Identity Abuse on Campus: A Symposium Elizabeth A. Evans Carolyn M. Kotlas Donna Bailey Abe J. Crystal Terri Buckner University of North Carolina at Chapel.

Slides:



Advertisements
Similar presentations
How to write an effective job description
Advertisements

Magazine Journalism Welcome back to JO-203. Outline Take attendance Review of last week Review Reading Generating story ideas Coming up with ideas for.
OLS-North Conference 2012 Project Planning September 26, 2012 A mission with Nancy Recollet.
Campus Based Tuition Increase Proposal for FY Robert N. Shelton Executive Vice Chancellor and Provost The University of North Carolina at Chapel.
TRUST, WISE 2010 Hacking the Law for Researchers Chris Hoofnagle UC Berkeley Law For WISE 2010.
Title of Training Presentation Presented by Your Name.
Presented by Your Name Title of Training Presentation.
Social Media Strategy With a few comments on blogging.
5/15/ DESIGN TECHNOLOGY - GRAPHICS MARKETING PRODUCT DESIGN FASHION CLOTHING Refer to the evaluation rubric before you start this unit to find out.
Unit 1 By Oscar Ramsden. Contents This power point will be about the social impact of ICT on society, this power point will be on the subjects below on.
Accessibility for TAFE teachers & resource developers -- a case study OZeWAI 6 December 2007 Evan Bailey, R/Manager, Learning Technology Standards.
Title of Training Presentation Presented by Your Name.
Why I Use Facebook. (And why you should, too.) Elizabeth A. Evans UNC-Chapel Hill ITS Teaching and Learning December 2007.
Exercise Exercise3.1 8 Exercise3.1 9 Exercise
Exercise Exercise Exercise Exercise
Why I Use Facebook. (Maybe you should, too.) Elizabeth A. Evans UNC-Chapel Hill ITS Teaching and Learning December 2007.
Exercise Exercise Exercise Exercise
Enrollment Management and Planning Robert N. Shelton Executive Associate Provost The University of North Carolina at Chapel Hill February 24, 2006.
Exercise Exercise6.1 7 Exercise6.1 8 Exercise6.1 9.
CALIFORNIA EARTHQUAKE EXERCISE OCTOBER 21, 2010 Walter Hays, Global Alliance for Disaster Reduction, University of North Carolina, USA.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
Incorporating Digital Library Resources into a University Course Management System Jacqueline Solis Ellen M. Hampton University of North Carolina at Chapel.
San Antonio – 2001 Chapter Chairs Workshop Ideas for Effective Chapter Meetings & Activities.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
New Media for the Networked NGO Agenda and Networking Exercise Facilitator: Beth Kanter E-Mediat is funded by the Middle East Partnership Initiative of.
CHAMPAGNE INFORMATION LITERACY WORKSHOPS ON A BEER BUDGET ALEXANDER CARROLL KELSEY CORLETT-RIVERA LINDA MACRI.
What are your kids doing online?
Copyright 2008, Elizabeth A. Evans. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Title of Training Presentation Presented by Your Name.
Autumn 2010e-Learning & Information Management ICT Subject Leaders’ Update Autumn Term 2010.
Security and Privacy Concerns Izzat Alsmadi, Assistant Research Professor, BSU.
Teaching the Model for Improvement
Welcome to our presentation. Brief 18 – 24 year olds To achieve this through one of the Unilever sustainable living platforms.
: OBJECTIVE: Explain how to find job openings.  There are always jobs out there  Whether you can find them depends on your methods of job-hunting Two.
North Carolina University The University of North Carolina at Chapel Hill Office of Admission Chapel Hill, NC four-digit Campus box number.
NASCAR PROJECT Presentation Layout. Slide 1 – Company Selection  Name of Company  What they produce/make/sell  Brief History  What types of Advertising.
Social Data is the New Oil Andreas Weigend, PhD Stanford University Social Data Lab Data Lab.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Standard Three Students will identify and develop sponsorship offerings for a sports marketing event.
PRESENTATION TITLE PRESENTER NAME Presenter title, organization © 2015 Internet2 Subtitle (if any)
E-Marketing Communication Tools Instructor: Hanniya Abid Assistant Professor COMSATS Institute of Information Technology Lecture 20 E-Marketing.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Comparing organisations. Notices... This is the final week we will be working on this report In order for me to give you clear feedback I need fully completed.
Creative Product Promotion Introduction to Promotion Methods.
2 United States Department of Education, Privacy Technical Assistance Center 1 Western Suffolk BOCES Data Breach Exercise.
A.R.T.I.S.T. This power point presentation is for educational purposes. It may contain copyrighted material. Please do not post, redistribute or copy without.
[Name of Presenter] [Details of patient e.g. initials, hospital number etc.] [Date of meeting]
Through The Maze A guide to developing advocacy for young people experiencing emotional or mental health issues.
Best Content Writing Services
ALL ABOUT THE FTC By: Brandon Baldwin.
Getting Fit with SGJFITNESS
EXECUTIVE BRIEFING Presentation for: Dr. & Mrs. John Baxter.
Trails Carolina
Therapy Programs Provider: Trails Carolina
Trails Carolina: Social Media Profiles
بسم الله الرحمن الرحيم.
What is the Injury-Free NC Academy?
مدل زنجیره ای در برنامه های سلامت
كار همراه با آسودگي و امنيت
Presentation & Pitching Tips
Put Subtitle here if applicable
The Big 6 Research Model Step 3: Location and Access
Geospatial Thinking Activity Step 1: Watch the Video
The Nuts and Bolts of National Board Certification

