Incorporating Privacy into the Undergraduate Curriculum

Today, our social, economic and political systems all make increasing use of the underlying computing infrastructure, and are heavily reliant on its safety and robustness. The ubiquitous collection and analysis of data through this infrastructure creates a burgeoning privacy problem. Indeed, special care must be taken to ensure that privacy is not breached from misuse of data flowing through these systems. Recently, the severity of this problem has been recognized both in the legislature and in the computing research field. However, we still lack a comprehensive view of this important topic in the undergraduate curriculum. Privacy is a critical problem for individuals and society at large. Serious problems are caused inadvertently due to ignorance of the subject and general lack of knowledge. Raising awareness of privacy issues, along with knowledge of the current state of the art technical and sociological solutions is best inculcated in young minds right from the start. In this paper, we explore how a comprehensive view of privacy can be incorporated into the undergraduate curriculum at the appropriate level. We present two alternative approaches towards this -- having an independent course for privacy or including small modules on privacy within existing courses.

[1]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[2]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[3]  Язык программирования,et al.  Cross Industry Standard Process for Data Mining , 2010 .

[4]  Josh Benaloh,et al.  Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.

[5]  Sandra Gorka,et al.  Curriculum Guidelines for Undergraduate Degree Programs in Information Technology , 2008 .

[6]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[7]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[8]  Chris Clifton,et al.  Privacy Preserving Data Mining (Advances in Information Security) , 2005 .

[9]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[10]  Adam Meyerson,et al.  On the complexity of optimal K-anonymity , 2004, PODS.

[11]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[12]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[13]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[14]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[15]  Jon Callas,et al.  OpenPGP Message Format , 1998, RFC.

[16]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[17]  Lorrie Faith Cranor,et al.  P3P deployment on websites , 2008, Electron. Commer. Res. Appl..

[18]  Felix Brandt,et al.  Fundamental aspects of privacy and deception in electronic auctions , 2003 .

[19]  Latanya Sweeney,et al.  Guaranteeing anonymity when sharing medical data, the Datafly System , 1997, AMIA.

[20]  Chris Clifton,et al.  Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.

[21]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.

[22]  Chris Clifton,et al.  Thoughts on k-Anonymization , 2006, ICDE Workshops.

[23]  Lorrie Faith Cranor,et al.  A Shortage of Privacy Engineers , 2013, IEEE Security & Privacy.

[24]  Ryan T. Wright,et al.  IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems , 2010, Commun. Assoc. Inf. Syst..

[25]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .