too good to be true, it probably is.</p> <p>And if you are out shopping in towns or city centres, there will often be a large number of public wifi options available to you. However, criminals can intercept the data that is transferred across such open and unsecured wifi. So, avoid using public wifi where possible, especially when conducting any financial transactions.</p> <h2>Social media</h2> <p>While social media platforms provide people with a means to keep in touch with family and friends over the festive period, they are often a goldmine for <a href="https://www.which.co.uk/consumer-rights/advice/how-to-spot-a-social-media-scam-aMtwF3u1XKGt">scams</a> and malware (software designed to disrupt, damage or gain unauthorised access to a computer). In the spirit of the festive season, people often share an abundance of personal information on social media, often without considering the potential consequences.</p> <p>This trove of data can make people vulnerable to cyber-attacks. Scammers can exploit this information to gain unauthorised access to social media accounts, steal personal information, or even commit identity theft. To protect yourself, be mindful of what you share.</p> <p>Be wary when interacting with posts and direct messages, especially if they contain suspicious links or attachments. Before clicking on anything, hover over the link to verify its destination. If it shows a website you don’t recognise or seems unrelated to the message, do not click on it. If you receive a message from someone you know but the content seems strange or out of character, contact them directly through a trusted channel to verify its authenticity.</p> <p>Likewise, be wary of messages containing urgent requests for money or personal information from businesses. Genuine organisations will never solicit sensitive details through social media.</p> <p>There are many buy and sell platforms available on social media. But while such platforms can be a great place to find a unique gift, it is also important to remember that not all sellers may be legitimate. So, it’s vital that you don’t share your bank details. If the seller sends a link to purchase the item, do not use it. When meeting to collect an item, it’s generally safer to use cash rather than transferring funds electronically.</p> <figure><iframe src="https://www.youtube.com/embed/aO858HyFbKI?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><span class="caption">Advice for staying safe online.</span></figcaption></figure> <h2>Package delivery scams</h2> <p>As well as being a time for giving and receiving gifts, the festive season is also ripe for cybercriminals to exploit the excitement surrounding <a href="https://www.citizensadvice.org.uk/about-us/about-us1/media/press-releases/scams-linked-to-parcel-deliveries-come-top-in-2023/">package deliveries</a>.</p> <p>Scammers often pose as legitimate delivery companies, sending emails or text messages claiming that a delivery attempt was unsuccessful or requiring additional fees for processing, or even customs clearance. Typically, these messages contain links or phone numbers that, when clicked or called, lead to fake websites or automated phone systems designed to collect personal information or payments.</p> <p>To protect yourself, always verify the legitimacy of any delivery notifications you receive. Check the sender’s email address or phone number against the official contact information for the delivery company. If the information doesn’t match or seems suspicious, don’t click any links or provide personal details.</p> <p>Legitimate delivery companies will never ask for upfront payment or sensitive information through unsolicited messages or calls.</p> <p>Remember, cybercriminals are skilled at manipulating the festive spirit to their advantage. Stay vigilant, exercise caution, and don’t let your excitement for gifts and deliveries compromise your cybersecurity.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/218294/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/rachael-medhurst-1408437"><em>Rachael Medhurst</em></a><em>, Course Leader and Senior Lecturer in Cyber Security NCSA, <a href="https://theconversation.com/institutions/university-of-south-wales-1586">University of South Wales</a></em></p> <p><em>Image credits: Getty Images </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-to-protect-yourself-from-cyber-scammers-over-the-festive-period-218294">original article</a>.</em></p>

