In this 2 week workshop we discuss the emergence of social media, how the concept gained popularity and has now become the axle in collaborative communication on the Internet. We follow this with a presentation of basic approaches that you can use to protect your data and more importantly your privacy on these platforms. Everyone knows the odd feeling of discomfort when having added someone you actually don't know very well to yours friends' list or to the wrong category within your contacts. The participants will learn in this openHPI course that privacy is still a concern also for users who do not actively use the Internet.
Monday, January 18, 2016 08:00 (UTC) to Monday, February 15, 2016 23:30 (UTC)
Language: English
IT Basic Knowledge, IT Security, Recent developments

Course information


In this workshop we discuss the emergence of social media, how the concept gained popularity and has now become the axle in collaborative communication on the Internet. We follow this with a presentation of basic approaches that you can use to protect your data and more importantly your privacy on these platforms.
Have you ever accepted a friendship request from the guy or girl you met at the corner store only to regret it the minute you clicked on “ACCEPT”? Or have you ever mistakenly allocated a “friend” to the wrong category and spent endless hours going through your list of 75,000 friends in order to find and reallocate your friend to the correct category? If you have, then you probably know about the nagging feeling of discomfort that you try to ignore or comfort yourself by telling yourself that it does not matter. We discuss examples of cyber-attackers to illustrate to you that this feeling should be taken seriously. If you feel concerned that something is not quite right, it most likely is the case.
Finally, we consider users like your Great Grandma who probably don’t use the Internet. If you have drifted away envying that peaceful time when social media did not exist, you could not be more mistaken. Privacy is still a concern for users who do not actively use the Internet!

Join openHPI's official Twitter Feed: @openHPI
You'll find additional video lecturing material on www.tele-task.de.

Course contents


  • Week 1

  • Week 2

  • I like, I wish:

    Please, help us to improve. What did you like about the course, what can we do better next time.
  • Course End Survey

How to enroll


If you would like to enroll for this course, there are no formal prerequisites or limitations. The course is free and open for everyone. Just register for an account on openHPI and go for the course!

Enroll me for this course

Dates and Statistics


This course was held from Jan 18, 2016 through Feb 15, 2016.

5180 learners enrolled.

Certificate Requirements


A record of achievement is issued to those who have earned more than 50% of the maximum number of points for the sum of all graded assignments. A confirmation of participation is issued to those who have completed at least 50% of the course material. Find out more in the certificate guidelines.

This course is offered by


Dr. Anne Kayem holds a PhD, in Computer Science, obtained in 2008 at Queen’s University in Canada. Prior to this, she obtained a Bachelor’s and Master’s degree in 2001 and 2003 respectively at the University of Yaoundé I in Cameroon. Prior to commencing her PhD studies, from 2003-2004 she was a lecturer at the University of Ngaoundere in Cameroon. From 2009 – 2010, she worked as a Post-doctoral researcher at the German Center for Research in Artificial Intelligence (DFKI) in Bremen, Germany. In 2010, she accepted a Senior Lecturer position at the University of Cape Town where she heads the Information Security group. She has also been coordinator of the HPI PhD Research School in Cape Town since 2013. She is a visiting researcher at the Hasso-Plattner-Institute for IT-Systems Engineering (HPI) at the University of Potsdam. Her research interests include access control, authentication, data anonymization, privacy, cloud security, cyber-physical systems security, and service computing. She has published two books, as well as papers in international journals, and conferences on information security. In addition to this, she serves as a program committee member on several international conferences, workshops, and journals in the area of information security. She is co-chair of a workshop on Security in Cyber-Physical Systems and Services (http://infosec.cs.uct.ac.za/INTRICATE-SEC/).

Helpdesk

Your request has been sent to our support team, and will be answered as soon as possible.

Thank You!

Oops something went wrong.

Back