100% found this document useful (1 vote)
167 views25 pages

Unit 11 Risky Credit

This document provides information about teaching strategies for intermediate level students on the topic of risky credit. It consists of 3 parts - an introduction which outlines the learning objectives and strategies, activities which involve students completing a KWLH chart and applying information from a text on credit card fraud to different outputs, and texts providing information on types of credit card fraud. The overall aim is for students to understand credit card fraud, apply what they've learned to protect themselves, and present their findings creatively.

Uploaded by

Yanz Muhamad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
167 views25 pages

Unit 11 Risky Credit

This document provides information about teaching strategies for intermediate level students on the topic of risky credit. It consists of 3 parts - an introduction which outlines the learning objectives and strategies, activities which involve students completing a KWLH chart and applying information from a text on credit card fraud to different outputs, and texts providing information on types of credit card fraud. The overall aim is for students to understand credit card fraud, apply what they've learned to protect themselves, and present their findings creatively.

Uploaded by

Yanz Muhamad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

HEBAT Bacaan BI

Unit 11

UNIT 11:
RISKY CREDIT

What are the


risks of using
credit cards?

How can we
avoid getting
scammed?

Can a person
recover from
bankruptcy?
How?

Where is the
best place to
get financial
advice?

237

HEBAT Bacaan BI
Unit 11

TEACHING AND LEARNING STRATEGIES FOR BEGINNER LEVEL


BY THE END OF
LESSON,
STUDENTS CAN:

i. Identify main ideas in a text on credit card scams.


ii. Use the information to produce a presentation.
Reading Strategy: Skim and Scan
REAP
LOTS: Remembering

STRATEGIES/
APPROACHES

Understanding
HOTS : Evaluating
Creating
st

21 Century Learning
VALUES
LEARNING/
TEACHING AIDS
SITUATION
TEXT FORMAT

Integrity
Worksheet
Infographic
Public
Multiple

TEXT TYPE

Description

COGNITIVE
PROCESS

Scan and locate


Represent literal and gist meaning

*refer to HEBAT Bacaan Bahasa Inggeris Reading Strategies


**refer to 21st Century Learning: Cooperative Learning Structures
***refer to Guide to Using HOTS in a Reading Classroom

238

HEBAT Bacaan BI
Unit 11

ACTIVITIES
STEP 1
a. Students are given 2 minutes to memorise a
set of words and phrases (PICTURE 1).
b. In small groups, students list as many words as they
can remember.
c. The group with the most number of words wins.
d. Class discuss meaning of words.

STEP 2
a. Students Skim and Scan* as they read TEXT 1 and
complete the REAP* table (WORKSHEET 1).
b. Students discuss with their shoulder partners** and
then with their table group members.

STEP 3
a. Students study TEXT 2.
b. In groups, students use the information from the text
for different outputs:
Group A : Produce a poster
Group B : Produce a TV advertisement
Group C : Create a dialogue
Group D : Create a message to post on social media.
c. Students present their work in a Gallery Walk**.

STRATEGIES/
APPROACHES

LOTS:
Remembering
Understanding
Memory
and Observation :
Kims Game
Reading Strategy:
Skim and Scan
REAP
21st Century
Learning:
Collaboration

HOTS :
Evaluating
Creating
21st Century
Learning:
Gallery Walk

239

HEBAT Bacaan BI
Unit 11
PICTURE 1

240

HEBAT Bacaan BI
Unit 11
TEXT 1

241

HEBAT Bacaan BI
Unit 11
WORKSHEET 1

Read the text given and complete the REAP chart below.

REAP
R (Read)

E (Encode)

Read the text and jot down the title.

In your own words, write down the main ideas.

A (Annotate)

P (Ponder)

List the keywords.

What do you KNOW about credit scams?

What do you WANT TO KNOW about credit scams?

242

HEBAT Bacaan BI
Unit 11
TEXT 2

How To Report Credit Card Fraud

1. Call your card issuer. Call immediately as


soon as you suspect your card has been
used by someone else. The toll free number
of your credit card issuer can be found on the
back of your credit card. You can also call this
number if you card is lost or stolen.

2. Follow up with written notification. Send a


letter to your credit card issuer. Include the
credit card number and the date you file the
report. If your card is stolen or lost include
the information in your report.

3. Make a police report. Stolen or lost credit


card must be reported to the police for
further investigation. You will be asked to
report on certain information such as the
name of the person who used your card and
other details of the crime.

