The Internet and the Social Sciences Working Group
Odum Institute for Research in Social Science
The University of North Carolina at Chapel Hill

2004 Internet Impact Symposium: Identity Abuse in the Campus Environment

Presentations | Supplementary Readings and Resources | Symposium Handouts


Identity Investigation on the Internet -- Carolyn Kotlas, Information Technology Services Center for Instructional Technology

Tips and Techniques: How to Protect Yourself and Others Better -- Jeanne Smythe, Director of Computing Policy

Supplementary Readings and Resources

Di Pietro, Roberto, and Luigi V. Mancini. "Security and Privacy Issues of Handheld and Wearable Wireless Devices." Communications of the ACM 46, no. 9 (September 2003): 75-9.

EDUCAUSE. "Ongoing and Emerging Campus Issues: Identity Theft."

Essex, David E. "A Matter of Public Record." PM Network (August 2003): 22-6

Foster, Andrea L. "New York U. Reports Another Lapse in Web Security." The Chronicle of Higher Education 50, issue 24 (February 20, 2004): A29. Subscriber online access:

Goldberg, Laurence. "Creating Safer and More Efficient Schools with Biometric Technologies." T.H.E. Journal (September 2003): 16, 18-19.

Goldman, Elizabeth. "The Growing Threat of Identity Theft." EDUCAUSE Review 39, no. 4 (July/August 2004): 66-7.

Hitchcock, Jayne A. "Don't Become an Online Victim." 2003.

"Identity Theft and Your Social Security Number." Leaflet published by Social Security Administration. February 2004.

Identity Theft Resource Center. "Workplace ID Theft." February 15, 2004.

Javelin Strategy & Research. "Identity Fraud Safety Quiz." 2005.

Kane, Dan. "ID Thieves May Find Gold in State's Old Computers." The (Raleigh) News & Observer (February 19, 2004): A1.

Munro, Neil. "The Ever-Expanding Network of Local and Federal Databases." Communications of the ACM 45, no. 7 (July 2002): 17-19.

Neumann, Peter G. "Information System Security Redux." Communications of the ACM 46, no. 10 (October 2003): 136.

Neumann, Peter G. "Risks in Trusting Untrustworthiness." Communications of the ACM 46, no. 9 (September 2003): 120.

Noguchi, Yuki. "Online Search Engines Help Lift Cover of Privacy." Washington Post (February 9, 2004): A01.

Radcliff, Deborah. "Wanted: Your Good Name." Better Homes & Gardens (March 2004): 168, 170-2.

Rubenking, Janet. "Identity Theft: What, Me Worry?" PC Magazine, March 2, 2004.

Solove, Daniel J. "Information-Age Privacy Concerns Are More Kafkaesque Than Orwellian." The Chronicle of Higher Education 51, issue 16 (December 10, 2004): B6-B8. Subscriber online access:

Starr, Sandy. "The Naked Crowd." sp!ked (January 14, 2004).

Test Your "Identity Quotient"

Weigl, Andrea. "Internet Scams are Stinging." The (Raleigh) News & Observer (February 5, 2004): B2.

Symposium Handouts

Symposium Flyer

Symposium Agenda

Identity Protection Checklist

Discussion Scenarios

Sponsored by
Our sponsor: Odum Institute for Research in Social Science
The University
of North Carolina
at Chapel Hill