Advances in information and communications technology have greatly improved our ability to generate, store, retrieve, sort, filter, send, and receive information. This enhanced ability to process information has increased the value of information goods and has lowered the costs of manipulating and distributing information. It has also, however, significantly increased the risk of illegal access to and tampering with information stored in information and communications systems. It has also eroded the zone of privacy around personal information, i.e., the letters people write, the books and articles they read, their financial and medical records, and even the places they visit. Now, the Web pages people visit and the email they write are monitored by corporations for “behavioural targeting” advertising, and online book sellers keep track of book purchases. A vast amount of confidential financial and medical data is now stored in the “cloud,” where it is vulnerable to hackers and subpoenas. Increasingly, GPS and cell phones allow corporations and the government to track people’s physical location in real time. People are largely unaware of much of this increased risk in information security and erosion of personal privacy.
This course focuses on the laws, policies, and best practices designed to meet these concerns and some of the theories proposed for the reform of these laws, policies, and best practices. It aims to equip the students with sufficient knowledge in cloud and its applications which will help the students in choosing their academic track, and edge on their employment and professional performance especially in IT industry.