{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:06Z","timestamp":1750307166075,"version":"3.41.0"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCAS Comput. Soc."],"published-print":{"date-parts":[[2011,12]]},"abstract":"<jats:p>An earlier version of this paper was presented at the 2011 IEEE International Symposium on Technology and Society (ISTAS) at Saint Xavier University in Chicago, Illinois (and printed in the 2011 ISTAS proceedings).<\/jats:p>\n          <jats:p>\n            The focus of this paper is to present observations related to information assurance (IA) in rural and urban populations. Based on our experience teaching college students in these environments, we have noted that on entering school, generally, individuals demonstrate limited background knowledge of a variety of computer related technologies. Students begin with a technical disadvantage that represents a readily exploitable attack vector for\n            <jats:italic>identity thieves<\/jats:italic>\n            . Because of the experience deficit, the hazard of\n            <jats:italic>identity theft<\/jats:italic>\n            is significant with possible severe detrimental outcomes for the student victim. In addition, the negative impact on the society as a whole is substantial. Methods that reach beyond traditional formal computer or network security instruction in the classroom and extend information assurance education across disciplines are needed. We have explored this direction at the university and have worked on strategies to educate students about\n            <jats:italic>identity theft<\/jats:italic>\n            . The interdisciplinary programs outlined here span the curriculum. In addition, we suggest community outreach programs that extend the scope of influence of information assurance education beyond the university to include surrounding at risk populations.\n          <\/jats:p>","DOI":"10.1145\/2095272.2095276","type":"journal-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:21:44Z","timestamp":1326820904000},"page":"38-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An interdisciplinary approach to address identity theft education"],"prefix":"10.1145","volume":"41","author":[{"given":"S.","family":"Helser","sequence":"first","affiliation":[{"name":"Davenport University, Caro, Illinois"}]}],"member":"320","published-online":{"date-parts":[[2011,12]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"71","volume-title":"Proceedings of the 14  th  Colloquium for Information Security Education (CISSE '10)","author":"Helser S.","year":"2010"},{"key":"e_1_2_1_2_1","unstructured":"Information Security and Assurance Center (ISAAC) http:\/\/sot.davenport.edu\/isaac\/  Information Security and Assurance Center (ISAAC) http:\/\/sot.davenport.edu\/isaac\/"},{"key":"e_1_2_1_3_1","unstructured":"National Centers of Academic Excellence http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml  National Centers of Academic Excellence http:\/\/www.nsa.gov\/ia\/academic_outreach\/nat_cae\/index.shtml"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125944.1125961"},{"key":"e_1_2_1_5_1","unstructured":"U. S. Sentencing Commission Policy Papers December 15 1999 Identity theft: Final Report  U. S. Sentencing Commission Policy Papers December 15 1999 Identity theft: Final Report"},{"key":"e_1_2_1_6_1","first-page":"06","volume":"1544","author":"Wang W.","year":"2006","journal-title":"IEEE"},{"key":"e_1_2_1_7_1","volume-title":"Australian Information Security Workshop, 2005 (AISW 2005), Newcastle, Australia Conferences in Research and Practice in Information Technology","volume":"44","author":"J\u00f8sang A.","year":"2005"},{"key":"e_1_2_1_8_1","unstructured":"J. E. Potter Postmaster General and CEO United States Postal Service. (2008). February letter to postal customers warning of identity theft  J. E. Potter Postmaster General and CEO United States Postal Service. (2008). February letter to postal customers warning of identity theft"},{"key":"e_1_2_1_9_1","first-page":"1089","author":"Sweeney L.","year":"2006","journal-title":"IEEE"},{"key":"e_1_2_1_10_1","unstructured":"S. Schmidt M. McCoy \"The Silent Crime What you Need to Know About Identity Theft\" Twin Lakes Press 2008  S. Schmidt M. McCoy \"The Silent Crime What you Need to Know About Identity Theft\" Twin Lakes Press 2008"},{"key":"e_1_2_1_11_1","unstructured":"S. Schmidt M. McCoy \"Who Is You? The Coming Epidemic of Identity Theft\" The Consortium 2005  S. Schmidt M. McCoy \"Who Is You? The Coming Epidemic of Identity Theft\" The Consortium 2005"},{"key":"e_1_2_1_12_1","first-page":"38","volume-title":"Proceedings of the 13  th  Colloquium for Information Security Education (CISSE '09)","author":"Chouchane M.","year":"2009"},{"key":"e_1_2_1_13_1","first-page":"51","volume-title":"Proceedings of the 13  th  Colloquium for Information Security Education (CISSE '09)","author":"Conkling W.","year":"2009"},{"key":"e_1_2_1_14_1","first-page":"71","volume-title":"Proceedings of the 13  th  Colloquium for Information Security Education (CISSE '09)","author":"Schneider H.","year":"2009"},{"key":"e_1_2_1_15_1","unstructured":"US Census 2010 http:\/\/2010.census.gov\/2010census\/  US Census 2010 http:\/\/2010.census.gov\/2010census\/"},{"key":"e_1_2_1_16_1","unstructured":"J. Metzger N. Seshadri \"Protecting PII (Personally Identifiable Information): what data is at risk and why\" Sophos Webinar 09\/23\/2009  J. Metzger N. Seshadri \"Protecting PII (Personally Identifiable Information): what data is at risk and why\" Sophos Webinar 09\/23\/2009"},{"volume-title":"Massachusetts: Massachusetts Institute of Technology Press","year":"2004","author":"William A.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","unstructured":"Anti-Phishing Working Group \"Phishing activity trends report for 1st quarter 2010\" http:\/\/www.antiphishing.org\/reports\/apwg_web_vulnerabilities_survey_june_2011.pdf  Anti-Phishing Working Group \"Phishing activity trends report for 1 st quarter 2010\" http:\/\/www.antiphishing.org\/reports\/apwg_web_vulnerabilities_survey_june_2011.pdf"},{"key":"e_1_2_1_19_1","unstructured":"Federal Trade Commission -- 2006 \"Identity theft survey report\" http:\/\/www.ftc.gov\/os\/2007\/11\/SynovateFinalReportIDTheft2006.pdf  Federal Trade Commission -- 2006 \"Identity theft survey report\" http:\/\/www.ftc.gov\/os\/2007\/11\/SynovateFinalReportIDTheft2006.pdf"},{"volume-title":"Thursday","year":"2008","author":"McMillan R.","key":"e_1_2_1_20_1"}],"container-title":["ACM SIGCAS Computers and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2095272.2095276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2095272.2095276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:39Z","timestamp":1750240479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2095272.2095276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["10.1145\/2095272.2095276"],"URL":"https:\/\/doi.org\/10.1145\/2095272.2095276","relation":{},"ISSN":["0095-2737"],"issn-type":[{"type":"print","value":"0095-2737"}],"subject":[],"published":{"date-parts":[[2011,12]]},"assertion":[{"value":"2011-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}