{"id":"https://openalex.org/W2035516554","doi":"https://doi.org/10.1145/2095272.2095276","title":"An interdisciplinary approach to address identity theft education","display_name":"An interdisciplinary approach to address identity theft education","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2035516554","doi":"https://doi.org/10.1145/2095272.2095276","mag":"2035516554"},"language":"en","primary_location":{"id":"doi:10.1145/2095272.2095276","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2095272.2095276","pdf_url":null,"source":{"id":"https://openalex.org/S4210183329","display_name":"ACM SIGCAS Computers and Society","issn_l":"0095-2737","issn":["0095-2737","2167-3055"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGCAS Computers and Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001779374","display_name":"Susan Helser","orcid":null},"institutions":[{"id":"https://openalex.org/I38766271","display_name":"Davenport University","ror":"https://ror.org/055e80y87","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I38766271"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"S. Helser","raw_affiliation_strings":["Davenport University, Caro, Illinois","[School of Technology, Davenport University, Caro, United States]"],"affiliations":[{"raw_affiliation_string":"Davenport University, Caro, Illinois","institution_ids":["https://openalex.org/I38766271"]},{"raw_affiliation_string":"[School of Technology, Davenport University, Caro, United States]","institution_ids":["https://openalex.org/I38766271"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5001779374"],"corresponding_institution_ids":["https://openalex.org/I38766271"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.14410016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"41","issue":"2","first_page":"38","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.7325316667556763},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.7179667949676514},{"id":"https://openalex.org/keywords/outreach","display_name":"Outreach","score":0.7015299797058105},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6835072040557861},{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.5949408411979675},{"id":"https://openalex.org/keywords/disadvantage","display_name":"Disadvantage","score":0.5108249187469482},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4598783552646637},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.4576283097267151},{"id":"https://openalex.org/keywords/disadvantaged","display_name":"Disadvantaged","score":0.4565964639186859},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4472874701023102},{"id":"https://openalex.org/keywords/medical-education","display_name":"Medical education","score":0.39153704047203064},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.3791080713272095},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3537028431892395},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3158758878707886},{"id":"https://openalex.org/keywords/pedagogy","display_name":"Pedagogy","score":0.29962748289108276},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2935901880264282},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.2615397572517395},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23449444770812988},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.21943584084510803},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.12229397892951965},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.12133324146270752}],"concepts":[{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.7325316667556763},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.7179667949676514},{"id":"https://openalex.org/C2781400479","wikidata":"https://www.wikidata.org/wiki/Q11640","display_name":"Outreach","level":2,"score":0.7015299797058105},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6835072040557861},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.5949408411979675},{"id":"https://openalex.org/C2777673361","wikidata":"https://www.wikidata.org/wiki/Q5281228","display_name":"Disadvantage","level":2,"score":0.5108249187469482},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4598783552646637},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.4576283097267151},{"id":"https://openalex.org/C2780623907","wikidata":"https://www.wikidata.org/wiki/Q106394435","display_name":"Disadvantaged","level":2,"score":0.4565964639186859},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4472874701023102},{"id":"https://openalex.org/C509550671","wikidata":"https://www.wikidata.org/wiki/Q126945","display_name":"Medical education","level":1,"score":0.39153704047203064},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.3791080713272095},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3537028431892395},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3158758878707886},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.29962748289108276},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2935901880264282},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2615397572517395},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23449444770812988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.21943584084510803},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.12229397892951965},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.12133324146270752},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2095272.2095276","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2095272.2095276","pdf_url":null,"source":{"id":"https://openalex.org/S4210183329","display_name":"ACM SIGCAS Computers and Society","issn_l":"0095-2737","issn":["0095-2737","2167-3055"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGCAS Computers and Society","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W119651952","https://openalex.org/W2016245698","https://openalex.org/W2100115212","https://openalex.org/W2124334240","https://openalex.org/W2168914278"],"related_works":["https://openalex.org/W4241866909","https://openalex.org/W2488601579","https://openalex.org/W1761928473","https://openalex.org/W2066272013","https://openalex.org/W2991148700","https://openalex.org/W2391901998","https://openalex.org/W4241003180","https://openalex.org/W1573839549","https://openalex.org/W2351247954","https://openalex.org/W4232461742"],"abstract_inverted_index":{"An":[0],"earlier":[1],"version":[2],"of":[3,35,75,78,100,106,195,197],"this":[4,36,159],"paper":[5,37],"was":[6],"presented":[7],"at":[8,19,161,207],"the":[9,29,101,104,117,122,126,145,162,182,193,202],"2011":[10,30],"IEEE":[11],"International":[12],"Symposium":[13],"on":[14,53,66,125,167],"Technology":[15],"and":[16,49,147,164],"Society":[17],"(ISTAS)":[18],"Saint":[20],"Xavier":[21],"University":[22],"in":[23,28,47,59,144],"Chicago,":[24],"Illinois":[25],"(and":[26],"printed":[27],"ISTAS":[31],"proceedings).":[32],"The":[33,176],"focus":[34],"is":[38,109,131],"to":[39,43,169,204],"present":[40],"observations":[41],"related":[42,80],"information":[44,149,198],"assurance":[45,150,199],"(IA)":[46],"rural":[48],"urban":[50],"populations.":[51,209],"Based":[52],"our":[54],"experience":[55,102],"teaching":[56],"college":[57],"students":[58,171],"these":[60],"environments,":[61],"we":[62,186],"have":[63,157,165],"noted":[64],"that":[65,88,134,191],"entering":[67],"school,":[68],"generally,":[69],"individuals":[70],"demonstrate":[71],"limited":[72],"background":[73],"knowledge":[74],"a":[76,85,90,129],"variety":[77],"computer":[79,139],"technologies.":[81],"Students":[82],"begin":[83],"with":[84,111],"technical":[86],"disadvantage":[87],"represents":[89],"readily":[91],"exploitable":[92],"attack":[93],"vector":[94],"for":[95,116],"identity":[96,107,173],"thieves":[97],".":[98,175],"Because":[99],"deficit,":[103],"hazard":[105],"theft":[108,174],"significant":[110],"possible":[112],"severe":[113],"detrimental":[114],"outcomes":[115],"student":[118],"victim.":[119],"In":[120,184],"addition,":[121,185],"negative":[123],"impact":[124],"society":[127],"as":[128],"whole":[130],"substantial.":[132],"Methods":[133],"reach":[135],"beyond":[136,201],"traditional":[137],"formal":[138],"or":[140],"network":[141],"security":[142],"instruction":[143],"classroom":[146],"extend":[148,192],"education":[151,200],"across":[152],"disciplines":[153],"are":[154],"needed.":[155],"We":[156],"explored":[158],"direction":[160],"university":[163,203],"worked":[166],"strategies":[168],"educate":[170],"about":[172],"interdisciplinary":[177],"programs":[178,190],"outlined":[179],"here":[180],"span":[181],"curriculum.":[183],"suggest":[187],"community":[188],"outreach":[189],"scope":[194],"influence":[196],"include":[205],"surrounding":[206],"risk":[208]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