Use information from a text and apply in a new situation

243

HEBAT Bacaan BI
Unit 11

TEACHING AND LEARNING STRATEGIES FOR INTERMEDIATE LEVEL


BY THE END OF
LESSON,
STUDENTS CAN:

i. Scan and locate main points in each paragraph.


ii. Use information from a text and apply in a new situation.

Reading Strategy: KWLH


LOTS: Understanding
STRATEGIES/
APPROACHES

HOTS : Analysing
Applying
Creating
21st Century Learning

VALUES
LEARNING/
TEACHING AIDS

Integrity
Worksheet

SITUATION

Public

TEXT FORMAT

Single

TEXT TYPE

Description

COGNITIVE
PROCESS

Represent gist and literal meaning


Integrate and generate inferences.

*refer to HEBAT Bacaan Bahasa Inggeris Reading Strategies


**refer to 21st Century Learning: Cooperative Learning Structures
***refer to Guide to Using HOTS in a Reading Classroom

244

HEBAT Bacaan BI
Unit 11
ACTIVITIES

STRATEGIES/
APPROACHES

STEP 1
a. Students study the poster (PICTURE 1).
b. Students underline difficult words and discuss
the meaning to improve vocabulary.
c. Students complete the 'Know' section of the KWLH*
chart (WORKSHEET 1).

Reading Strategy:
KWLH

STEP 2
a. Students complete the 'Want' section of the KWLH
chart by constructing Wh-questions.
b. Students read a text on different types of credit card
fraud (TEXT 1).
http://people.exeter.ac.uk/watupman/undergrad/otho
mas/different_types_of_credit_card_f.htm

LOTS:
Understanding

Reading Strategy:
KWLH

HOTS:
Analysing

c. Students find the answer to the Wh- questions and


write them down in the 'Learned' section. Lastly,
they complete the How to learn more column.
d. Students share answers with their face partner**.

STEP 3
a. In groups, students brainstorm and list** ways to
protect themselves from credit card fraud.
b. Students apply information from TEXT 1 and the list
for different outputs:
Group A : Produce a poster (PICTURE 2)
Group B : Produce a TV advertisement
Group C : A dialogue
Group D : A message on social network
Group E : A power point presentation

c. Students present their work and get peer feedback


in Two Stars & A Wish** activity.

21st Century Learning :


Collaboration

21st Century Learning:


List-O-Mania
HOTS:
Applying
Creating

21st Century Learning :


Two Stars & A Wish

245

HEBAT Bacaan BI
Unit 11
PICTURE 1

246

HEBAT Bacaan BI
Unit 11
WORKSHEET 1
Complete the KWLH chart on credit card scams.

What we Know

What we Want to What we Learned How we can learn


know
more

247

HEBAT Bacaan BI
Unit 11

TEXT 1
DIFFERENT TYPES OF CREDIT CARD FRAUD
There are many different types of credit card fraud, these vary from where both the card and
criminal are present to where the criminal has acquired a card holders details and is able to
purchase goods fraudulently over the phone or Internet. The Internet and telephone
shopping has proved a breading ground for credit card fraud . The reason for this is not only
the annonymity that is made possible through not having to go to the shop in person but
through the pressure that retailers have found themselves under to have a quick turn around
between the time of an order being placed and the time that it arrives at the customers door.
This has been sparked through the Internet providing ever increasing amounts of
competition between retailers for better and quicker services and increase consumer
expectations. However, the contrasting effect of this is that in order to be quick and simple to
use, retailers can easily become sloppy or cut corners when it comes to whether or not the
person paying for the goods is the same person who ordered them. This is of course if it is in
any way possible to actually prove this anyway. For instance, it is very difficult to tell on the
basis of an address, card number and expiry date whether the person using it is genuine at
all. Many companies, especially Internet firms, may not report incidents of fraud because
they do not want to appear vulnerable and put people off shopping at their sites. "The
Confederation of British Industry reports as of 2001 two thirds of UK businesses have
experienced a serious on-line incident such as hacking, virus attacks or credit card fraud".
For these reasons the three forms of credit card fraud counterfeiting, "card not present" and
lost and stolen cards have flourished whilst other older types of fraud (e.g. mail non-receipt)
have
either
decreased
or
almost
ceased
to
exist
at
all.
Counterfeiting
Counterfeiting, in the UK, rose 104% in 2000 to 102.8m and then a further 64% in 2001 up
to 160.3m. A counterfeit card is one that has been scanned, printed, recoded or swiped
without the card issuers permission. Most cases of counterfeiting involve a process known
as skimming or cloning, where legitimate data from the magnetic stripe on a card is
electronically copied on to another one without the knowledge of the rightful card holder.
This is a particularly common problem when it comes to areas of commerce such as
restaurants or bars where the cardholders will likely lose sight of their cards when it is
swiped to pay for their drinks or meals. Here, corrupt waiters and waitresses are then able to
sell on or use the details of the cardholder that they have acquired for fraudulent purposes.
This will involve the creation of a duplicate counterfeited card which can then be signed on
the back by the fraudster and then used as they please. The legitimate cardholder is unlikely
to realise until they next receive information on their balance showing purchases that they
did not make due to them thinking that their card and personal details were safe in their
wallet.
Lost and Stolen Credit Cards
In 2001 thieves stole 114m in the UK in 2001 through the use of lost and stolen credit
cards. Most fraud on lost and stolen credit cards will take place at commercial outlets or
Internet and telephone shops prior to the genuine card holder reporting its loss. Cards are
often stolen during burglaries or pick pocketing in the street and then used almost
instantaneously. Unlike counterfeit or card-not-present forms of fraud the victim will usually
notice fairly quickly enabling the card to be blocked and hopefully limiting the damage.

248

HEBAT Bacaan BI
Unit 11

Card Not Present Fraud and Deceitful Use Of Credit Card Details
In the UK "Card not present" fraud, where information obtained from innocent cardholders is
used to buy goods over the Internet, over the phone or through mail order rose 94% to
56.8m in 2000 and then 59% to 95.7m in 2001. Most recently, a phenomena widespread
across the US has made its way across the Atlantic in to the EU. It is what is known as binraiding or dumpster-diving. This is the process through which peoples rubbish may be
stolen and its contents looked through so as to ascertain the details required to commit
credit card fraud using the unsuspecting bin owners details. "One bin picked through
contained a signed blank cheque. Another contained an unused cheque book, while from a
third bin researchers were able to find an individuals full name, address, date of birth, bank
account number, sort code, employment details and medical information. The same person
had thrown away a whole benefit book, bill and other official letters that might be used to
corroborate identity. For good measure, he had also discarded a completed passport
application giving even more detailed information about his identity". One of the most striking
factors about this form of scam, is that should the fraudster be able to gather enough
information he may be able to even assume the actual identity of his unlucky victim. This
would enable him to take control of their bank account, notifying for instance the bank, of a
change of address so that all correspondence from the bank will go elsewhere thus
maximising the time that the fraudster has to accomplish his task. This form of fraud can
happen through hacking of databases on the Internet to allow fraudsters access to peoples
banking and personal details once again enabling them to assume their identity. Fraudsters
may even fill in the gaps amongst their information by cold calling their victims claiming to be
from the bank or police and use information that they have already gained about them to
sound genuine. "A recent FBI bust nailed 90 on-line fraudsters who had fleeced 56,000 Net
users of over $117 million. Some 2,000 computer users a week complain of identity theft to
the Federal Trade Commission". When the fraudsters have managed to acquire these card
details they will usually purchase goods that they can dispose of quickly on the black market
so
as
to
cover
their
tracks
and
"launder"
the
stolen
money.
Mail Non-Receipt Credit Card Fraud
This form of fraud had its heyday in the early 1990s peaking in 1991 when it cost the British
banking industry 33m alone and represented 20% of total plastic fraud. This represents one
of the success stories for those fighting credit card fraud. Since 1991 the banking industry,
governments and mail delivery services have combined to try to stamp out mail non-receipt
fraud as much as possible. Steps that they have taken involve securing delivery systems,
sending PIN numbers separate from actual cards and drastic punishments including prison
sentences for postal workers found interfering with or stealing items of post. There was
however, a marked rise in this type of fraud during 2001, which, more than anything
represents how criminals will, more often than not, find ways around measures designed to
stop
them.
Applications Fraud
This form of fraud involves using stolen or fake ID such as passports, birth certificates,
driving licences etc. to open a fraudulent account with an unsuspecting victims identity.
Criminals can also use information that they have stolen, either through burglaries or the
process of dumpster-diving, enough details that they are able to carry out an identity theft.
This means that they have enough proof of identity that they are able to inform the bank of a