Money & Banking

Placeholder Content Image

1 in 6 older adults fall victim to impersonation scams

<p>More older adults are likely to fall victim to scams than are currently recognised according to new US research. The problems are global. </p> <div class="copy"> <p>A research team from Rush University Medical Center in Chicago, US, says older Americans who aren’t cognitively impeded, are also at risk.  </p> <p>In their study <a href="https://10.1001/jamanetworkopen.2023.35319" target="_blank" rel="noreferrer noopener">published</a> today in <em>JAMA Network Open</em>, the group reports on a behavioural experiment where they targeted 644 adults aged 64-104 in Rush’s Memory and Aging Project – a local scheme that draws on participants from metropolitan Chicago to participate in research – with a pitch mimicking a real-world impersonation scam. </p> <p>The study’s fictitious ‘US Retirement Protection Task Force’ pitched itself to participants as a government social security initiative.  </p> <p>This USRPTF told participants via either post, email or a telephone call there’d been irregular activity on their Medicare or social security file and the inquiry was a routine account security check. As part of this, the fake agency asked participants to call a telephone hotline or login to a provided website to provide their details.  </p> <p>Over two-thirds of the study failed to respond to any attempts to obtain information by the phoney scheme.  </p> <p>The remainder were evenly split by either responding to requests for contact, but expressing scepticism at the authenticity of the USRPTF, or by responding and engaging with the request for information.  </p> <p>Those who were engaged with the request for information, but expressed doubts, were also those with the highest cognitive performance, and lowest proportion of dementia. They were also the most financially literate participants, while those who provided their details had the lowest literacy. </p> <p>Those who provided details were also found to have the lowest scam awareness of all participants.  </p> <p>Among this group, 1 in 10 willingly provided personal information and 1 in 5 provided details of their social security number.  </p> <p>“If extrapolated to a population level, these numbers are astounding and suggest that a very large number of older adults are at risk of victimisation,” the authors say. </p> <p>They also note that, given the use of a fictitious US government organisation name, the number of people vulnerable to well-organised scams is likely much higher.  </p> <p>Last year, the US National Council on Aging reported 92,371 older Americans were defrauded of a total of US$1.7 billion. Most were victims of government department impersonation, sweepstakes and robocall scams. Often such scams will simply demand payment while ‘spoofing’ the phone number of a government agency to add the veil of legitimacy. </p> <p>It’s a similar story around the world. This year, the Australian Competition and Consumer Commission found Australians lost a record $3.1 billion last year, mostly via phone scams. Australians over 65 years of age accounted for a quarter of losses and reports.  </p> <p>The UK’s Action Fraud initiative found Britons lost about ₤2.35 billion in the 2020/21 financial year, with those aged 50-69 most susceptible to falling victim.  </p> <div> <p align="center"> </p> <p><em>Image credits: Getty Images</em></p> <p><em><a href="https://cosmosmagazine.com/people/society/1-in-6-older-adults-fall-victim-to-impersonation-scams/">This article</a> was originally published on <a href="https://cosmosmagazine.com">Cosmos Magazine</a> and was written by <a href="null">Cosmos</a>. </em></p> </div> </div>

Legal

Placeholder Content Image

Hilarious reason dad couldn't be fooled by online scam

<p>One savvy dad has outwitted a scammer who posed as his daughter, after the scammer made one hilarious error. </p> <p>Ian Whitworth, a dad from Sydney, took to his LinkedIn page to share the message a scammer texted him in a classic phishing scam that targets parents. </p> <p>He shared the photo of what he thought was the "funniest phishing text any parent has ever received".</p> <p>The text read, "Hey dad, dropped my phone in the sink while doing the dishes. Its unresponsive this is my new number for now just text me here x."</p> <p>Despite the terrible grammar and punctuation that would immediately alert anyone to the possibility of a scam, it was something else that caught the dad's attention. </p> <p>Instead, Whitworth said it was the fact his daughter would never do the chore mentioned by the scammers.</p> <p>Still, he thought it was worth sharing a photo of the text in a bid to warn others, which he uploaded along with the comment, "Cybersecurity update. I just got this."</p> <p>"Perhaps the funniest phishing txt any parent has ever received. 'Doing the dishes', yeah, for sure."</p> <p>In a reply to one of the people who commented on his post, Whitworth joked that his daughter "at age four emerged from my parents' kitchen with a shocked look on her face. 'What's pop doing?'. He was washing up in the sink."</p> <p>Another commenter wrote, "Haha! There is NO WAY this is from my son or daughter, that's for sure."</p> <p>Another commenter said the giveaway that it wasn't from his own child was that they didn't immediately ask for money, to which Whitworth replied, "Ha, yeah, the phishers are like the seven step ladder of confidence before the money issue gets raised. Actual kids: MONEY NOW."</p> <p>According to the federal government's Scamwatch website run by the Australian Competition and Consumer Commission (ACCC), the "Friends/Family Hi Mum" impersonation scam was common.</p> <p>"Scammers send messages pretending to be a family member or a friend desperate for money," it said.</p> <p>"They say they have a new phone and they need you to pay money to help them out of a crisis."</p> <p>Scamwatch warns: "Don't assume a person you are dealing with is who they say they are" and offers the following advice.</p> <p>"If someone you know sends a message to say they have a new phone number, try to call them on the existing number you have for them, or message them on the new number with a question only they would know the answer to," it said.</p> <p>"That way you will know if they are who they say they are."</p> <p><em>Image credits: Getty Images / LinkedIn</em></p>

