In this 2 week workshop we discuss the emergence of social media, how the concept gained popularity and has now become the axle in collaborative communication on the Internet. We follow this with a presentation of basic approaches that you can use to protect your data and more importantly your privacy on these platforms. Everyone knows the odd feeling of discomfort when having added someone you actually don't know very well to yours friends' list or to the wrong category within your contacts. The participants will learn in this openHPI course that privacy is still a concern also for users who do not actively use the Internet.
Montag, 23. Oktober 2017, 08:00 Uhr (UTC) bis Montag, 06. November 2017, 20:00 Uhr (UTC)
Kurssprache: English

Kursinformationen


In this workshop we discuss the emergence of social media, how the concept gained popularity and has now become the axle in collaborative communication on the Internet. We follow this with a presentation of basic approaches that you can use to protect your data and more importantly your privacy on these platforms.
Have you ever accepted a friendship request from the guy or girl you met at the corner store only to regret it the minute you clicked on “ACCEPT”? Or have you ever mistakenly allocated a “friend” to the wrong category and spent endless hours going through your list of 75,000 friends in order to find and reallocate your friend to the correct category? If you have, then you probably know about the nagging feeling of discomfort that you try to ignore or comfort yourself by telling yourself that it does not matter. We discuss examples of cyber-attackers to illustrate to you that this feeling should be taken seriously. If you feel concerned that something is not quite right, it most likely is the case.
Finally, we consider users like your Great Grandma who probably don’t use the Internet. If you have drifted away envying that peaceful time when social media did not exist, you could not be more mistaken. Privacy is still a concern for users who do not actively use the Internet!

Join openHPI's official Twitter Feed: @openHPI
You'll find additional video lecturing material on www.tele-task.de.

Lernmaterial


  • Week 1

  • Week 2

  • I like, I wish:

    Please, help us to improve. What did you like about the course, what can we do better next time.
  • Course End Survey

Für diesen Kurs einschreiben


Es gibt keine formellen Vorbedingungen oder Einschränkungen für die Teilnahme an diesem Kurs. Der Kurs ist frei, kostenlos und zugänglich für alle. Sie benötigen lediglich ein Nutzerkonto auf openHPI und schon können Sie den Kurs belegen!

Jetzt einschreiben

Termine und Statistiken


Week 2 startet in

Course End Survey startet in

Eingeschriebene Nutzer: 3571

Anforderungen für Leistungsnachweise


Das Zeugnis erhält, wer in der Summe aller benoteten Aufgaben mehr als 50% der Höchstpunktzahl erreicht hat. Die Teilnahmebestätigung erhält, wer auf zumindest 50% der Kursunterlagen zugegriffen hat. Mehr Informationen finden Sie in den Richtlinien für Leistungsnachweise.

Dieser Kurs wird angeboten von


Dr. Anne Kayem holds a PhD, in Computer Science, obtained in 2008 at Queen’s University in Canada. Prior to this, she obtained a Bachelor’s and Master’s degree in 2001 and 2003 respectively at the University of Yaoundé I in Cameroon. Prior to commencing her PhD studies, from 2003-2004 she was a lecturer at the University of Ngaoundere in Cameroon. From 2009 – 2010, she worked as a Post-doctoral researcher at the German Center for Research in Artificial Intelligence (DFKI) in Bremen, Germany. In 2010, she accepted a Senior Lecturer position at the University of Cape Town where she heads the Information Security group. She has also been coordinator of the HPI PhD Research School in Cape Town since 2013. She is a visiting researcher at the Hasso-Plattner-Institute for IT-Systems Engineering (HPI) at the University of Potsdam. Her research interests include access control, authentication, data anonymization, privacy, cloud security, cyber-physical systems security, and service computing. She has published two books, as well as papers in international journals, and conferences on information security. In addition to this, she serves as a program committee member on several international conferences, workshops, and journals in the area of information security. She is co-chair of a workshop on Security in Cyber-Physical Systems and Services (http://infosec.cs.uct.ac.za/INTRICATE-SEC/).

Helpdesk

Ihre Anfrage wurde an unser Support Team geschickt. Wir werden uns schnellstmöglich bei Ihnen melden.

Danke für Ihre Anfrage!

Leider hat hier etwas nicht geklappt.

Zurück