1 / 19

Identity Abuse on Campus: A Symposium

Identity Abuse on Campus: A Symposium. Elizabeth A. Evans Carolyn M. Kotlas Donna Bailey Abe J. Crystal Terri Buckner. University of North Carolina at Chapel Hill UNC CAUSE 2004. Who are we? What is the Internet Impact group?. The Symposium: A Broad Paintbrush.

malana
Télécharger la présentation

Identity Abuse on Campus: A Symposium

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity Abuse on Campus:A Symposium Elizabeth A. Evans Carolyn M. Kotlas Donna Bailey Abe J. Crystal Terri Buckner University of North Carolina at Chapel Hill UNC CAUSE 2004

  2. Who are we? What is the Internet Impact group?

  3. The Symposium: A Broad Paintbrush • Identity abuse, not theft • Discussion, not talking heads • The BQs* *No, not BBQ!

  4. The Symposium:Logistics • Why identity abuse?

  5. The Symposium:Logistics • Why identity abuse? • Who was involved?

  6. The Symposium:Logistics • Why identity abuse? • Who was involved? • Length: all day!

  7. The Symposium:Logistics • Why identity abuse? • Who was involved? • Length: all day! • Cost

  8. The Symposium:Logistics • Why identity abuse? • Who was involved? • Length: all day! • Cost • Advertising

  9. The Symposium:Logistics • Why identity abuse? • Who was involved? • Length: all day! • Cost • Advertising • Content (details to come)

  10. The Symposium:Logistics • Why identity abuse? • Who was involved? • Length: all day! • Cost • Advertising • Content (details to come) • Outcomes

  11. The Symposium:Content • Setting the context: What is identity?

  12. The Symposium:Content • Setting the context: What is identity? • Point/Counterpoint (Or: Why we couldn’t find a sparring partner)

  13. The Symposium:Content • Setting the context: What is identity? • Point/Counterpoint (Or: Why we couldn’t find a sparring partner) • Scenarios/stories

  14. The Symposium:Content • Setting the context: What is identity? • Point/Counterpoint (Or: Why we couldn’t find a sparring partner) • Scenarios/stories • Identity protection checklist

  15. The Symposium:Content • Setting the context: What is identity? • Point/Counterpoint (Or: Why we couldn’t find a sparring partner) • Scenarios/stories • Identity protection checklist • Personal Information on the Internet

  16. The Symposium:Content • Setting the context: What is identity? • Point/Counterpoint (Or: Why we couldn’t find a sparring partner) • Scenarios/stories • Identity protection checklist • Personal Information on the Internet • Tips and Techniques (the practical)

  17. The Symposium:Content • Setting the context: What is identity? • Point/Counterpoint (Or: Why we couldn’t find a sparring partner) • Scenarios/stories • Identity protection checklist • Personal Information on the Internet • Tips and Techniques (the practical) • Wrap-up

  18. Conclusions • Worth doing? • More needed?

  19. Questions/Comments • Ideas for other topics related to how the Internet is impacting society? • Personal stories of identity abuse? • Example scenarios from your campus? • And, of course, your questions!!!

More Related