Fall 2018, COMP 562 Poster Session
ADventures in ADvertising
The social impact of ICT on society
Chair, North Eastern ICT Partnership Head of IT, Durham County Council
Put Subtitle here if applicable
Presentation transcript:

Identity Abuse on Campus: A Symposium Elizabeth A. Evans Carolyn M. Kotlas Donna Bailey Abe J. Crystal Terri Buckner University of North Carolina at Chapel HillACM SIGUCCS 2004

Who are we? What is the Internet Impact group?

The Symposium: A Broad Paintbrush Identity abuse, not theft Discussion, not talking heads The Big Questions

The Symposium: Logistics Why identity abuse?

The Symposium: Logistics Why identity abuse? Who was involved?

The Symposium: Logistics Why identity abuse? Who was involved? Length: all day!

The Symposium: Logistics Why identity abuse? Who was involved? Length: all day! Cost

The Symposium: Logistics Why identity abuse? Who was involved? Length: all day! Cost Advertising

The Symposium: Logistics Why identity abuse? Who was involved? Length: all day! Cost Advertising Content in brief

The Symposium: Logistics Why identity abuse? Who was involved? Length: all day! Cost Advertising Content in brief Outcomes

The Symposium: Content in Brief Setting the context: What is identity?

The Symposium: Content in Brief Setting the context: What is identity? Point/Counterpoint

The Symposium: Content in Brief Setting the context: What is identity? Point/Counterpoint Scenarios/stories

The Symposium: Content in Brief Setting the context: What is identity? Point/Counterpoint Scenarios/stories Identity protection checklist

The Symposium: Content in Brief Setting the context: What is identity? Point/Counterpoint Scenarios/stories Identity protection checklist Personal Information on the Internet

The Symposium: Content in Brief Setting the context: What is identity? Point/Counterpoint Scenarios/stories Identity protection checklist Personal Information on the Internet Tips and Techniques (the practical)

The Symposium: Content in Brief Setting the context: What is identity? Point/Counterpoint Scenarios/stories Identity protection checklist Personal Information on the Internet Tips and Techniques (the practical) Wrap-up

Small Group Exercise #1 Marketing Plan Sponsorship

Small Group Exercise #2 Scenarios Checklist

Break

Summaries and Discussion: Small Group Exercises Marketing Plan Sponsorship Scenarios Checklist

Large Group Discussion: Identity Investigation on the Internet For free For fee

Wrap-Up Comments? Questions?