Legal

Placeholder Content Image

10 helpful etiquette rules for posting a loved one’s death on social media

<p><strong>There’s no right way to deal with death on social media</strong></p> <p>The first thing to bear in mind when sharing or hearing of a loss on social media is that everyone is different. “When it comes to grief, there’s no one way to deal with it, and no correct prescription, so each person’s way needs to be respected,” says Dr Fran Walfish, a family and relationship psychotherapist.</p> <p> “When people are experiencing a loss, it’s very important to step aside, not tell them what to do, and take your cues from them.”</p> <p><strong>Let the closest loved ones post first</strong></p> <p>While anyone affected by a death can feel a strong impulse to share the news on social media, such announcements should be left to the deceased person’s closest family members, who should have the prerogative to decide when, what, and how they want to post. “Sharing is really for the closest loved ones’ benefit, so leave it up to that core group to post the initial news of the passing,” says Stef Woods, who teaches classes on social media. </p> <p>“Note what information has been included or excluded from that post, then follow suit and show support.” A recent study found that the content of those posts can vary depending on the social media platform used. In a 2016 paper, two University of Washington students who had analysed the feeds of deceased Twitter users found, “People use the site to acknowledge death in a blend of public and private behaviour that differs from how it is addressed on other social media sites,” according to a press release.</p> <p><strong>Streamline logistics</strong></p> <p>Because social media has the power to reach such a large network simultaneously, it can be a helpful tool for a family dealing with preparations for a service or memorial. “When the loss is fresh and there are lots of plans to coordinate, it can save people time and emotional energy rather than re-sharing the same information in call after call,” says Woods. </p> <p>If you’re on the phone with someone, she explains, you could get stuck in a conversation that’s not just about you relaying information, it’s also about the other person processing it, and you may not have the time or mental patience for such an exchange. “It can be easier to post the information on Facebook, and then go focus on logistics. It can help give the closest loved ones their own time,” she adds.</p> <p><strong>Get your facts straight</strong></p> <p>While it seems like it should go without saying, when posting about a death on social media, it’s especially crucial to make sure your information is accurate. “I have a niece who was in the ICU for many months with pneumonia teetering between life and death, and all of a sudden on Facebook, I saw a close friend of my brother express condolences, but my niece was still alive!” says Walfish. </p> <p>She rushed to do damage control by contacting the friend – who was a kind, well-meaning person – to prevent her brother from ever seeing such an upsetting post. Fortunately her niece ultimately recovered. “We were lucky in my case, but you can’t always erase what goes out there.”</p> <p><strong>Be careful with details</strong></p> <p>People hearing of a death on social media may want to get more information, understandably, but your curiosity is less important than the family’s need for privacy. “If the core group doesn’t indicate the details of how someone passed in the post, there’s some reason they included or excluded that information,” says Woods. If you happen to know details that weren’t publicly shared by the relatives, it isn’t your place to put that information out there. “Let the core group take the lead,” adds Woods, who points out that ultimately, “finding out the Why and How doesn’t change the fact that someone is gone.” </p> <p>In addition, whether you’re the closest family or the most distant friend of the deceased, be aware that whatever information you post could be viewed by children. “So, if God forbid there was a suicide or any kind of questionable circumstances to the death, be very cautious about how and what you say if you don’t want a teenager or younger child to see it,” says Walfish.</p> <p><strong>Respond in the medium in which you received the news</strong></p> <p>Remember that in the first hours and days after someone passes, the loved ones of the deceased are dealing not only with a storm of emotion but also a long list of logistics. While social media can help that core group to share information more easily, such a public announcement can leave them open to getting bombarded with hundreds of calls and texts. “If you’ve been notified on social media rather than receiving a call, that means for whatever reason that the closest family members didn’t want to or didn’t have time to talk to everyone,” says Woods. </p> <p>“So when acknowledging the news, stick to the medium through which you received the information.” If someone posts on Facebook, she says, reply briefly online, but don’t rush to call or text; instead, give the family space to deal with what they need to deal with. “Wait and reach out later,” Woods advises. “The loss will still be felt long after the services have passed.” An exception may be if you can offer to help in any way – by taking care of children, for example, or hosting out-of-town relatives who may come in for the funeral.