- Student Records
Programme & Unit Catalogues

 

School of Management, Unit Catalogue 2009/10


MN30281: Privacy, trust and security in information systems

Click here for further information Credits: 6
Click here for further information Level: Honours
Click here for further information Period: Semester 1
Click here for further information Assessment: CW 100%
Click here for further informationSupplementary Assessment: Like-for-like reassessment (where allowed by programme regulations)
Click here for further information Requisites:
Description: Aims:
The aim of this unit is to examine in-depth current controversies, topics and theories in the area of privacy, trust and security in information systems.

Learning Outcomes:
By the end of the unit the students will have developed an understanding of critical issues with respect to privacy, trust and security in information systems; and will understand key criteria and frameworks for understanding these issues in the context of wider organizational behaviour and applicable theory.

Skills:
This unit will contribute to skills development in the areas of intellectual, professional and transferable skills, including: critical thinking, an awareness of issues in the analysis and understanding of the use of information systems in work settings, capability of applying academic ideas to real-world problems.

Content:
As information systems become more social, and personal, in nature, so almost all recent developments in information technology pose critical privacy, trust and security issues. This unit begins by examining in-depth the nature of privacy and trust, taking a multi-disciplinary look at how each can be defined, measured and the issues in terms of information systems. A series of case studies (e.g. mobile phones, communication, surveillance and the workplace, cyber-crime, tracking of children, e-government, economics of privacy and security) are then used to develop an understanding of the role of privacy, security and trust in the implementation and acceptance of new technology. The regulatory and legal environment (e.g. data protection laws) is then considered, alongside potential methods for organizations to understand the role of privacy in their information systems (e.g. privacy impact assessments).
NB. Programmes and units are subject to change at any time, in accordance with normal University procedures.