USC Data Science 529 (DSci 529): Security and Privacy in Informatics - Spring 2021
Lecture Friday - Noon to 3:20PM PM, OHE 100C (if we ever go back to hybrid mode) and Online
Clifford Neuman
Announcements
Please see the Assignments Section and the readings Section of this page for important updates.
Schedule
- Friday January 15, 2021 - First Lecture - Introduction - Overview - What is Privacy and Security?
- Friday January 22, 2021 - Second Lecture - What data is collected and how is it used?
- Friday January 29, 2021 - Third Lecture - Technical Means of Protection - Encryption - Security Primer part 1
- Friday February 5, 2021 - Fourth Lecture - Identifications, Authentication, Audit - Security Primer part 2
- Friday February 12, 2021 - Fifth Lecture - Reasonable Expectations of Privacy - What do we expect
- Friday February 19, 2021 - Sixth Lecture - Big Data - Measuring Privacy - Technology and Prvacy
- Friday February 26, 2021 - Mid-term Exam Noon-1:40PM, Followed by Seventh Lecture 2PM-3:20PM - AI and Bias
- Friday March 5, 2021 - Eighth Lecture - The Internet of Things and Security and Privacy
- Friday March 12, 2021 - No Lecture - Wellness Day
- Friday March 19, 2021 - Ninth Lecture - Social Media - Social Networks - How our data is used
- Friday March 26, 2021 - Tenth Lecture - Use of and Access to Data by Governments - Privacy in a Pandemic
- Friday April 2, 2021 - Eleventh Lecture - Privacy Regulation - GDPR, CCPA, CPRA, international context
- Friday April 9, 2021 - Twelveth Lecture - Free Speech - Disinformation - Influence of Social Media
- Friday April 16, 2021 - Thirteenth Lecture - CryptoCurrency - TOR - Privacy Preserving Technologies
- Friday April 23, 2021 - Final Lecture - Conclusion - Review for Final Exam - The Future of Privacy and Security
- Friday April 30, 2021 - Spring Semester Teaching ends, No lecture - Wellness Day
- Final Exam - Friday May 7th, 2021 - 11AM to 1PM
Course Materials (additional materials will be added during the seemster)
Course Summary
Some have said privacy is dead, but is it? Students of informatics
will approach the problem of security from different perspectives.
Different parts of the curriculum will be already familiar to students
depending on their perspective: the goals of the class are to let
students see how their focus fits into the bigger picture, while
simultaneously exposing them to important perspectives that might be
absent from their other studies.
Students will develop the following abilities
- For security practitioners
- Understand public policy and legal landscape
- Understand their behind privacy
- For data scientists and informaticists
- Understand implications of your craft for privacy
- Understand public policy and legal landscape
- For policy wonks
- Understand the technical landscape
- What is possible, what is not
- Both in terms of protecting and destroying privacy
- From the legal perspective
- What is technically possible
The intended outcome for students with different backgrounds is:
- Data Informatic students will understand the kinds of data
collection and mining that contribute to the loss of privacy, and will
consider the ethical and legal implications of the data collection in
the systems they implement. They will also be introduced to security
measures they should take to protect the personally identificable
information they collect.
- Security Informatics students will understand the environemtn
within which personally identifiable iformation is collected, the the
impact of the processing and inference that occurs. They will also
learn some of the theiry surrounding mesurement of privacy and
inference and the ethical and legal implications of privacy invading
and privacy perserving technologies.
- Student coming from a legal or public policy perspective will gain
an appreciation for the technical capabilities to preserve and violate
privacy, and will understand what the technical limits and best
practices are that can and cannot be practically legislated.
Instructors and Assistants
Clifford Neuman
- Office: Information Sciences Institute - 310-448-8736
- Office hours: Monday 1PM to 2:30PM - or by appointment
- Email: bcn@isi.edu
TA/Producer T.B.D.
- Office: T.B.D.
- Office hours: T.B.D.
or by appointment
- Email: T.B.D.
Academic Integrity
As an instructor I take academic integrity seriously. Cases of
academic misconduct will result in the assignment of a failing grade
for the class and referal of the matter to the student conduct office.
In each of the past several years I have turned in multiple students
for cheating and assigned failing grades. Information on what
constitutes academic dishonesty can be found on the CSci530 academic integrity page, and by
following links to university resources found on that page.
Assignments
Readings
- For January 2nd
- Social Media - For March 19th
- More discussion on Monitoring of our activities
- Special Issue of IEEE Computer Magazine - Communications and Pruvacy Under Surveilance (need to access from USC IP address - OK to use VPN or USC Library Gateway)
- Communications and Privacy under Surveillance, Y. D. Lin ; J. Voas ; A. Pescapè ; P. Mueller
- Insecure Surveillance: Technical Issues with Remote Computer Searches
S. M. Bellovin ; M. Blaze ; S. Landau
- Insecure by Design: Protocols for Encrypted Phone Calls
S. J. Murdoch
- Requirements Analysis Required--Otherwise Targeted Monitoring Enables Pervasive Monitoring
S. Farrell
- The complicated truth about China's social credit systemNicole Kobie, Wired UK, 21 January 2019.
Lecture Slides
- Lecture 1 - 15 January 2021
- Lecture 2 - 22 January 2021
- Lecture 3 - 29 January 2021
- Lecture 4 - 5 February 2021, ce
- Lecture 5 - 12 February 2021, ce
- Lecture 6 - 19 February 2021, ce
- Lecture 7 - 26 February 2021, ce
- Lecture 8 - 5 March 2021, ce
- Lecture 9 - 19 March 2021, ce
- Lecture 10 - 26 March 2021, ce
- Lecture 11 - 2 April 2021, ce
- Lecture 12 - 9 April 2021, ce
- Lecture 13 - 16 April 2021, ce
- Lecture 14 - 23 April 2021, ce
Exams from Prior Years