</p> <p><strong>Decide whether to keep the departed’s online profiles</strong></p> <p>There’s a good chance that the person who passed has an online profile, and it’s up to their loved ones to decide what to do with it. “Sometimes a person’s profile page is deleted, sometimes the page is kept up, sometimes a separate memorial site is created,” says Woods. “It’s all up to what’s best for those who are grieving the most – there’s no right or wrong way to handle it.” If a deceased person’s Facebook page, for example, continues to be active with respectful photos and posts, it can become a space where everyone can process the loss and remember together.</p> <p>“It can be healthy to express that those who are gone are not forgotten,” says Woods. For some, however, maintaining a lost loved one’s online presence can be detrimental. “When someone keeps a deceased person’s page alive, in a way it’s parallel to memorialising the deceased by making a shrine in your home,” says Walfish. “It can stop some people from moving forward in their life; it’s like not allowing the final resolution of acceptance.”</p> <p><strong>Make your own wishes known</strong></p> <p>When it comes to looking ahead to your own passing, if you have specific wishes about your own social media presence, share them with your loved ones, says financial planner, Pamela Sandy. “Because we live so much of our lives on various social media platforms, we need to think about whether we want all that out there after we’re gone,” she says. Speaking from personal experience, Sandy adds that when her significant other passed, she wasn’t sure of his wishes for his Facebook page and didn’t know where his username and password was. </p> <p>After a time, she found his login credentials and deleted his page, which is what she believes he would have wanted. In order to help her clients avoid similar situations, Sandy includes an online platform that stores people’s changing usernames and passwords to be accessed by their loved ones after their passing – among the services she offers. Additionally, in 2015 Facebook introduced a feature that lets people choose a legacy contact – a family member or friend who can manage their account when they pass away, according to a company press release.</p> <p><strong>Avoid platitudes</strong></p> <p>When you’re trying to show support for someone who has experienced a loss, avoid comments containing trite platitudes such as “They’re in a better place,” especially if you don’t know the family’s beliefs. </p> <p>“For example, saying the person lived a long life may not sit well because the family may not feel it was long enough,” says Woods, adding that it’s fine to be honest and say you don’t know what to say. “It’s OK to write ‘I’m so sorry; there are no words,’” says Woods. “It’s OK to be honest and sincere.”</p> <p><strong>Check your privacy settings</strong></p> <p>When posting, sharing, or commenting on any sensitive information – such as a death – make sure you understand who will be able to see it. “People have different social media privacy settings, so they may think no one can see a particular post when they can,” says Woods. </p> <p>“If you’re sharing a post, say, on Instagram and connecting it with Facebook, it automatically defers to your Instagram setting. Or your phone may have a different default setting than your laptop.”</p> <p><strong>Don’t give into a grief Olympics</strong></p> <p>Sometimes a close family member’s post about the loss of a loved one can attract not only sincere condolences, but also comments in which more distant family or friends get carried away with their own feelings. “It can become a ‘grief Olympics,’ and it should be avoided,” says Woods. Once news of someone’s passing has been announced by their core group, she says, avoid comments about yourself such as bemoaning how hard the news is for you. </p> <p>“If you feel the need to process your own grief, record that processing on your own page,” she suggests. “And do so without tagging any of the core loved ones or the person who passed. If they want to know your views, they’ll see it.”</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/culture/etiquette-rules-for-dealing-with-death-on-social-media?pages=1" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Caring

