Introducing privacy to undergraduate computing students

Since the release of the Kodak Camera in 1888, the relationship of technology and privacy has been a matter of public consciousness [5]. Recently, the rise of ubiquitous computing and `big data' has created new questions about privacy for policy- and technology-makers alike [16, 28]. However, few computer science programs have incorporated privacy education into their curriculum. Looking at ABET accredited programs as a sample, we find that less than 2% of CS programs have a dedicated undergraduate privacy course. In this paper, we introduce a privacy course tailored to undergraduate computing students. We establish units, readings, assignments, and activities for this course. Lastly, we analyze student feedback from a pilot of this course.

[1]  J. Pratt Remarks on Zeros and Ties in the Wilcoxon Signed Rank Procedures , 1959 .

[2]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[3]  Robert F. Dugan,et al.  Writing for computer science: a taxonomy of writing tasks and general advice , 2006 .

[4]  J. C. Cannon Privacy: What Developers and IT Professionals Should Know , 2004 .

[5]  Omer Tene,et al.  Big Data for All: Privacy and User Control in the Age of Analytics , 2012 .

[6]  Sahana Murthy,et al.  Effect of think-pair-share in a large CS1 class: 83% sustained engagement , 2013, ICER.

[7]  Latanya Sweeney,et al.  Matching Known Patients to Health Records in Washington State Data , 2013, ArXiv.

[8]  Jules Polonetsky,et al.  To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising , 2011 .

[9]  William Newhouse,et al.  NICE Cybersecurity Workforce Framework (NCWF): National Initiative for Cybersecurity Education , 2016 .

[10]  Delores J. Knipp,et al.  4: The Knowledge Survey: A Tool for All Reasons , 2003 .

[11]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[12]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[13]  Lorrie Faith Cranor,et al.  P3P: Making Privacy Policies More Useful , 2003, IEEE Secur. Priv..

[14]  Steven C. Bennett,et al.  The "Right to Be Forgotten": Reconciling EU and US Perspectives , 2012 .

[15]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[16]  Nicholas Hopper,et al.  Scalable onion routing with torsk , 2009, CCS.

[17]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[18]  M. Calo The Boundaries of Privacy Harm , 2010 .