Abstract
An earlier version of this paper was presented at the 2011 IEEE International Symposium on Technology and Society (ISTAS) at Saint Xavier University in Chicago, Illinois (and printed in the 2011 ISTAS proceedings).
The focus of this paper is to present observations related to information assurance (IA) in rural and urban populations. Based on our experience teaching college students in these environments, we have noted that on entering school, generally, individuals demonstrate limited background knowledge of a variety of computer related technologies. Students begin with a technical disadvantage that represents a readily exploitable attack vector for identity thieves. Because of the experience deficit, the hazard of identity theft is significant with possible severe detrimental outcomes for the student victim. In addition, the negative impact on the society as a whole is substantial. Methods that reach beyond traditional formal computer or network security instruction in the classroom and extend information assurance education across disciplines are needed. We have explored this direction at the university and have worked on strategies to educate students about identity theft. The interdisciplinary programs outlined here span the curriculum. In addition, we suggest community outreach programs that extend the scope of influence of information assurance education beyond the university to include surrounding at risk populations.
- S. Helser, D. McKernan, "Approaching identity theft in education from an interdisciplinary perspective", Proceedings of the 14 th Colloquium for Information Security Education (CISSE '10), pp. 71--75 (2010).Google Scholar
- Information Security and Assurance Center (ISAAC) http://sot.davenport.edu/isaac/Google Scholar
- National Centers of Academic Excellence, http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtmlGoogle Scholar
- R. Mercuri, "Scoping identity theft", Communications of the ACM. Volume 49, Issue 5, May 2006 Google ScholarDigital Library
- U. S. Sentencing Commission, Policy Papers December 15, 1999, Identity theft: Final ReportGoogle Scholar
- W. Wang. Y. Yuan. N. Archer, "A contextual framework for combating identity theft". IEEE, 1544-7993/06, 2006Google Scholar
- A. Jøsang, J. Fabre, B. Hay, J. Dalziel, S. Pope, "Trust requirements in identity management", Australian Information Security Workshop, 2005 (AISW 2005), Newcastle, Australia Conferences in Research and Practice in Information Technology, Vol. 44. Paul Montague and Rei Safavi-Naini, Eds., Australian Computer Society, Inc., 2005. Google ScholarDigital Library
- J. E. Potter, Postmaster General and CEO United States Postal Service. (2008). February letter to postal customers warning of identity theftGoogle Scholar
- L. Sweeney, "Protecting job seekers from identity theft", IEEE March/April 2006, 1089-7801/06Google Scholar
- S. Schmidt, M. McCoy, "The Silent Crime What you Need to Know About Identity Theft", Twin Lakes Press, 2008Google Scholar
- S. Schmidt, M. McCoy, "Who Is You? The Coming Epidemic of Identity Theft", The Consortium, 2005Google Scholar
- M. Chouchane, "Injecting information security in core cs courses: Methods, Challenges and Impact", Proceedings of the 13 th Colloquium for Information Security Education (CISSE '09), pp. 38--43 (2009).Google Scholar
- W. Conkling, G. Trawick, J. A. Hamilton, "Engaging students through information assurance exercise", Proceedings of the 13 th Colloquium for Information Security Education (CISSE '09), pp. 51--58 (2009).Google Scholar
- H. Schneider, L. Wagner, "Information assurance awareness: partnership between students and community", Proceedings of the 13 th Colloquium for Information Security Education (CISSE '09), pp. 71--75 (2009).Google Scholar
- US Census 2010, http://2010.census.gov/2010census/Google Scholar
- J. Metzger, N. Seshadri, "Protecting PII (Personally Identifiable Information): what data is at risk and why", Sophos Webinar, 09/23/2009Google Scholar
- A. William, Digital Nation: Toward an Inclusive Information Society, Cambridge, Massachusetts: Massachusetts Institute of Technology Press, 2004 Google ScholarDigital Library
- Anti-Phishing Working Group, "Phishing activity trends report for 1st quarter 2010", http://www.antiphishing.org/reports/apwg_web_vulnerabilities_survey_june_2011.pdfGoogle Scholar
- Federal Trade Commission -- 2006 "Identity theft survey report" http://www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdfGoogle Scholar
- R. McMillan, "17 Arrested in Canadian hacking bust, PC World Communications, Inc.", Thursday, February 21, 2008, http://news.yahoo.com/s/pcworld/142711&printer=1Google Scholar
Index Terms
- An interdisciplinary approach to address identity theft education
Recommendations
Computer Science at the Interdisciplinary/Interprofessional Education Crossroad: Informatics at Texas Woman's University (Abstract Only)
SIGCSE '18: Proceedings of the 49th ACM Technical Symposium on Computer Science EducationIt is projected that over 51% of all STEM jobs will be in CS-related fields by 2018 (Georgetown University Center on Education and the Workforce Report). CS4All is the initiative to "empower a generation of American students with the computer science ...
Building information assurance education partnerships with minority institutions
TAPIA '09: The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and InnovationsThis paper describes our successful leveraging of the National Security Agency/Department of Homeland Security Center of Academic Excellence in Information Assurance program and Auburn University's highly successful partnership with three (Historically ...
Protecting Job Seekers from Identity Theft
In search of a job after graduating from college, Meg Kemp posts her resume online. Norton Steuben, a retired law professor, hasn't looked for employment in more than 35 years and rarely uses the Internet, yet his law school maintains his curriculum ...
Comments