Placeholder Content Image

Why am I online? Research shows it’s often about managing emotions

<p><em><a href="https://theconversation.com/profiles/wally-smith-1450210">Wally Smith</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/greg-wadley-203663">Greg Wadley</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p>Most of us <a href="https://wearesocial.com/au/blog/2022/02/digital-2022-australia-online-like-never-before/">go online</a> multiple times a day. About half of 18–29 year olds surveyed in a 2021 <a href="https://www.pewresearch.org/short-reads/2021/03/26/about-three-in-ten-u-s-adults-say-they-are-almost-constantly-online/">Pew Research Study</a> said they are “almost constantly” connected.</p> <p>How are we to make sense of this significant digital dimension of modern life?</p> <p>Many questions have rightly been asked about its broader consequences for society and the economy. But there remains a simpler question about what motivates people across a range of ages, occupations and cultures to be so absorbed in digital connection.</p> <p>And we can turn this question on ourselves: <em>why am I online?</em></p> <h2>What are we doing when we go online?</h2> <p>As the American sociologist Erving Goffman <a href="https://www.nytimes.com/1975/02/16/archives/frame-analysis.html">pointed out</a>, asking “What is it that’s going on here?” about human behaviour can yield answers framed at different levels. These range from our superficial motives to a deeper understanding of what we are “really” doing.</p> <p>Sometimes we might be content to explain our online behaviour in purely practical terms, like checking traffic routes or paying a bill. Other times we might struggle to articulate our reasons for going or remaining online.</p> <p>Why are we continually looking at our phones or computers, when we could be getting on with physical tasks, or exercising, or meditating, or engaging more fully with the people who are physically around us?</p> <h2>The ever-present need to manage our emotions</h2> <p>As researchers of human-computer interaction, we are exploring answers in terms of the ever-present need to manage our emotions. Psychologists refer to this activity as <a href="https://www.guilford.com/books/Handbook-of-Emotion-Regulation/James-Gross/9781462520732">emotion regulation</a>.</p> <p>Theories of the nature and function of emotions are complex and contested. However, it is safe to say they are expressions of felt needs and motivations that arise in us through some fusion of physiology and culture.</p> <p>During a typical day, we often feel a need to <a href="https://journals.sagepub.com/doi/abs/10.1037/1089-2680.2.3.271">alter our emotional state</a>. We may wish to feel more serious about a competitive task or more sad at a funeral. Perhaps we would like to be less sad about events of the past, less angry when meeting an errant family member, or more angry about something we know in our heart is wrong.</p> <figure><iframe src="https://www.youtube.com/embed/PQkNb4CLjJ8?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><span class="caption">Digital emotion regulation is becoming increasingly common in our everyday lives.</span></figcaption></figure> <p>One way to understand our frequent immersions into online experience is to see them as acts within a broader scheme of managing such daily emotional demands. Indeed, in <a href="https://www.sciencedirect.com/science/article/abs/pii/S1071581922001732">earlier research</a> we found up to half of all smartphone use may be for the purpose of emotional regulation.</p> <h2>Digital technologies are becoming key tools of emotion regulation</h2> <p>Over the pandemic lockdowns of 2020–21 in Melbourne, Australia, we investigated how digital technologies are becoming <a href="https://dl.acm.org/doi/10.1145/3491102.3517573">key tools of emotion regulation</a>. We were surprised to find that people readily talked of their technology use in these emotion-managing terms.</p> <p>Occasionally, this involved specially designed apps, for mindfulness and so on. But more often people relied on mundane tools, such as using social media alongside Zoom to combat feelings of boredom or isolation, browsing for “retail therapy”, playing phone games to de-stress, and searching online to alleviate anxiety about world events.</p> <p>To some extent, these uses of digital technology can be seen as re-packaging <a href="https://www.tandfonline.com/doi/abs/10.1080/026999399379285">traditional methods</a> of emotion management, such as listening to music, strengthening social connections, or enjoying the company of adorable animals. Indeed, people in our study used digital technologies to enact familiar strategies, such as immersion in selected situations, seeking distractions, and reappraising what a situation means.</p> <p>However, we also found indications that digital tools are changing the intensity and nature of how we regulate emotions. They provide emotional resources that are <a href="https://en.wikipedia.org/wiki/Ubiquitous_computing">nearly always available</a>, and virtual situations can be accessed, juxtaposed and navigated more deftly than their physical counterparts.</p> <p>Some participants in our study described how they built what we called “emotional toolkits”. These are collections of digital resources ready to be deployed when needed, each for a particular emotional effect.</p> <h2>A new kind of digital emotional intelligence</h2> <p>None of this is to say emotion regulation is automatically and always a good thing. It can be a means of avoiding important and meaningful endeavours and it can itself become dysfunctional.</p> <p>In our study of a small sample of Melburnians, we found that although digital applications appeared to be generally effective in this role, they are volatile and can lead to <a href="https://www.theguardian.com/commentisfree/2020/sep/27/social-dilemma-media-facebook-twitter-society">unpredictable emotional outcomes</a>. A search for energising music or reassuring social contact, for example, can produce random or unwanted results.</p> <p>A new kind of <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10187756/">digital emotional intelligence</a> might be needed to effectively navigate digital emotional landscapes.</p> <h2>An historic shift in everyday life</h2> <p>Returning to the question: <em>what am I doing online?</em> Emotion regulation may well be the part of the answer.</p> <p>You may be online for valid instrumental reasons. But equally, you are likely to be enacting your own strategies of <a href="https://cis.unimelb.edu.au/hci/projects/digitalemotionregulation">emotion regulation through digital means</a>.</p> <p>It is part of an historic shift playing out in how people negotiate the demands of everyday life. <img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208483/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/wally-smith-1450210">Wally Smith</a>, Professor, School of Computing and Information Systems, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/greg-wadley-203663">Greg Wadley</a>, Senior Lecturer, Computing and Information Systems, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-am-i-online-research-shows-its-often-about-managing-emotions-208483">original article</a>.</em></p>