249

HEBAT Bacaan BI
Unit 11
change of address using the stolen documents and steal not just money from an account but
effectively the whole account and control of it. This causes problems not only because a
theft has occurred but even when it is discovered it may take time for the bank to admit that
a mistake has been made. This is due to the fact that as far as they are concerned the
application for an account or change of address have been perfectly legitimate and in some
cases the unfortunate victim may have difficulty convincing them of their own identity. At
present, this is not a hugely common problem, however, banks and law enforcement
agencies expect criminals to begin to switch to the use of application fraud as the
emergence of new PIN and "Smart Card" systems make more popular frauds, such as
counterfeiting,
much
more
difficult.
Other Less Common Types Of Credit Card Fraud
There are other, far less common, types of credit card fraud that are worthy of mention:
Automated Teller Machine (ATM) Fraud
This form of theft usually occurs in three ways. The first is where the cardholder has been
imprudent enough to leave their Personal Identification Number (PIN) with their credit card
and it has been lost or stolen. The thief is then able to go to the nearest cash point, or if the
victim is unlucky enough and the thief brave enough several cash points, to easily take out
as much money as the machine will allow. In this case the problem is solely in the hands of
the police and the cardholder as the banks are under no obligation to refund them. Secondly,
PIN numbers can be obtained by thieves watching someone closely enough whilst they key
in their PIN, in order to then follow them until an appropriate time when the card can be
obtained either through stealth or intimidation (otherwise known as mugging) and then
money withdrawn soon afterwards. This is known as shoulder surfing and in this case the
banks are liable as the cardholder has been robbed through no fault of their own. There are
also cases of both card and PIN number being obtained through a process of intimidation
and series of threats, however thankfully, as it is this case that generally causes the most
danger and trauma for the victim, these cases are very rare. The final example of ATM fraud
involves a process known as card trapping. This involves a device that traps the card inside
the cash point, the thief then approaches the stranded cardholder and gives the impression
of trying to be helpful but is instead tricking the cardholder into re-entering their PIN. When
the cardholder eventually gives up and goes to look for help inside the bank or elsewhere
the thief will then remove the device, re-enter the acquired PIN number and abscond with
the money before the victim reappears. Similarly, there have also been cases where
cardholders have been duped by fake cash machines. These look like ordinary ATMs into
which they have entered their card and their PIN only to find neither the card nor money
come out, so believing their card to be stuck, they leave to find help or ring the card
company. However, on their return they find not only is their card gone but in fact, the entire
ATM seems to have disappeared along with a sizeable sum of money from their account.
Fake Copy-Cat Web Sites
One recent trend in on-line fraud is the emergence of fake copy-cat web sites that take
advantage of consumers that are unfamiliar with the Internet or do not know the exact web
address of the legitimate company that they wish to visit. The consumer, believing that they
are entering their credit details in order to purchase goods from the intended company, are
instead unwittingly entering their details into a fraudsters personal database. He is then able
to make use of this information at a later stage, either for his own purposes or to sell on to
others interested in perpetrating credit card fraud.
http://people.exeter.ac.uk/watupman/undergrad/othomas/different_types_of_credit_ca
rd_f.htm

250

HEBAT Bacaan BI
Unit 11
PICTURE 2

Sample of a poster

251

HEBAT Bacaan BI
Unit 11

TEACHING AND LEARNING STRATEGIES FOR ADVANCED LEVEL


BY THE END OF
LESSON,
STUDENTS
CAN:

i. Suggest ways to avoid becoming victims of credit card fraud.


ii. Justify the use of a text as a credible source material.
iii. Research the internet to produce a presentation.

Reading Strategies: THRILD


CHATT
QUACK
HOTS: Applying
STRATEGIES/
APPROACHES

Analysing
Evaluating
Creating
21st Century Learning
i-THINK

VALUES

Integrity

LEARNING/
Worksheet
TEACHING AIDS
SITUATION

Public

TEXT FORMAT

Single

TEXT TYPE

Description

COGNITIVE
PROCESS

Reflect on Content and Form


Assess Quality and Credibility

*refer to HEBAT Bacaan Bahasa Inggeris Reading Strategies


**refer to 21st Century Learning: Cooperative Learning Structures
***refer to Guide to Using HOTS in a Reading Classroom

252

HEBAT Bacaan BI
Unit 11
ACTIVITIES

STRATEGIES/
APPROACHES

STEP 1
a. Students study PICTURE 1.
Reading Strategy:
b. Students construct 5W1H* questions based on
5W1H
PICTURE 1.
c. Students take turns posing and answering questions 21st Century Learning:
with shoulder partner**.
Think-Pair-Share
STEP 2
a. Students read TEXT 1 and complete the THRILD*
form (WORKSHEET 1).
b. Students share their answers with their shoulder
partner.

