I537 Legal and Social Informatics of Security

Credits: 3

Security technologies make explicit organizational choices that allocate power. Security implementations allocate risk, determine authority, reify or alter relationships, and determine trust extended to organizational participants. The course begins with an introduction to relevant definitions (security, privacy, trust) and then moves to a series of timely case studies of security technologies. This course may be taken as an alternative INFO-I 525. The course also requires a project, including a work plan, a timeline, peer evaluations, and professional presentations.

  • Course History

      Fall 2017

      Instructor: Sameer Patil
      Time: 4:30PM-7:00PM Tue
      Location: Informatics East, Room 122