Technology

Placeholder Content Image

Facebook Messenger scams are on the rise – here’s how to protect yourself

<p><strong>Facebook Messenger scams prey on our vulnerabilities</strong></p> <p>Scams through Facebook’s Messenger platform are being reported at higher rates than ever before, according to AARP, citing its own data as well as that of the government. Since Facebook’s early days, cybercriminals have been mining Facebook’s direct-messaging capabilities to scam unsuspecting victims out of money. One of the earliest Facebook Messenger scams involved a message, purportedly from a friend, claiming they were stuck in a foreign country and in desperate need of immediate financial assistance to get out. It wasn’t really the friend, however, but rather a scammer who had hacked into the friend’s account. </p> <p>Imposter scams such as “the friend in a foreign country” have evolved and proliferated over the years. The common thread is the scammer either creates an account impersonating an actual Facebook account or hacks into an existing Facebook account. In either case, the scammer then uses the fake/hacked account to send private messages to the account holder’s friends that elicit either money or personal information. The messages vary, but all are designed to prey on our human vulnerabilities, including:</p> <ul> <li>the desire to be a “hero”</li> <li>the desire to appear “generous”</li> <li>the desire to win “free money”</li> <li>the desire to be loved and admired</li> <li>the desire to avoid shame or punishment</li> </ul> <p>If a scammer tries to message you, report them, Facebook advises, but that begs the larger question of how does one recognise a Facebook Messenger scam?</p> <p><strong>Current Messenger Facebook scams</strong></p> <p>According to Facebook and our cybersecurity experts, here are the most common Facebook Messenger scams today:</p> <p><span style="text-decoration: underline;"><em>Romance scams</em></span>. Preying on our desire to be loved and admired, romance scammers appear as attractive strangers with sad stories and a desire to love and be loved. The most effective romance scammers will friend a number of mutual friends before reaching out to any of them, in an attempt to make themselves seem less like strangers and more like people in the same social network. Many use photos they’ve stolen off the Internet and many pose as members of the military or as doctors, in an attempt to inspire trust, admiration, and even authority. What they all have in common is they can’t meet you just yet because they’re somewhere far away, and although it may take a bit of time, even as much as several weeks, they will eventually ask you to send money so that they can come to see you.</p> <p><span style="text-decoration: underline;"><em>Lottery scams</em></span>. Preying on our desire for “free money,” lottery scammers appear as friends or organisations who are thrilled to tell you you’ve won money in some lottery or contest. The common thread? It’s a contest you have no recollection of having entered and to get the prize, you’ll have to either pay a fee or “refundable” advance or provide personal information.</p> <p><span style="text-decoration: underline;"><em>Inheritance scams</em></span>. Also preying on our desire for free money, inheritance scammers claim to be lawyers or others who represent someone who has died and supposedly left you their estate or some portion of it – but first, you’ll have to fork over some money or personal information.</p> <p><span style="text-decoration: underline;"><em>Loan scams</em></span>. Another variation on the “free money” theme is the loan scam, whereby the scammer promises low-interest loans with no money down – except for a “refundable” application fee. Facebook points out that loan scammers may send messages via Messenger and also leave posts and comments on Pages and in Groups to legitimise themselves. However, legitimate lenders wouldn’t offer loans via Facebook Messenger, nor would they ask you for money to proceed with a loan application.</p> <p><span style="text-decoration: underline;"><em>Donation scams</em></span>. Facebook specifically warns users to watch out for “famous people” or people claiming to represent a charity hitting them up for a donation. Donation scams, which are easy money for a scammer because they are a direct request for payment, prey on our desire to be perceived, or to perceive ourselves, as generous.</p> <p><span style="text-decoration: underline;"><em>“Hey, is this you?” scams</em></span>. Consumer Affairs warns of this “phishing scam” that uses the threat of shame to goad you into giving up personal information. The scammer hacks into one of your Facebook friend’s Messenger accounts and sends you a video, asking if it’s really you in the video, and implying there’s something in the video that could embarrass you. If you ever get a message like this, Consumer Affairs urges you to ignore and delete it to avoid giving away personal information or introducing a virus onto your computer.</p> <p><strong>Red flags to watch out for</strong></p> <p>Unfortunately, Facebook Messenger scams evolve rapidly (as soon as we suss them out, there are several more to replace them). So, it’s a good idea to be aware of these warning signs that we culled from our experts:</p> <p><span style="text-decoration: underline;"><em>Someone is asking you for money</em></span>. While Facebook warns specifically against strangers asking for money, Rachel Wilson, investigative coordinator for The Smith Investigation Agency, points out to Reader’s Digest that any time anyone asks you for money over Messenger, it’s immediately suspect. “If friends or family ask you to help them in an emergency, always call to speak with them personally to confirm that the message originated with them.”</p> <p><span style="text-decoration: underline;"><em>Someone is getting a little too personal</em></span>. When someone sends you a message requesting personal information, especially financial information, it should be considered suspicious, advises Sean Messier, credit industry analyst for Credit Card Insider. Messier suggests not revealing any such information until you’re certain the message-sender is who they claim to be, but it’s probably also a good idea to never reveal any such information over Messenger at all.</p> <p><span style="text-decoration: underline;"><em>Someone is offering something for free</em></span>. You know how they say there’s no such thing as a free lunch? Well, there’s no such thing as free money on Facebook, points out Robert Siciliano, security expert. This is true for any kind of “free money” Messenger message, including those involving lotteries, loans, contest winnings, inheritances, lost bank accounts, and reimbursements of money owed.</p> <p><span style="text-decoration: underline;"><em>Someone who wants to take the conversation off Facebook (to text or email, etc)</em></span>. Facebook warns against taking conversations off Facebook unless you’re absolutely certain, beyond a shadow of a doubt, the message sender is who they say they are.</p> <p><span style="text-decoration: underline;"><em>Messages that seem out of character for the sender</em></span>. If a message seems “out of the norm” for the sender, trust your instincts and ignore it. This is doubly true if the message includes an attachment. Be very wary of opening attachments in general, and particularly if something seems “off” about the message or the sender.</p> <p><span style="text-decoration: underline;"><em>Messages rife with spelling and grammatical errors</em></span>. Facebook points out that when a message is filled with typos and grammatical errors, you should have your guard up. A single typo is one thing, but things like the misspelling of names and places are a big red flag.</p> <p><span style="text-decoration: underline;"><em>Messages from new accounts with few friends</em></span>. Roger Thompson, CEO of Thompson Cybersecurity Labs, points out that new accounts with few friends should always be considered suspicious until confirmed otherwise. Friend requests from such accounts and from duplicate friend accounts should be considered suspect as well.</p> <p>To avoid getting hacked (and used by a cybercriminal in an imposter scam), Wilson recommends updating your social media passwords regularly and always use two-factor authentication. She also notes that with Facebook use increasing among seniors, it would be a good deed to speak to older family members about Messenger scams and how to avoid them.</p> <p><em>Image credits: Getty Images </em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/true-stories-lifestyle/science-technology/facebook-messenger-scams-are-on-the-rise-heres-how-to-protect-yourself" target="_blank" rel="noopener">Reader's Digest</a>.</em></p>