STEP 3
a. In pairs, students read TEXT 1 again and apply the
CHATT* form to select important vocabulary,
highlight main ideas and identify details
(WORKSHEET 2).
b. Students carry out a Round Robin* activity on ways
to prevent credit card scam.

Reading Strategy:
Skim and Scan
THRILD
21st Century Learning:
Think-Pair-Share

Reading Strategy:
CHATT
HOTS:
Analysing
Evaluating
i-THINK

c. Students choose an appropriate i-THINK Map to


present their ideas.
d. The class evaluates and gives feedback.

21st Century Learning:


Round Robin/
Carousel Feedback

253

HEBAT Bacaan BI
Unit 11
STEP 4
a. Students are given a situation:
Hariz Iskandar is planning to present the topic credit card
scam on his talk show. Justify a text as a suitable source of
information.
b. Students work in groups and carry out Numbered
Heads Together** activity. Each student in the group
is given a statement for example:
a) The text is outdated.
b) The text is unreliable.
c) The text discusses all types of credit card frauds.
d) The information in the text is sufficient.
c. Each student defends and justifies his statement
using examples. The group decides on one
statement. A representative from every group
presents and defends their final statement.
d. The class finalise their opinion on the text as a
credible source material for the talk show.

HOTS:
Applying
Analysing
Evaluating
Creating

Reading Strategy:
QUACK

21st Century Learning:


ICT
Numbered Heads
Together

e. In groups, students do online research and produce


a power point presentation about credit card scam.

254

HEBAT Bacaan BI
Unit 11
PICTURE 1

255

HEBAT Bacaan BI
Unit 11
TEXT 1
DIFFERENT TYPES OF CREDIT CARD FRAUD
There are many different types of credit card fraud, these vary from where both the card and
criminal are present to where the criminal has acquired a card holders details and is able to
purchase goods fraudulently over the phone or Internet. The Internet and telephone
shopping has proved a breeding ground for credit card fraud . The reason for this is not only
the annonymity that is made possible through not having to go to the shop in person but
through the pressure that retailers have found themselves under to have a quick turnaround
between the time of an order being placed and the time that it arrives at the customers door.
This has been sparked through the Internet providing ever increasing amounts of
competition between retailers for better and quicker services and increase consumer
expectations. However, the contrasting effect of this is that in order to be quick and simple to
use, retailers can easily become sloppy or cut corners when it comes to whether or not the
person paying for the goods is the same person who ordered them. This is of course if it is in
any way possible to actually prove this anyway. For instance, it is very difficult to tell on the
basis of an address, card number and expiry date whether the person using it is genuine at
all. Many companies, especially Internet firms, may not report incidents of fraud because
they do not want to appear vulnerable and put people off shopping at their sites. "The
Confederation of British Industry reports as of 2001 two thirds of UK businesses have
experienced a serious on-line incident such as hacking, virus attacks or credit card fraud".
For these reasons the three forms of credit card fraud counterfeiting, "card not present" and
lost and stolen cards have flourished whilst other older types of fraud (e.g. mail non-receipt)
have
either
decreased
or
almost
ceased
to
exist
at
all.
Counterfeiting
Counterfeiting, in the UK, rose 104% in 2000 to 102.8m and then a further 64% in 2001 up
to 160.3m. A counterfeit card is one that has been scanned, printed, recoded or swiped
without the card issuers permission. Most cases of counterfeiting involve a process known
as skimming or cloning, where legitimate data from the magnetic stripe on a card is
electronically copied on to another one without the knowledge of the rightful card holder.
This is a particularly common problem when it comes to areas of commerce such as
restaurants or bars where the cardholders will likely lose sight of their cards when it is
swiped to pay for their drinks or meals. Here, corrupt waiters and waitresses are then able to
sell on or use the details of the cardholder that they have acquired for fraudulent purposes.
This will involve the creation of a duplicate counterfeited card which can then be signed on
the back by the fraudster and then used as they please. The legitimate cardholder is unlikely
to realise until they next receive information on their balance showing purchases that they
did not make due to them thinking that their card and personal details were safe in their
wallet.
Lost and Stolen Credit Cards
In 2001 thieves stole 114m in the UK in 2001 through the use of lost and stolen credit
cards. Most fraud on lost and stolen credit cards will take place at commercial outlets or
Internet and telephone shops prior to the genuine card holder reporting its loss. Cards are
often stolen during burglaries or pick pocketing in the street and then used almost
instantaneously. Unlike counterfeit or card-not-present forms of fraud the victim will usually
notice fairly quickly enabling the card to be blocked and hopefully limiting the damage.

