Short Description

The legal, ethical, and security issues concerning data, including aggregated data. Proactive compliance with rules and, in their absence, principles for the responsible management of sensitive data. Case studies.

Learning Outcomes

By the end of the course, students will be able to:

  1. Identify situations in which data is sensitive, assess the risks, and articulate a reasoned response.
  2. Identify the pros and cons of situations in which data was collected for one purpose and later analyzed for other purposes.
  3. Explain trade-offs in security and privacy; explain why cybersecurity is complex and difficult.
  4. Explain the purpose of an ethics board, determine when an ethics board needs to be consulted, and explain the various forms of consent. Consider privacy laws and legal issues.
  5. Implement good security and privacy practices in data storage, use, and reporting.

Reference Material

  • Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computer Technology, 4th Edition. Pearson, 2012.
  • Rosenberg, Richard. The Social Impact of Computers, 4th Edition. Emerald Group, 2004.
  • Schneier, Bruce. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. Norton, 2015.
  • Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition. Wiley, 2015.
  • Free online resources, available on the Internet. For example:

Instructor (2016-2017)

Note: information on this page is preliminary and subject to change.