Technology

Placeholder Content Image

Don't get caught out: 6 holiday scams ripping off travellers

<p>If you’re planning to take a trip across the world soon, then be warned, as there is an influx of new holiday scams affecting tourists as they travel to their dream break.</p> <p>Holiday-makers have money to spend and relaxation on their minds, which is why they are seen as easy targets for con artists.</p> <p>UK-based consumer group <a href="https://www.which.co.uk/" target="_blank" rel="noopener">Which?</a> has listed the six most common frauds travellers need to be aware of, along with tips on how to avoid getting scammed, <em><a href="https://www.thesun.co.uk/" target="_blank" rel="noopener">The Sun</a></em> reported.</p> <p>So, if you’re planning a trip abroad, here are the things you need to watch out for:</p> <p><strong>1. Accommodation booking scams</strong></p> <p>While the introduction of the internet has been a blessing in terms of ease, it’s also made it easier for scammers to lure you into their traps. With the growth of online holiday bookings, fraudsters often need nothing more than a few fake pictures to lure their victims.</p> <p>A common scam is one that includes picturesque photographs of holiday rentals that don’t seem to exist, advertised at affordable price points. The deals were often advertised on mainstream websites but asked those who were interested in booking to contact them via email, rather than use the site’s own booking system.</p> <p>Bookers were then sent a link to a convincing payment page, which suggested the payment hadn’t cleared. They then ask for a bank transfer instead.</p> <p><strong>How to protect yourself: </strong>Do your research. Google the property to see if it shows up on other reputable websites to check its authenticity. You could use Google Maps and Street View to see if the accommodation actually exists. Also, never pay by bank transfer.</p> <p><strong>2. Dodgy flight deals</strong></p> <p>Con artists have created fake airline websites that advertise budget deals on long haul flights that leave their victims high and dry.</p> <p>The UK government’s fraud agency has reported a recent surge of scams targeting those who are travelling to Asia, Africa and the Middle East.</p> <p>In many instances, tickets were purchased with stolen credit cards and then sold to unsuspecting victims, complete with a reference number.</p> <p>But tickets were then cancelled after the credit card was reported as stolen, leaving the victims out of pocket and nothing to show for it.</p> <p><strong>How to protect yourself:</strong> Book tickets through trusted agencies.</p> <p><strong>3. Wi-Fi hacks</strong></p> <p>It’s become human instinct to try and find Wi-Fi wherever you go, and the same applies when travellers land at airports.</p> <p>While it’s important to stay connected in order to get in touch with friends and family, there is a risk involved. Fraudsters have set up their own free networks in airports and use them to gain free information about anyone that logs on.</p> <p>Many passengers have been tricked into entering their credit card details before logging on.</p> <p><strong>How to protect yourself:</strong> Ask airport staff about the real Wi-Fi connection to make sure it’s the real deal and be on the lookout for connections that don’t ask for passwords straight away. Also, if you are asked for confidential information then provide fake details where possible.</p> <p><strong>4. “Free” holidays</strong></p> <p>This decade-long scam has been one that con artists have perfected throughout the years. Back in the day, people would be pressured into buying timeshares after accepting a complimentary break.</p> <p>Now, the con is conducted through scratch cards and other fake competitions.</p> <p>In one example of the scam, around 500 British travellers in Spain’s Costa del Sol have been scammed of around $27.5 million in the last year alone.</p> <p><strong>How to protect yourself:</strong> Refuse all offers of free holidays because if it’s too good to be true, then it probably is.</p> <p>Do you know of any other travel scams? Let us know in the comments below.</p> <p><strong>5. Document fraud</strong></p> <p>Over the years, the internet has seen a growth in websites selling fake travel visas and other important documents needed to visit foreign countries.</p> <p>A few cases were found to not be conducting illegal activity but were responsible for reselling documents at a huge premium compared to official channels.</p> <p>Some common examples included websites selling the European Health Insurance Card and US visa (Electronic System for Travel Authorisation, or ESTA) documents.</p> <p>While the sites looked extremely convincing, they had nothing to do with the governments of the countries they claimed to represent.</p> <p>According to Which?, out of the top 20 search results for “ESTA visa” over half were unofficial.</p> <p><strong>How to protect yourself:</strong> Follow links to official government websites through the Department of Foreign Affairs website.</p> <p><strong>6. Fake tickets</strong></p> <p>It’s no secret that music concerts and major sporting events are on top of the list of potential scams, but travellers are now falling victim to fake packages to international events and are only finding out the true worth of their ticket once they arrive in the country.</p> <p>The FIFA World Cup in Russia was one example where countless websites offered travel packages including tickets when the only tickets that were considered valid and authentic were the ones purchased directly from FIFA themselves.</p> <p>Scammers love to lure desperate fans with fake tickets, as they know the demand is high and it’s easy to trap people who are willing to go the extra mile for a ticket to their chosen event.</p> <p><strong>How to protect yourself:</strong> Make sure the tickets you are purchasing are from legitimate websites and web pages that start with “https” and have the padlock symbol in the URL bar. And if you’re on the hunt for second-hand tickets, then do a quick check if whether or not resale is allowed, as some tickets are only valid for the original buyer.</p> <p>“Criminals are finding ever more sophisticated ways to dupe holiday-makers, both in the booking process and when they’re on the holiday itself,” Which? Travel editor Rory Boland said.</p> <p>“If something seems too good to be true, it almost certainly is. Don’t hand your money over until you can be sure it’s the real deal.”</p> <p><em>Images: Getty</em></p>

Travel Trouble

Placeholder Content Image

Transformers trailer sparks fury online

<p dir="ltr"><em>Transformers</em> released a string of teasers and behind-the-scenes footage ahead of the June premiere of <em>Transformers: Rise of the Beasts </em>- but quickly stripped a scene that appeared reminiscent of the September 11 attacks.</p> <p dir="ltr">The seventh<em> Transformers</em> movie in the franchise is set to hit Aussie cinemas on June 22, and <em>Transformers</em> shared an extended trailer that showed the Twin Towers of the World Trade Centre surrounded by black smoke, according to the New York Post. </p> <p dir="ltr">The scene’s evocation of 9/11 shocked viewers and many didn’t believe the image could be affiliated with a <em>Transformers</em> movie.</p> <p dir="ltr">“This image certainly made me stop scrolling,” wrote Twitter user Daniel Kibblesmith, alongside the jarring screenshot from the trailer.</p> <p dir="ltr">Kibblesmith’s tweet attracted more than 2.5 million views in less than 24 hours after being posted.</p> <p dir="ltr"><em>Transformers’</em> caption read, “It’s about to be epic. Go behind the scenes with our cast and crew, and meet the new characters of <em>Transformers</em>.”</p> <p dir="ltr">As of May 23, the post no longer appears to be on the franchise’s Twitter page. </p> <p dir="ltr">The nearly two-minute teaser features Anthony Ramos, who stars in <em>Transformers: Rise Of The Beasts </em>as Noah Diaz, an ex-military electronics specialist living in Brooklyn, New York.</p> <p dir="ltr">“This is about to be epic. This is about to be epically crazy,” Ramos said in the behind-the-scenes clip. </p> <p dir="ltr">The footage shows a peaceful NYC skyline with the Twin Towers before abruptly cutting to a shot of the Statue of Liberty in the foreground and the World Trade Centre covered in thick smoke in the background.</p> <p dir="ltr">Steven Caple Jr, the movie’s director clarifies in the clip that the upcoming movie is “in chronological order, is the second <em>Transformers </em>movie – it takes place during the ’90s”.</p> <p dir="ltr">“I didn’t think that it was possible, but here I am, even less interested than ever in seeing a <em>Transformers</em> movie. They’ve done it again, the mad genii,” one Twitter wrote.</p> <p dir="ltr">“This could have been easily avoided if they’d picked literally any other city besides New York,” another tweeted.</p> <p dir="ltr">“That is … an unfortunate shot,” yet another said of the upsetting image, while another said it was “too soon”.</p> <p dir="ltr"><em>Image credit: Twitter</em></p>

Movies

Placeholder Content Image

Divorce led me to my true love

<p><em><strong>Over60 community member, Mary Green, 63, shares her story about how when her marriage suddenly ended after 44 years she found that it was a blessing in disguise.</strong></em></p> <p>"On the Easter weekend of 2012 I was dumped by my husband of 44 years! After a small disagreement I had gone to our holiday flat on a remote golf course outside Melbourne to work on a book fast approaching its publishing deadline. When I messaged that I would be back on Tuesday, he replied by SMS that he had changed the locks.</p> <p>I was incredulous. Marriage is often not easy, but I was about to find out just how tough I was. For the next two months I travelled gypsy style between the golf flat and the tiny new South Yarra studio my second of three sons had just moved into. I have not been inside our family home since.</p> <p>This was the situation I was in when I decided to date. At 63 I just started again. I joined three online dating sites and did not waste time. I booked to meet seven men in the next seven days, apparently breaking all the rules of being cautious and discreet. All seven men were polite and interesting. We had a coffee or met in a wine bar and I had fun, but there was no chemistry. I was just happy being free from my husband.</p> <p>During this time my husband sent my belonging to me on a truck (which I paid for) and when I was sorting through the boxes of files, a page caught my eye. It was the minutes of the golf estate owner’s corporation, and out jumped the name of a man that I had been at school with. Our sisters were best friends in those days. I checked Facebook, and there he was, with three children, seven grandchildren – but I couldn’t see a wife. A bit of messaging banter later, I asked him to ring me.</p> <p>We met up for a drink that turned into dinner and a hug that I will never forget. In my eyes he was still the handsome sporting hero that I had beaten in the high school mixed doubles tennis finals. He was not looking to date. I hoped he would just give me some lessons in online dating. He had been divorced for about 15 years and had two very long relationships with women that he had met on dating sites. He told me that my booking of seven men in seven days was breaking the rules, but also admitted that he had stacked his dates, just hours apart, in order to meet them all. By Christmas 2012 we were a couple in love.</p> <p>It’s been nearly two years since that first date and I am grateful for the internet and the coincidence that we both owned property on the same golfing estate. He plays A Grade, and I try. We are similar in so many other ways that it’s quite spooky sometimes. Our families have embraced each other and the joy of just knowing he is there helps me immensely through what has been a difficult time.</p> <p>Having worked as a support in my ex-husband’s career, and suddenly having to pay bills without a job of my own, led me to Centrelink. They said that I was too old to retrain at no cost, unless I wanted to study Aged Care – something rather peculiar in that thinking, a subsidised course in bookwork software would be more useful and help me save on accountant’s fees. In the meantime I’m setting up my own Facebook blog, called Healthy Ageing. If I can find a good man on the internet, I am optimistic about building a good lifestyle on it too."</p> <p><em>*Names have been changed</em></p> <p><em>Images: Getty</em></p>

Relationships