Privacy vs. Data: Business Models in the digital, mobile Economy
Basic Information
Type of Lecture: | Lecture |
---|---|
Course: | Master |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | German |
Term: | Summer 2024 |
Lecturers: |
Sascha Löbner
|
Email: |
Content of the Course
Description:
Course Contents
The majority of business models in the digital economy heavily rely on the existence of user data in order to enable a value proposition for users. For instance, advertisers use data for the targeting of advertisements whereas others apply it for the personalisation of their service offerings. However, what is beneficial for businesses often becomes of a threat to the privacy of users – especially if highly sensitive data, such as location data, is collected and processed without their consent. Within the digital economy field, this course is going to explore the area of conflict between data-centric business models and user privacy. Since mobile devices accumulate a significant amount of personal data about individuals, the following topics will be covered and examined with a special focus from this „mobile“ perspective:
-
-
-
- Digital data-driven business models
- Means of data collection and its threat to privacy
- Privacy and Data Protection
- Basics of Information Security
- Interplay between data and privacy within digital business models
-
-
Further information at the corresponding LSF/QIS webpage of the course.
The 2nd part of this lecture series (Mobile Business II) focuses on the variety of opportunities and challenges, that are offered by mobile communication technologies and their specific properties and which need to be considered and addressed by companies and regulators. The overall objective of the course is to provide advanced knowledge about mobile applications and mobile services, ranging from technical to economic aspects. Students will be qualified to pro-actively realise inherent commercial potential and to identify and to address challenges and problems in the area of mobile business. An important facet of this is the discussion of international regulation and its implications on the development and application scenarios for mobile services.
Architectures for mobile services and their development are in the focus of the first part of the course. This includes topics such as security and privacy, usability, and the role of standardisation. The presentation of exemplary application areas will allow students to understand and question how different design aspects are considered in current scenarios. The course concludes with a state of the art overview of current mobile business research topics and activities, enabling students to understand the lines of research and to draw connections to already existing mobile business applications and scenarios.
Literature:
No initial readings are required for the course.
Agenda:
Time:
The course starts every day "cum tempore (ct.)
Downloads:
-
-
-
- Coming soon.
-
-
Please note: All downloads are password protected. Participating students will receive the password via e-mail to their student e-mail accounts.
Workshop Cybersecurity
Basic Information
Type of Lecture: | Workshop |
---|---|
Course: | Master |
Hours/Week: | |
Credit Points: | |
Language: | |
Term: | Summer 2024 |
Lecturers: | |
Email: |
Information and Communication Security: Infrastructures, Technologies and Business Models
Basic Information
Type of Lecture: | Lecture with practical component |
---|---|
Course: | Master |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | English |
Term: | Summer 2024 |
Lecturers: | |
Email: | security |
Content of the Course
Description: Learning Goals and Competencies
- Basic understanding of security and privacy technologies
- Basic understanding of technological and legal frameworks to prevent digital privacy threats to individuals
- Basic understanding of security engineering processes, and security risk management
- Understanding the importance of information security at organizational level
Descripton of course:
The “Information and Communication Security” lecture series provides a general introduction to the topic of information and communication security. Students will be qualified to identify security challenges that come along with using and employing information and communication systems, and to identify and apply adequate means and methods to solve them.
Emphasis will be put on the organisational and technical set-up of infrastructures, also including aspects of risk management and profitability analysis of security concepts and technologies. Further, students will be qualified to identify and assess security risks, in order to develop and establish appropriate security strategies.
Contents presented in the lecture will also be discussed in the context of international standardisation and regulation activities in the domain of information and communication security, allowing students to consider long-term developments, trends, and challenges in their analysis.
