skip to main content
research-article

An interdisciplinary approach to address identity theft education

Published:01 December 2011Publication History
Skip Abstract Section

Abstract

An earlier version of this paper was presented at the 2011 IEEE International Symposium on Technology and Society (ISTAS) at Saint Xavier University in Chicago, Illinois (and printed in the 2011 ISTAS proceedings).

The focus of this paper is to present observations related to information assurance (IA) in rural and urban populations. Based on our experience teaching college students in these environments, we have noted that on entering school, generally, individuals demonstrate limited background knowledge of a variety of computer related technologies. Students begin with a technical disadvantage that represents a readily exploitable attack vector for identity thieves. Because of the experience deficit, the hazard of identity theft is significant with possible severe detrimental outcomes for the student victim. In addition, the negative impact on the society as a whole is substantial. Methods that reach beyond traditional formal computer or network security instruction in the classroom and extend information assurance education across disciplines are needed. We have explored this direction at the university and have worked on strategies to educate students about identity theft. The interdisciplinary programs outlined here span the curriculum. In addition, we suggest community outreach programs that extend the scope of influence of information assurance education beyond the university to include surrounding at risk populations.

References

  1. S. Helser, D. McKernan, "Approaching identity theft in education from an interdisciplinary perspective", Proceedings of the 14 th Colloquium for Information Security Education (CISSE '10), pp. 71--75 (2010).Google ScholarGoogle Scholar
  2. Information Security and Assurance Center (ISAAC) http://sot.davenport.edu/isaac/Google ScholarGoogle Scholar
  3. National Centers of Academic Excellence, http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtmlGoogle ScholarGoogle Scholar
  4. R. Mercuri, "Scoping identity theft", Communications of the ACM. Volume 49, Issue 5, May 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. U. S. Sentencing Commission, Policy Papers December 15, 1999, Identity theft: Final ReportGoogle ScholarGoogle Scholar
  6. W. Wang. Y. Yuan. N. Archer, "A contextual framework for combating identity theft". IEEE, 1544-7993/06, 2006Google ScholarGoogle Scholar
  7. A. Jøsang, J. Fabre, B. Hay, J. Dalziel, S. Pope, "Trust requirements in identity management", Australian Information Security Workshop, 2005 (AISW 2005), Newcastle, Australia Conferences in Research and Practice in Information Technology, Vol. 44. Paul Montague and Rei Safavi-Naini, Eds., Australian Computer Society, Inc., 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. E. Potter, Postmaster General and CEO United States Postal Service. (2008). February letter to postal customers warning of identity theftGoogle ScholarGoogle Scholar
  9. L. Sweeney, "Protecting job seekers from identity theft", IEEE March/April 2006, 1089-7801/06Google ScholarGoogle Scholar
  10. S. Schmidt, M. McCoy, "The Silent Crime What you Need to Know About Identity Theft", Twin Lakes Press, 2008Google ScholarGoogle Scholar
  11. S. Schmidt, M. McCoy, "Who Is You? The Coming Epidemic of Identity Theft", The Consortium, 2005Google ScholarGoogle Scholar
  12. M. Chouchane, "Injecting information security in core cs courses: Methods, Challenges and Impact", Proceedings of the 13 th Colloquium for Information Security Education (CISSE '09), pp. 38--43 (2009).Google ScholarGoogle Scholar
  13. W. Conkling, G. Trawick, J. A. Hamilton, "Engaging students through information assurance exercise", Proceedings of the 13 th Colloquium for Information Security Education (CISSE '09), pp. 51--58 (2009).Google ScholarGoogle Scholar
  14. H. Schneider, L. Wagner, "Information assurance awareness: partnership between students and community", Proceedings of the 13 th Colloquium for Information Security Education (CISSE '09), pp. 71--75 (2009).Google ScholarGoogle Scholar
  15. US Census 2010, http://2010.census.gov/2010census/Google ScholarGoogle Scholar
  16. J. Metzger, N. Seshadri, "Protecting PII (Personally Identifiable Information): what data is at risk and why", Sophos Webinar, 09/23/2009Google ScholarGoogle Scholar
  17. A. William, Digital Nation: Toward an Inclusive Information Society, Cambridge, Massachusetts: Massachusetts Institute of Technology Press, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Anti-Phishing Working Group, "Phishing activity trends report for 1st quarter 2010", http://www.antiphishing.org/reports/apwg_web_vulnerabilities_survey_june_2011.pdfGoogle ScholarGoogle Scholar
  19. Federal Trade Commission -- 2006 "Identity theft survey report" http://www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdfGoogle ScholarGoogle Scholar
  20. R. McMillan, "17 Arrested in Canadian hacking bust, PC World Communications, Inc.", Thursday, February 21, 2008, http://news.yahoo.com/s/pcworld/142711&printer=1Google ScholarGoogle Scholar

Index Terms

  1. An interdisciplinary approach to address identity theft education

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader