JCU Logo

JOHN CABOT UNIVERSITY

COURSE CODE: "CMS/BUS 385"
COURSE NAME: "Surveillance, Privacy and Social Identities: Practices and Representations"
SEMESTER & YEAR: Fall 2014
SYLLABUS

INSTRUCTOR: Simon Davies
EMAIL: [email protected]
HOURS: M 6:00 PM 8:45 PM
TOTAL NO. OF CONTACT HOURS: 45
CREDITS: 3
PREREQUISITES:
OFFICE HOURS:

COURSE DESCRIPTION:
This course provides a broad and practical introduction to the rapidly expanding use of personal data in communications and information systems. The syllabus centers on the crucial topic of privacy, but also introduces participants to information security, law, business practices and global policy. With a strong practical focus supported by direct input from leaders of the field in industry and law, the course explores some of the most important and complex consequences of data in the modern age.
SUMMARY OF COURSE CONTENT:

1.             An introduction to how personal information is used in the modern age: the benefits and the risks, the winners and the losers.

2.             Case study 1: the rise of electronic visual surveillance and the creation of the panopticon society

3.             The privacy maze: what it is, and why privacy has become one of the most controversial issues of the modern age.

4.             A brief analysis of our brain: why we give away our information and why we need information from other people. A deep-dive into Facebook.

5.             Case study 2: spies, spooks and subversion: the global security web and how it reaches into almost all our communications.

6.             A brief guide to information security.

7.             Why government thinks it needs to know everything about us: some examples of when they get it wrong and right.

8.             Case study 3: the push for perfect identity and the elimination of anonymity.

9.             How much are you worth? How businesses use our personal information to build new economies and industries. A deep-dive into Google.

10.        The laws that protect us - and the laws that protect “them”: individual rights in conflict.

11.        How global dynamics are replacing national protections.

12.        The citizen fight-back: five technologies that are being used to protect privacy.

13.        The mega-trends that will shape the future.

14.        Course summary and review.

LEARNING OUTCOMES:
Students will gain an awareness of the foundations of information in the modern age, its importance and its consequences. Through an understanding of privacy, security and international developments they will recognize and assess the key ethical questions that arise from the use of personal information. Students learn the practical aspects of how government and industry exploit personal information and how those organizations function. The course is structured within the context of the discipline of Information Systems.
TEXTBOOK:
Book TitleAuthorPublisherISBN numberLibrary Call NumberCommentsFormatLocal BookstoreOnline Purchase
Age of Context: Mobile, Sensors, Data and the Future of Privacy Robert Scoble, Shel IsraelPatrick Brewster Press, 1 edition (29 Nov 2013)...     
Privacy in Context: Technology, Policy, and the Integrity of Social LifeHelen NissenbaumStanford Law Books 0804752370     
REQUIRED RESERVED READING:
NONE

RECOMMENDED RESERVED READING:
NONE
GRADING POLICY
-ASSESSMENT METHODS:
AssignmentGuidelinesWeight
Attendance and Participation 10%
Mid-Term Exam 30%
Presentation of Project 10%
Final Research Paper 50%

-ASSESSMENT CRITERIA:
AWork of this quality directly addresses the question or problem raised and provides a coherent argument displaying an extensive knowledge of relevant information or content. This type of work demonstrates the ability to critically evaluate concepts and theory and has an element of novelty and originality. There is clear evidence of a significant amount of reading beyond that required for the cours
BThis is highly competent level of performance and directly addresses the question or problem raised.There is a demonstration of some ability to critically evaluatetheory and concepts and relate them to practice. Discussions reflect the student’s own arguments and are not simply a repetition of standard lecture andreference material. The work does not suffer from any major errors or omissions and provides evidence of reading beyond the required assignments.
CThis is an acceptable level of performance and provides answers that are clear but limited, reflecting the information offered in the lectures and reference readings.
DThis level of performances demonstrates that the student lacks a coherent grasp of the material.Important information is omitted and irrelevant points included.In effect, the student has barely done enough to persuade the instructor that s/he should not fail.
FThis work fails to show any knowledge or understanding of the issues raised in the question. Most of the material in the answer is irrelevant.

-ATTENDANCE REQUIREMENTS:
In accordance to University guidelines.

Please refer to the university catalog for the attendance and absence policy.
ACADEMIC HONESTY
As stated in the university catalog, any student who commits an act of academic dishonesty will receive a failing grade on the work in which the dishonesty occurred. In addition, acts of academic dishonesty, irrespective of the weight of the assignment, may result in the student receiving a failing grade in the course. Instances of academic dishonesty will be reported to the Dean of Academic Affairs. A student who is reported twice for academic dishonesty is subject to summary dismissal from the University. In such a case, the Academic Council will then make a recommendation to the President, who will make the final decision.
STUDENTS WITH LEARNING OR OTHER DISABILITIES
John Cabot University does not discriminate on the basis of disability or handicap. Students with approved accommodations must inform their professors at the beginning of the term. Please see the website for the complete policy.

SCHEDULE

Included in the "Summary of Course Content".