Type A
|
Code |
Competences Specific |
|
Research |
|
AR2 |
Aplicar els coneixements de matemàtiques a l’enginyeria informàtica. |
|
AR3 |
Conèixer productes tecnològics i tendències de la tecnologia. |
|
AR5 |
Redactar documentació científica. |
|
AR11 |
Analitzar, dissenyar i desenvolupar bases de dades i sistemes d’informació tenint en compte l’explotació de les dades. |
|
AR13 |
Aplicar el xifrat i protecció de dades. |
|
AR16 |
Analitzar, dissenyar i desenvolupar bases de dades i sistemes d’informació tenint en compte la seguretat de les dades. |
Type B
|
Code |
Competences Transversal |
|
Common |
|
BC4 |
Resoldre problemes de forma efectiva |
|
BC5 |
Transferibilitat. Aplicar coneixements i habilitats en entorns nous o no familiars i en contextos multidisciplinars relatius a la seva àrea específica |
|
BC6 |
Actuar amb un esperit crític i responsable. |
|
BC8 |
Autoestima professional. Comprendre el valor del propi coneixement i del seu impacte a la societat/comunitat. |
|
BC11 |
Treballar en equip i gestionar equips |
|
BC13 |
Aprendre a aprendre |
|
BC14 |
Planificació i organització |
Type C
|
Code |
Competences Nuclear |
|
Common |
|
CC1 |
Domini de l’expressió i la comprensió del/s idioma/es estrangers per al desenvolupament professional derivat del curs del postgrau. |
|
CC2 |
Ús de les eines específiques de TIC per al desenvolupament professional derivat del curs de postgrau. |
Objectives |
Competences |
Adquirir una visió global del problema de la protecció del copyright. |
AR2 AR3 AR13
|
|
|
Conèixer les tècniques existents per gestionar els drets digitals i per detectar les còpies il·legítimes, i programar-ne alguna d'elles. |
AR2 AR3 AR13
|
BC4 BC5 BC8 BC11 BC13 BC14
|
|
Adquirir una visió global de la importància del dret a la privacitat dels individus. |
AR2 AR3 AR13 AR16
|
|
|
Conèixer les tècniques existents per garantir la privacitat dels individus i programar-ne alguna d'elles. |
AR2 AR3 AR11 AR13 AR16
|
BC4 BC5 BC6 BC8 BC11 BC13 BC14
|
|
Treballar el temari en grup i exposar el treball en públic. |
AR2 AR3 AR5 AR11 AR13 AR16
|
BC4 BC5 BC6 BC8 BC11 BC13 BC14
|
CC1 CC2
|
Topic |
Sub-topic |
Introduction to the Copyright protection |
Copyright denition
Brief history of Copyright
Protected works
Exclusive rights
Measures of protection |
Digital Rights Management |
-DRM
-Multimedia encryption
-Key Management for Multimedia Access and Distribution
-Broadcast Encryption |
Tracing illegal distribution |
-Steganography
--Introduction
--Steganographic methods
--References
-Watermarking
--Introduction
--Properties of a watermarking scheme
--Classication of watermarking schemes
--Watermarking applications
--Methods
--References
-Fingerprinting
--Introduction
--Properties
--Fingerprinting Schemes
--References |
Introduction to the privacy |
- |
Privacy in Statistical Databases |
The SDC Problem: utility vs disclosure risk
Microdata (individual records)
- Perturbative Methods
- Non-perturbative methods
- Synthetic Microdata
- Measures of information loss
- Measures of disclosure risk
- K-anonymity
Tabular data
- Sensitivity rules
- Removal of cells
- Controlled rounding |
Privacy in Information and Communication Technologies |
-Anonymous channels
-Electronic voting schemes
-Anonymous payment systems
-Mobile Devices
--Location Based Services
--RFID |
Methodologies :: Tests |
|
Competences |
(*) Class hours |
Hours outside the classroom |
(**) Total hours |
Introductory activities |
|
2 |
1 |
3 |
|
Lecture |
|
28 |
42 |
70 |
Presentations / expositions |
|
14 |
21 |
35 |
ICT practicals |
|
0 |
30 |
30 |
|
Personal tuition |
|
2 |
0 |
2 |
|
Extended-answer tests |
|
2 |
3 |
5 |
Extended-answer tests |
|
2 |
3 |
5 |
|
(*) On e-learning, hours of virtual attendance of the teacher. (**) The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies
|
Description |
Introductory activities |
The objectives, schedule, and evaluation of the subject are explained in the first class. |
Lecture |
The teacher explains the subject contents according to the schedule. |
Presentations / expositions |
The works are performed in grups of two students. Every group must prepare a presentation about a part of the subject contents. The presentations are evaluated and are considered in the final grade. |
ICT practicals |
The practice is performed in grups of two students. Every group must develop one of the following practices:
-Develop a watermaking scheme.
-Make a study of privacy in social networks.
The practice is evaluated and it is part of the final grade. |
Personal tuition |
The students can ask any question about the subject to the teacher. They can do it in class, in his office (in office hours), via email, or through the Moodle platform. |
|
Personal tuition |
Extended-answer tests |
|
Description |
The students can ask any question about the subject to the teacher. They can do it in class, in his office (in office hours), via email, or through the Moodle platform. |
|
|
Description |
Weight |
Presentations / expositions |
The works are performed in grups of two students. Every group must prepare a presentation about a part of the subject contents.
The work chosen can be related with the first or second part of the subject.
The presentations are evaluated and are considered in the final grade. |
20% |
ICT practicals |
The students must choose one of the following practices:
-Develop a watermarking scheme.
-Make a privacy study of a social network.
The practice can be individual or in group (2 student per group).. |
25% |
Extended-answer tests |
The students must perform a written exam corresponding to the second part of the subject (Protection of Privacy).
The student must obtain a minimum grade of 5 to pass the course.
|
27.5% |
Extended-answer tests |
The students must perform a written exam corresponding to the first part of the subject (Cpyright Protection).
The student must obtain a minimum grade of 5 to pass the course.
|
27.5% |
|
Other comments and second exam session |
The students who do not pass the first call have a second call. They must deliver the work and practice, and pass a new exam. The exam will consist of two parts, corresponding to two blocks of the subject. Each part is up to ten points. The students must obtain at least four points on each part, and the sum of the two parts must be at least ten points to pass the exam. The work and practice must have a minimum grade of five to pass the course. |
Basic |
Josep Domingo-Ferrer, Inference Control in Statistical Databases, 2002, Springer-Verlag
Stegan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding techniques for steganography and digital watermarking, 2000, Artech House
|
|
Complementary |
William Rosenblatt, Digital Rights Management: Business and Technology, 2002, Hungry Minds Inc,U.S.
Jessica Litman, Digital Copyright: Protecting Intellectual Property on the Internet, 2000, Prometheus Books
|
|
Subjects that it is recommended to have taken before |
ELECTRONIC COMMERCE/17615123 | SECURITY AND HACKING IN COMPUTER NETWORKS/17615120 | CRYPTOLOGY/17615109 |
|
|
Other comments |
Es recomana que s'hagin cursat les assignatures de Criptologia i Comerç Electrònic. |
(*)The teaching guide is the document in which the URV publishes the information about all its courses. It is a public document and cannot be modified. Only in exceptional cases can it be revised by the competent agent or duly revised so that it is in line with current legislation. |
|