Programplaner og emneplaner - Student
ACIT4280 Privacy by design Course description
- Course name in Norwegian
- Privacy by design
- Study programme
-
Master's Programme in Applied Computer and Information Technology
- Weight
- 10.0 ECTS
- Year of study
- 2024/2025
- Curriculum
-
FALL 2024
- Schedule
- Programme description
- Course history
-
Introduction
The course is organized as a series of lectures and seminars where the subject material is presented and discussed. Between these sessions the students should work with problem solving, implementation of numerical methods and model simulations. The last part of the semester students will work with a compulsory individual project supervised by the course lecturer. The project will involve studies and analyses of a mathematical model and a rather extensive implementation of the numerical solution of the model.
Recommended preliminary courses
A student who has completed this course should have the following learning outcomes defined in terms of knowledge, skills and general competenc.
Knowledge
On successful completion of this course the student has:
- advanced knowledge within a sub-area of robotics and control.
- knowledge about the process of planning and conducting a project.
Skills
On successful completion of this course the student can:
- apply the theoretical knowledge and research-based methodologies into a practical problem.
- propose a detailed project plan.
- write a scientific report.
General competence
On successful completion of this course the student can:
- analyze, present and debate specific research subjects in light of the theoretical and practical approaches.
- discuss the subject both at expert and non-expert levels.
Required preliminary courses
None
Learning outcomes
A student who has completed this course should have the following learning outcomes defined in terms of knowledge, skills and general competence:
Knowledge
On successful completion of this course the student has:
- in-depth knowledge of a contemporary topic in cybersecurity and/or information privacy
- deepened insight into cybersecurity technology, security vulnerabilities, information privacy and cybersecurity theory and practice and the societal relevance thereof
- cross-disciplinary insights into how information security interfaces with other disciplines and specializations (e.g. security usability, AI-empowered security, quantum security, IoT and cloud security)
Skills
On successful completion of this course the student can:
- systematically and independently search for, classify and review scientific literature using publication databases
- plan, write and present a scientific article or technical report following the IMRAD structure
- explain and critically review the topic orally in a presentation
- provide constructive peer review for scientific and technical papers to peer students
- write a review or argumentative article about a cybersecurity topic
General Competence
On successful completion of this course the student can:
- find and filter scientific literature in advanced topics in cybersecurity and related areas
- critically assess state-of-the-art literatures in cybersecurity and related areas
- present complex topics to a broad audience. Both orally and in writing
Teaching and learning methods
- Individual reading assignments
- Individual literature search work
- Individual writing assignments
- Seminar meetings including mini lectures, group discussions, student presentations group feedback sessions
- Written peer review assignments
Course requirements
The following required coursework must be approved before the student can take the exam:
One group assignment (2-5 students appointed by teacher) consisting two parts: a report and a presentation.
Assessment
The following required coursework must be approved before the student can take the exam:
- delivery of a written report (3000 words, +/- 10%)
- delivery of two rounds peer reviews
- mid-term presentation of literature search
Permitted exam materials and equipment
Associate Professor Leiv Øyehaug
Grading scale
The student should have the following outcomes upon completing the course:
Knowledge
Upon successful completion of the course, the student should have
- specialized knowledge to differentiate technologies used for sensors and actuators in medical and health care applications.
- an advanced technical understanding of the transduction mechanisms and sensory schemes.
- a good understanding about building a sensor and actuator in specific cases involving medical and health care applications.
Skills
Upon successful completion of the course, the student can:
- categorize sensors and actuators based on their applications.
- calibrate optical and electrical spectra using multivariate calibration.
- analyze the performance of sensors and actuators.
General competence
Upon successful completion of the course, the student should:
- understand the role of sensors and actuators in medical devices.
- can explain and discus challenges related to sensors and actuators that are applied medical and health care applications to experts and non-experts alike.
- can design a system that is based on sensors and actuators with a specific transduction mechanism.
Examiners
The course provides an arena where students can learn about specific technologies and methods that are relevant for applications in robotics and control. These themes can be varied from artificial intelligence methods for robotics and control, Internet of Things and sensor network systems, autonomous and distributed systems, embedded systems, industrial process control, and other special subjects within robotics and control.
The first part of the course is organised as a series of lectures and seminars. The second part of the course is a practical project. The course is completed by the students submitting a report and giving a presentation of their work.
Course contact person
No formal requirements over and above the admission requirements.