Description
The module Digital Privacy focuses on providing students with a comprehensive understanding of the significance and complexity of privacy in the digital age. Through daily user activities on social networks and external developments like the introduction of electronic patient records, the topic of privacy is gaining increasing relevance. The module considers various perspectives—including psychological, technical, and economic approaches—to fully grasp the multifaceted concept of privacy.
Students learn what information is collected about users and how often unconscious compromises are made to gain "free" access to digital technologies. Based on this, they develop strategies on how individuals can protect their privacy and recognize that privacy is subjective and dependent on the respective context. A special focus is placed on the role of technologies that can either protect or endanger user privacy.
To link theory and practice, the course includes case studies and practical exercises. These enable students to develop and implement effective strategies for protecting privacy. Additionally, theories such as the Privacy Calculus and Protection Motivation Theory are covered to explain and influence user behavior regarding privacy.
The aim of the course is to prepare students for the key challenges of data protection in a digitized world and to familiarize them with the following core questions:
- Why is privacy important, and how does it differ from related concepts?
- How can user behavior regarding privacy be explained (e.g., through Privacy Calculus, Protection Motivation Theory)?
- Which technologies endanger the privacy of individuals, and how can they be identified?
- Which technologies protect the privacy of individuals, and how can they be effectively employed?
- What is the economic value of personal information, and what risks arise from violations of privacy?
- What are the particularities concerning privacy in specific contexts, and how can these be addressed?
Registration for the course
Please enroll for the course via the form on the German website.
Content information
Learning objectives
As part of this module, students acquire a solid understanding of the complex and subjective nature of privacy in the digital age. The goal is to provide a scientifically grounded yet practical perspective that enables students to develop and implement effective strategies for protecting privacy. The learning objectives are formulated as follows:
- Deep insight into the importance of privacy: Students gain a differentiated understanding of the relevance of privacy in various contexts and learn how privacy differs from related concepts. The content is illustrated using different scenarios and examples (e.g., social networks, healthcare).
- Acquisition of knowledge about user behavior regarding privacy: Students learn theories such as the Privacy Calculus and the Protection Motivation Theory to understand how and why individuals make decisions concerning their privacy.
- Awareness of privacy intrusive technologies: Students receive an overview of technologies that endanger individuals' privacy and recognize the underlying mechanisms and risks.
- Understanding of privacy enhancing technologies and strategies: Students learn specific approaches and methods to protect privacy. This includes the use of privacy enhancing technologies and the development of data protection strategies.
- Practical skills: Through case studies and practical exercises, students receive feedback on their ability to plan and implement effective privacy protection measures. They become familiar with relevant tools and methods to ensure data protection in various contexts.
- Understanding the economic value of information: Students recognize the economic value of personal data and the risks arising from violations of privacy. They learn how to balance economic interests with data protection.
- Strategic and Operational Competence in Data Protection: Students acquire the skills required for the strategic planning and operational execution of data protection measures and can apply them in different contexts.
Literature
Each lecture builds upon recent, specific literature, such as:
- Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514
- Adams, C. (2021). Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding PETs. Springer International Publishing.
- Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors. MIS Quarterly, 39(4), 837–864.
- Solove, D. J. (2021). The Myth of the Privacy Paradox. George Washington Law Review, 89.
Organizational information
Teaching form
Lecture (2 SWS) with exercise (2 SWS) in person.
Grading
Written exam:
- Duration: 90 minutes (reflects 90 points)
- Language: German or English
- Tasks: Mandatory and optional parts
Students have the option of gaining up to 10 additional points by voluntarily completing a semester assignment during the semester.
Creditable study programs
Creditable in most WIAI and business-related degree programs, incl. B.Sc. International Information Systems Management, B.Sc. Information Systems.
If you have any questions, please ask your contact person on the examination board directly.