Content, progress and pedagogy of the
module
The course gives the participants theoretical knowledge with
privacy and data protection and different methods and theories to
use for analysis. Methods for mitigation includes a combination of
technological solutions, laws and regulations, and user adapted
behavior (Kahneman’s theory). Ethical perspectives of the
data processing are discussed and can be used to set a sort of risk
level to how the data processes are handled.
Learning objectives
Knowledge
- Must have knowledge about basic concepts about data protection
and privacy
- Must have knowledge about Privacy as a concept and how it can
change with the focus of technical, organisation, user and
ethical
- Must have knowledge about legal problems and measures to
prevent and diminish problems within: Personal data and other
related information on privacy; intellectual property rights;
protecting business secrets; net and information security and
criminal cyberattacks
- Must have knowledge about Data protection and ethical
perspectives of data protection
- Must have knowledge about Privacy theories and models
- Must have knowledge about the concept of privacy engineering
and its different perspectives and areas of expertise
- Must have knowledge about examples of systems and emerging
technologies and how they challenge privacy and data
protection
Skills
- Must have the ability to consider privacy issues in IT
systems
- Must have the ability to identify data protection acts in a
selected IT-System and discuss what the impacts are on the
system
- Must have the ability to do a data risk analysis of selected
emerging technologies
- Must have the ability to see data protection and privacy from
an ethical angle
Competences
- Must have competencies to identify privacy challenges on an IT
system analysing Data protection regulations, GDPR, NIST and other
which are relevant for enterprises and organisations
- Must have competencies to apply privacy theories and data
protection to a specific system or technology
- Must have competencies to apply ethical criteria to privacy and
data protection to provide a more diverse understanding these and
what they mean
Type of instruction
Types of instruction are listed at the start of §17; Structure
and contents of the programme.
Exam
Exams
Name of exam | Data Protection and Privacy |
Type of exam | Written or oral exam |
ECTS | 5 |
Assessment | 7-point grading scale |
Type of grading | Internal examination |
Criteria of assessment | The criteria of assessment are stated in the Examination
Policies and Procedures |