TJTSM65 Information Privacy (5 cr)
Description
The proliferation of various information systems and applications has enabled large scale collection and analysis of individuals’ personal information. Social network sites, location services, e-commerce sites, etc. are using multiple sources to collect data and construct user profiles, to better understand users. For example, Facebook is not only tracking the information users share on the site, but also users’ browsing habits. Such data collection may allow companies to cater their services and provide personalized products, but it may raise concerns about privacy.
In this course we provide a thorough investigation of privacy in the information age. We begin by scrutinizing the concept of information privacy, and the pros and cons of personal information usage and privacy protection. We discuss real-life privacy related case, and academic research on privacy.
Completion methods
Learning Activities
Lecture – focuses on theory, policy and management issues.
Paper discussion – discuss privacy related academic papers.
Case discussion – Real-life cases will be used to illustrate the concepts, theories, and practices covered in the course.
Assessment details
Two Individual Assignments 60%
One Group Report 40%
Learning outcomes
Students will have a good understanding of how people view information privacy from different perspectives and the implications of these perspectives.
Students will develop skills in analyzing real cases.
Students will gain a good knowledge about academic research related to privacy.
Description of prerequisites
Study materials
For the in class discussion of cases or mini cases, readings will be done in class.
For the discussion of academic research papers, readings need to be done before class.