Timetable:
KW | Day | Date | Time | Room | Session | Nr. | Title | Files |
16 | Tuesday | 16.04.24 | 14:00-16:00 | HZ7 | Lecture | VL1 | Introduction | VL1 |
17 | Tuesday | 23.04.24 | 14:00-16:00 | HZ7 | Lecture | VL2 | Authentication | VL2 |
17 | Tuesday | 23.04.24 | 16:00-18:00 | HZ7 | Lecture | VL3 | Access Control | VL3 |
18 | Tuesday | 30.04.24 | 14:00-16:00 | HZ7 | Lecture | VL4 | Cryptography I | |
19 | Tuesday | 07.05.24 | 14:00-16:00 | HZ7 | GL1 | GL1 | Continental | |
19 | Tuesday | 07.05.24 | 16:00-18:00 | HZ7 | Exercise | E1 | Access Control | |
20 | Tuesday | 14.05.24 | 14:00-16:00 | HZ7 | Lecture | VL5 | Cryptography II | |
21 | Tuesday | 21.05.24 | 14:00-16:00 | HZ7 | Lecture | VL6 | Electronic Signatures | |
21 | Tuesday | 21.05.24 | 16:00-18:00 | HZ7 | Lecture | VL7 | Identity Management | |
22 | Tuesday | 28.05.24 | 14:00-16:00 | HZ7 | Lecture | VL8 | Privacy Protection I | |
23 | Tuesday | 04.06.24 | 14:00-16:00 | HZ7 | Lecture | VL9 | Privacy Protection II | |
23 | Tuesday | 04.06.24 | 16:00-18:00 | HZ7 | Lecture | VL10 | Computer System Security | |
24 | Tuesday | 11.06.24 | 14:00-16:00 | HZ7 | GL2+Exercise | E2 | Security Management (Michael Schmid) | |
25 | Tuesday | 18.06.24 | 14:00-16:00 | HZ7 | Exercise | E3 | Authentication | |
25 | Tuesday | 18.06.24 | 16:00-18:00 | HZ7 | Exercise | E4 | Cryptography | |
26 | Tuesday | 25.06.24 | 14:00-16:00 | HZ7 | LECTURE_ML | Privacy in ML | ||
27 | Tuesday | 02.07.24 | 14:00-16:00 | HZ7 | Lecture | VL11 | Network Security I | |
27 | Tuesday | 02.07.24 | 16:00-18:00 | HZ7 | Lecture | VL12 | Network Security II | |
28 | Tuesday | 09.07.24 | 14:00-16:00 | HZ7 | Exercise | E5 | Privacy in ML | |
29 | Tuesday | 16.07.24 | 14:00-16:00 | HZ7 | Lecture | VL12 | Network Security II | |
29 | Tuesday | 16.07.24 | 16:00-18:00 | HZ7 | Lecture | VL13 | Exam Prep and Wrap Up |
Mobile Business II - Application Design, Applications, Infrastructures and Security
Basic Information
Type of Lecture: | Lecture with practical component |
---|---|
Course: | Master |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | English |
Term: | Summer 2024 |
Lecturers: | |
Email: |
|
Content of the Course
Description: Learning Goals and Competencies
-
- Basic understanding of business models of online and mobile business
- Basic understanding of location-based services and its architectures
- Ability to design and evaluate digital business models and concepts with regard to data security and protection
Description of the course:
The 2nd part of this lecture series (Mobile Business II) focuses on the variety of opportunities and challenges, that are offered by mobile communication technologies and their specific properties and which need to be considered and addressed by companies and regulators. The overall objective of the course is to provide advanced knowledge about mobile applications and mobile services, ranging from technical to economic aspects. Students will be qualified to pro-actively realize inherent commercial potential and to identify and to address challenges and problems in the area of mobile business. An important facet of this is the discussion of international regulation and its implications on the development and application scenarios for mobile services.
Architectures for mobile services and their development are in the focus of the first part of the course. This includes topics such as security and privacy, usability, and the role of standardization. The presentation of exemplary application areas will allow students to understand and question how different design aspects are considered in current scenarios. The course concludes with a state-of-the-art overview of current mobile business research topics and activities, enabling students to understand the lines of research and to draw connections to already existing mobile business applications and scenarios.
Prerequisites:
Deadline for Exam Registration: 11 April 2024 – 14 June 2024. Withdrawal is possible up to one week before the examination date.
Exam registration and withdrawal takes place via QIS: My Functions > Administration of exams (Instruction)
For exchange students, exam registration and withdrawal is not possible via QIS. Exchange students register or withdraw with a form within the deadline. Forms and information are available at the Website of the Faculty's International Office.
Agenda: (Agenda is being updated)
Date |
Time |
Room |
Session |
Nr. |
Titel |
|
16/04/24 |
10-12 |
HZ7 |
Lecture |
L1 |
Introduction |
Slides [Draft] |
16/04/24 |
16-18 |
HZ7 |
Lecture |
L2 |
Positioning Methods for Location-based Services |
Slides [Draft] |
23/04/24 |
10-12 |
HZ7 |
Lecture |
L3 |
LBS Business Models |
|
30/04/24 |
10-12 |
HZ7 |
Lecture |
L4 |
Cryptography |
|
30/04/24 |
16-18 |
HZ7 |
Lecture |
L5 |
Electronic Signatures |
|
07/05/24 |
10-12 |
HZ7 |
Exercise |
E1 |
LBS and Mobile Communities |
|
14/05/24 |
10-12 |
HZ7 |
Lecture |
L6 |
M-Payment I |
|
14/05/24 |
16-18 |
HZ7 |
Lecture |
L7 |
M-Payment II |
|
21/05/24 |
10-12 |
HZ7 |
Lecture |
L8 |
Data Protection / IdM |
|
28/05/24 |
10-12 |
HZ7 |
Lecture |
L9 |
Regulation of Mob. Telec. |
|
28/05/24 |
16-18 |
HZ7 |
Lecture |
L10 |
Regulation by Licensing |
|
04/06/24 |
10-12 |
HZ7 |
Lecture |
L11 |
HCI Issues |
|
11/06/24 |
10-12 |
HZ7 |
Guest Lecture |
G0 |
Guest Lecture |
|
11/06/24 |
16-18 |
HZ7 |
Exercise |
E2 |
Cryptography |
|
18/06/24 |
10-12 |
HZ7 |
Lecture |
L12 |
Design Evaluation |
|
25/06/24 |
10-12 |
HZ7 |
Exercise |
E3 |
M-Payment |
|
25/06/24 |
16-18 |
HZ7 |
Exercise |
E4 |
Regulation |
|
02/07/24 |
10-12 |
HZ7 |
Lecture |
L13 |
Current Research |
|
09/07/24 |
10-12 |
HZ7 |
Guest Lecture |
G0 |
Guest Lecture |
|
09/07/24 |
16-18 |
HZ7 |
Guest Lecture |
G0 |
Guest Lecture |
|
16/07/24 |
10-12 |
HZ7 |
Lecture |
L14 |
Q&A |
The Future is Now: Topics with and about ChatGPT and AI
Basic Information
Type of Lecture: | Seminar |
---|---|
Course: | Master |
Hours/Week: | 3 |
Credit Points: | 6 |
Language: | English |
Term: | Summer 2024 |
Lecturers: | |
Email: |
Content of the Course
Description: Learning Goals and Competencies
-
- Obtain a basic understanding of the working mechanisms of Generative AI solutions.
- Being able to critically reflect working with Generative AI solutions.
- Critically reflect ethical dimensions of Generative AI solutions as well as potential issues with regard to e.g., privacy and safety.
- Apply scientific methods, such as systematic literature reviews, qualitative interviews and quantitative surveys, and present their methodology and the results in class.
- Working and presenting results in a group environment.
Description of the course:
Nowadays, everybody has heard of ChatGPT and many students will certainly have tried to use it, or similar large language models (LLMs) by now for their studies. In this seminar, we will take a closer look on the capabilities and limitations of General Artificial Intelligence (GenAI) and its corresponding LLMs to foster a greater understanding on the subject.
The objective of this seminar is therefore twofold: To study GenerativeAI from an academic perspective by also working with them.
Students are encouraged to already come up with their own ideas for possible seminar papers and presentations on the subject.
Students will be tasked to work on a specific topic and present the results to the group in the seminar week, towards the end of the seminar. The final grade will depend on the written report and the presentation on the topic.
Dates and Times:
Date |
What |
Where/When/How |
02.05.2024 |
Kick-off and distribution of topics |
Campus Westend RuW - RuW 2.202 Start: 9:00 End: 16:00 at latest. |
29.06.2024 (by 12:00 Midday German time) |
Final Paper submission |
Ms-word / LaTeX.zip AND PDF to: |
29.06.2024 (by 12:00 Midday German time) |
Presentation submission |
PPT or PDF as Email to: |
01.07.2024 |
Presentation – day 1 |
10:00 – 18:00 Campus Westend RuW - RuW 2.202 |
02.07.2024 |
Presentation – day 2 |
10:00 – 18:00 Campus Westend RuW - RuW 2.202 |
03.07.2024 |
Presentation – day 3 |
10:00 – 18:00 Campus Westend RuW - RuW 2.202 |
04.07.2024 |
Presentation – day 4 |
10:00 – 18:00 Campus Westend RuW - RuW 2.202 |
05.07.2024 |
Presentation – day 5 |
10:00 – 18:00 Campus Westend RuW - RuW 2.202 |
This link provides a list of topics and explanations:
-
-
-
Preliminary list of possible topics:
(1)Systematic literature review on GenAI(2)Technical aspects of GenAI(3)Social/Ethical implications of GenAI(4)Regulation and GenAI(5)Technology adoption of GenAI(6)Security/privacy concerns and GenAI(7)Technostress through GenAI(8)Synthetic data: Pros and Cons(9)Use Cases: GenAI in organizations(10) GenAI: Output Bias analysis(11) GenAI: fake news and content flooding(12) GenAI and its impact on teaching(13) GenAI: create your own application(14) Trust: Human and AI Collaboration(15) Your own ideas are welcome!
-
-
Prerequisites:
This module is limited to 30 participants.
A two-stage registration procedure with different deadlines applies. You have to take part in both stages!
Stage 1: Application Deadline: 25 March 2024 – 08 April 2024
Module Application via QIS: My Functions > Lectures occupy/sign off (Instruction Module Application)
Stage 2: Exam Registration and Withdrawal Deadline: 11 April 2024 – 24 April 2024
Exam Registration and Withdrawal via QIS: My Functions > Administration of exams (Instruction Exam Registration)
An acceptance in the application procedure entitles students to register for the allocated module, but it does not replace an exam registration. Without an exam registration in stage 2, the allocated module claim of the module application in stage 1 expires!
Assignment of Available Capacities: 25 April 2024 – Detailed information will be published on this website in due time.
For exchange students, module application as well as exam registration and withdrawal is not possible via QIS. Exchange students register or withdraw with a form within the exam registration and withdrawal deadline (not application deadline!). Forms and information are available at the Website of the Faculty's International Office.