193
Compulsory

When a course instance has been created from a template, the course instance will be in this state

  • Data is usually still incomplete and everything can still be edited.
  • Lecturers or secretaries can move the state forward to Edited.

Eigentlich sichert Artikel 12 der Allgemeinen Erklärung der Menschenrechte zu:

"No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks."

Dennoch scheint es in der heutigen - elektronischen - Welt unvermeidbar, tiefe Eingriffe in die eigene Privatsphäre hinzunehmen. Viele der heute genutzten Webdienste, wie z.B.

  • personalisierte Suche/Webdienste,
  • ortsabhängige Dienste,
  • zielgerichtete Werbung,
  • soziale Netzwerke,
  • "Cloud storage", ...

basieren gerade darauf, dass ein Anbieter personenbezogene Daten speichert und verarbeitet.

In diesem Seminar wollen wir kritisch untersuchen welche dieser "unvermeidbaren" Eingriffe denn tatsächlich unvermeidbar sind, und nach Lösungen suchen die die Privatsphäre von Nutzern respektieren. Dazu betrachten wir verschiedene Probleme mit Bezug auf die Privatsphäre und diskutieren Lösungsvorschläge aus der wissenschaftlichen Literatur.

  • Sprache Deutsch / Englisch
  • Maximale Anzahl Teilnehmer: 20
  • Zielgruppe: Studierende der Informatik im Bachelor- oder Masterstudiengang / Diplom Grund- oder Hauptstudium
  • Voraussetzungen: Vorkenntnisse in Kryptographie nicht notwendig, aber hilfreich.
  • Quellen: verschiedene Quellen aus der wiss. Literatur; werden im Seminar bekannt gegeben

Article 12 of the Universal Declaration of Human Rights states that:

"No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.”.

This, however, stands in contrast to reality in today’s (electronic) societies - where it seems futile to avoid invasions of one’s privacy. In fact, the storage and processing of personal data seems to be the essence of many services we rely on on a day-to-day basis.

To list a few examples:

  • personalized web search
  • localized services
  • targeted advertising,
  • online social networks,
  •  cloud storage,

In this course, we want to question the assumption that privacy violations are “at the essence” of those services, and investigate which of those “unavoidable” violations are truly unavoidable. We discover and discuss technologies that try to respect (and protect) the privacy of it’s users, primarily from the scientific literature.

Language: German / Englisch

Participants: up to 20

Target Audience: Computer science Students

Requirements: Basic knowledge in cryptography is not necessary, but may allow deeper insights.

Sources: various original sources from the scientific literature; to be announced in class

Cross-language

Expectant Mother

Not dangerous
Partly dangerous
Alternative Course
Dangerous

Nursing Mother

Not dangerous
Partly dangerous
Alternative Course
Dangerous