Seminar: Information Security and Information Privacy Assessment - Demands, Challenges and Opportunities
Basic Information
Type of Lecture: | Seminar |
---|---|
Course: | Bachelor |
Hours/Week: | 2 |
Credit Points: | 8 |
Language: | English |
Term: | Summer 2016 |
Lecturers: |
|
Email: |
Content of the Course
Description:
In the digital world, people rely on the technologies and systems to handle daily transactions, store and process different kinds of information, including important documents or personal data, which should be protected. In this seminar, the students will be working individually or in groups in order to provide an understanding and perform studies related to security assessment or privacy protection. The study methods will range from literature reviews on certain topics, empirical studies with users, including questionnaires, and perform data analysis to generate meaningful results. The studies will combine results from technological foundations of Privacyrespecting technologies to the real world, such as online shopping, forums, etc. Bachelor seminar registration and withdrawal takes place electronically via QIS on a first comefirst served principle within the period 11th to 22th of April 2016. http://www.wiwi.unifrankfurt.de/fileadmin/user_upload/dateien_pruefungsamt/Aushaenge/20161_BSc_Fristen_dt.pdf For the organizational matters please refer to the information on the seminar posted on the QIS.
Language of instruction will be English.
Language of instruction will be English.
Registration:
Maximum participants:
20
Exam
Information:
The exam will consist of the questions from the references given below:
-
-
-
-
- Stuart MacDonald & Nicola Headlam, CLES. Research Methods Handbook - Introductory guide to research methods for social research. Download: http://www.cles.org.uk/wpcontent/uploads/2011/01/Research-Methods-Handbook.pdf
- H. Jeff Smith, Tamara Dinev, and Heng Xu. 2011. Information privacy research: an interdisciplinary review. MIS Q. 35, 4 (December 2011), 989-1016. Download: http://pal.ist.psu.edu/MISQ.pdf
- Mark S. Ackerman, Lorrie Faith Cranor, and Joseph Reagle. 1999. Privacy in e-commerce: examining user scenarios and privacy preferences. In Proceedings of the 1st ACM conference on Electronic commerce (EC '99). ACM, New York, NY, USA, 1-8. DOI=http://dx.doi.org/10.1145/336992.336995. Download: https://web.eecs.umich.edu/~ackerm/pub/99b28/ecommerce.final.pdf
- Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. 2014. Concepts and languages for privacy-preserving attribute-based authentication. J. Inf. Secur. Appl. 19, 1 (February 2014), 25-44. DOI=http://dx.doi.org/10.1016/j.jisa.2014.03.004. Download: http://www.sciencedirect.com/science/article/pii/S2214212614000167
-
-
-