256

HEBAT Bacaan BI
Unit 11

Card Not Present Fraud and Deceitful Use Of Credit Card Details
In the UK "Card not present" fraud, where information obtained from innocent cardholders is
used to buy goods over the Internet, over the phone or through mail order rose 94% to
56.8m in 2000 and then 59% to 95.7m in 2001. Most recently, a phenomena widespread
across the US has made its way across the Atlantic in to the EU. It is what is known as binraiding or dumpster-diving. This is the process through which peoples rubbish may be
stolen and its contents looked through so as to ascertain the details required to commit
credit card fraud using the unsuspecting bin owners details. "One bin picked through
contained a signed blank cheque. Another contained an unused cheque book, while from a
third bin researchers were able to find an individuals full name, address, date of birth, bank
account number, sort code, employment details and medical information. The same person
had thrown away a whole benefit book, bill and other official letters that might be used to
corroborate identity. For good measure, he had also discarded a completed passport
application giving even more detailed information about his identity". One of the most striking
factors about this form of scam, is that should the fraudster be able to gather enough
information he may be able to even assume the actual identity of his unlucky victim. This
would enable him to take control of their bank account, notifying for instance the bank, of a
change of address so that all correspondence from the bank will go elsewhere thus
maximising the time that the fraudster has to accomplish his task. This form of fraud can
happen through hacking of databases on the Internet to allow fraudsters access to peoples
banking and personal details once again enabling them to assume their identity. Fraudsters
may even fill in the gaps amongst their information by cold calling their victims claiming to be
from the bank or police and use information that they have already gained about them to
sound genuine. "A recent FBI bust nailed 90 on-line fraudsters who had fleeced 56,000 Net
users of over $117 million. Some 2,000 computer users a week complain of identity theft to
the Federal Trade Commission". When the fraudsters have managed to acquire these card
details they will usually purchase goods that they can dispose of quickly on the black market
so
as
to
cover
their
tracks
and
"launder"
the
stolen
money.
Mail Non-Receipt Credit Card Fraud
This form of fraud had its heyday in the early 1990s peaking in 1991 when it cost the British
banking industry 33m alone and represented 20% of total plastic fraud. This represents one
of the success stories for those fighting credit card fraud. Since 1991 the banking industry,
governments and mail delivery services have combined to try to stamp out mail non-receipt
fraud as much as possible. Steps that they have taken involve securing delivery systems,
sending PIN numbers separate from actual cards and drastic punishments including prison
sentences for postal workers found interfering with or stealing items of post. There was
however, a marked rise in this type of fraud during 2001, which, more than anything
represents how criminals will, more often than not, find ways around measures designed to
stop
them.
Applications Fraud
This form of fraud involves using stolen or fake ID such as passports, birth certificates,
driving licences etc to open a fraudulent account with an unsuspecting victims identity.
Criminals can also use information that they have stolen, either through burglaries or the
process of dumpster-diving, enough details that they are able to carry out an identity theft.
This means that they have enough proof of identity that they are able to inform the bank of a
change of address using the stolen documents and steal not just money from an account but
effectively the whole account and control of it. This causes problems not only because a

