E. Evans, Carolyn M. Kotlas, D. Bailey, A. Crystal, Terri Buckner
{"title":"It's eleven o'clock: do you know where your identity is?","authors":"E. Evans, Carolyn M. Kotlas, D. Bailey, A. Crystal, Terri Buckner","doi":"10.1145/1027802.1027888","DOIUrl":null,"url":null,"abstract":"Identity theft continues to be a growing problem in our society. This paper describes a poster session that will give attendees the opportunity to consider identity issues related to campus life and how we might better educate our campus communities. We will describe what identity means, ways in which it might be abused in our campus environments, and how to balance risks and benefits. We will also provide tips on how faculty, staff, and students can better protect themselves and others. All attendees will be asked to complete an anonymous checklist to gauge how well we, as computer support professionals, protect our identities. The poster content is based on a symposium held in February 2004 on the UNC Chapel Hill campus.","PeriodicalId":163159,"journal":{"name":"Proceedings of the 32nd annual ACM SIGUCCS conference on User services","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 32nd annual ACM SIGUCCS conference on User services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1027802.1027888","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Identity theft continues to be a growing problem in our society. This paper describes a poster session that will give attendees the opportunity to consider identity issues related to campus life and how we might better educate our campus communities. We will describe what identity means, ways in which it might be abused in our campus environments, and how to balance risks and benefits. We will also provide tips on how faculty, staff, and students can better protect themselves and others. All attendees will be asked to complete an anonymous checklist to gauge how well we, as computer support professionals, protect our identities. The poster content is based on a symposium held in February 2004 on the UNC Chapel Hill campus.