ICT Practitioners

ICT Practitioners
Subject Module Presentation Mode Content Contributing
Partner





PbD
methodology
PRIPARE principles
and concepts
Slides Introduce the PbD concept, the PRIPARE methodology, and its foundations, providing an overview of the related terms, and motivating ICT practitioners to adopt PbD approaches. UPM
PRIPARE
methodology: Overview
Slides Introduce the PRIPARE methodology and its steps. UPM
PRIPARE
methodology: Privacy
requirements engineering
Slides Describe the PRIPARE steps to move from privacy requirements to operational requirements UPM
PRIPARE
methodology: Privacy
impact assessment and
risk analysis
Slides
Describe the PRIPARE steps to carry out a Privacy
impact assessment and a risk analysis.
UPM
PRIPARE
methodology: Best
practices
Slides

Describe the best practices selected by PRIPARE, and how they can be applied within the PRIPARE methodology
UPM
Privacy
Patterns
Privacy patterns Slides In this module we introduce privacy design patterns, their possibilities and limitations UULM
Privacy
Motivation
Failures in Privacy
Systems
Slides

references to articles
In this module we are going to examine some
examples of failures in privacy systems
UULM
Privacy
Strategies
Minimise, Hide, Separate, Aggregate, Inform, Control, Enforce, Demonstrate Slides This module explains Hoepmans privacy design strategies, i.e., it examines abstract ways how to achieve privacy. Privacy Strategies are more abstract than patterns UULM
Location Privacy Location privacy (slides
and exercises)
Slides, exercises
We introduce the topic of location privacy UULM
PET Privacy Enhancing Tehnologies Slides PETs, what are they, examples of PETs, anonymous credentials. Gradiant