257

HEBAT Bacaan BI
Unit 11
theft has occurred but even when it is discovered it may take time for the bank to admit that
a mistake has been made. This is due to the fact that as far as they are concerned the
application for an account or change of address have been perfectly legitimate and in some
cases the unfortunate victim may have difficulty convincing them of their own identity. At
present, this is not a hugely common problem, however, banks and law enforcement
agencies expect criminals to begin to switch to the use of application fraud as the
emergence of new PIN and "Smart Card" systems make more popular frauds, such as
counterfeiting,
much
more
difficult.
Other Less Common Types Of Credit Card Fraud
There are other, far less common, types of credit card fraud that are worthy of mention:
Automated Teller Machine (ATM) Fraud
This form of theft usually occurs in three ways. The first is where the cardholder has been
imprudent enough to leave their Personal Identification Number (PIN) with their credit card
and it has been lost or stolen. The thief is then able to go to the nearest cash point, or if the
victim is unlucky enough and the thief brave enough several cash points, to easily take out
as much money as the machine will allow. In this case the problem is solely in the hands of
the police and the cardholder as the banks are under no obligation to refund them. Secondly,
PIN numbers can be obtained by thieves watching someone closely enough whilst they key
in their PIN, in order to then follow them until an appropriate time when the card can be
obtained either through stealth or intimidation (otherwise known as mugging) and then
money withdrawn soon afterwards. This is known as shoulder surfing and in this case the
banks are liable as the cardholder has been robbed through no fault of their own. There are
also cases of both card and PIN number being obtained through a process of intimidation
and series of threats, however thankfully, as it is this case that generally causes the most
danger and trauma for the victim, these cases are very rare. The final example of ATM fraud
involves a process known as card trapping. This involves a device that traps the card inside
the cash point, the thief then approaches the stranded cardholder and gives the impression
of trying to be helpful but is instead tricking the cardholder into re-entering their PIN. When
the cardholder eventually gives up and goes to look for help inside the bank or elsewhere
the thief will then remove the device, re-enter the acquired PIN number and abscond with
the money before the victim reappears. Similarly, there have also been cases where
cardholders have been duped by fake cash machines. These look like ordinary ATMs into
which they have entered their card and their PIN only to find neither the card nor money
come out, so believing their card to be stuck, they leave to find help or ring the card
company. However, on their return they find not only is their card gone but in fact, the entire
ATM seems to have disappeared along with a sizeable sum of money from their account.
Fake Copy-Cat Web Sites
One recent trend in on-line fraud is the emergence of fake copy-cat web sites that take
advantage of consumers that are unfamiliar with the Internet or do not know the exact web
address of the legitimate company that they wish to visit. The consumer, believing that they
are entering their credit details in order to purchase goods from the intended company, are
instead unwittingly entering their details into a fraudsters personal database. He is then able
to make use of this information at a later stage, either for his own purposes or to sell on to
others interested in perpetrating credit card fraud.
http://people.exeter.ac.uk/watupman/undergrad/othomas/different_types_of_credit_ca
rd_f.htm

258

HEBAT Bacaan BI
Unit 11
WORKSHEET 1

Pre-reading: Fill in the required information into the THRILD Form


THRILD FORM
Name: _______________________________

Date: _________________

THRILD to be on : _________________________________________________

T
H

itle
Write down the text title.

ead
Read the opening paragraph (or
introduction) and write a brief
summary of this information.

eadings
Write down all the sub-headings.

llustrations
Write a keyword or phrase about the
main idea of each paragraph.

ast Paragraph
Read and write a brief summary of
the last paragraph or summary of the
text.

iscussion
Scan the discussion or questions and
select 3 that you would like to know
more about.

259

HEBAT Bacaan BI
Unit 11
WORKSHEET 2
Use the CHATT sheet to help you find and remember the important information in your text.

260

HEBAT Bacaan BI
Unit 11
ASSESSMENT PROJECT
Anyone can be a victim of credit scam. Therefore, it is important to educate the public on
how to avoid being scammed. One of the most effective ways of informing the community is
through online videos.
ACTIVITIES

STRATEGIES/
APPROACHES

STEP 1
a. Students state what they know about credit scams.
b. In groups, students explain to each other how to Action Oriented Task
produce a video clip (using mobile phones, digital
cameras, video cameras and other related video
recording gadgets).
c. Teacher explains the assessment project:
In groups, students produce a 3-minute video clip entitled 21st Century Learning:
How to NOT be a Victim of Credit Scam.
Think-Pair-Share

STEP 2
a. Have students consider these questions in their
discussions for the project:
- Who are the victims?
- How do people get scammed?
- Who are the scammers?
- What can people do to avoid being scammed
- What legal action can be taken after being
scammed?
b. Students write a script for their video clip.
c. Students rehearse their acting for the video clip.
d. Students shoot their video clip.
STEP 3
a. Students present their video clips to the class.
b. Students comment on each others' video clip.
c. Teacher announces the best video clip and rewards
the group.

HOTS:
Applying
Creating

21st Century Learning:


ICT

261

You might also like