As the pursuit of privacy protection increasingly requires knowhow in digital technologies, this module provides students with an understanding of the technical elements required for auditing a technological system, ensuring anonymity, protecting stored data, and cryptographical operations such as encryption and re-identification. Looking ahead to the next module on impacts, this module includes material on how societal impact can be accounted for in the very design of technological systems.
– Technological audit: software, hardware and networks
– Threat detection and modelling
– Cryptography, anonymity and re-identification
– Secure storage and authentication management
– Translating societal concerns into technological solutions
Martino, J.P. (1994) A technology audit: key to technology planning. Proceedings of the 1994 National Aerospace and Electronics Conference, vol.2: 1241 – 1247.
Larsson, S. and Svensson, M. (2010) Compliance or Obscurity? Online Anonymity as a Consequence of Fighting Unauthorised File-sharing. Policy & Internet 2(4): 77-105.
Schermer B.W. (2011) The limits of privacy in automated profiling and data mining. Computer Law & Security Review 27(1)
Hart, J. (2013) Why the traditional approach to information security is no longer working. Network Security 2013(1): 12-14.
BACK TO MODULES