MG492 Half Unit
Data Governance: Privacy, Openness and Transparency
This information is for the 2018/19 session.
Dr Edgar Whitley NAB3.32
This course is available on the CEMS Exchange, Global MSc in Management, Global MSc in Management (CEMS MiM), Global MSc in Management (MBA Exchange), MBA Exchange, MRes/PhD in Management (Information Systems and Innovation), MSc in Management (1 Year Programme), MSc in Management of Information Systems and Digital Innovation and MSc in Media and Communications (Data and Society). This course is available as an outside option to students on other programmes where regulations permit.
The course provides a detailed consideration of the key elements of the concept of informational privacy, the open data movement and transparency. These topics lie at the intersection of diverse contemporary issues including, public sector reform, human rights, digital ecosystems and social networking, and the global and national regulation of business. The course content is international in focus, and reviews contemporary issues arising from new technologies, new policies of governments, new practices and business models in the private sector. Topics include personal privacy and identity systems; motivations for information sharing and transparency and its potential for driving beneficial change; transformations in the management of government information and processing practices; the technological and regulatory challenges faced by public sector and business; the protection of sensitive personal data including medical and financial information; data-mining in the context of national security and anti-terrorism policies; communications surveillance policies; behavioural studies of privacy attitudes and the evolution of trust and consent in online environments. The course enables students to develop their understanding of the challenges presented by new informational regimes, their regulatory development and emerging governance structures.
20 hours of lectures and 10 hours of seminars in the LT.
A reading week will take place during Week 6. There will be no teaching during this week.
Classes are based around reading and discussing selected journal articles. Formative feedback is provided on class participation. In addition, students will complete a formative essay plan on which feedback will be provided.
• Elliot, M., Mackey, E., O’Hara, K., and Tudor, C. (2016). The anonymization decision-making framework, UKAN Manchester (available at http://ukanon.net/ukan-resources/ukan-decision-making-framework/).
• ENISA (2015). Privacy and Data Protection by Design, (available at http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-and-data-protection-by-design).
• Gleibs, I. H. (2014). Turning virtual public spaces into laboratories: Thoughts on conducting online field studies using social network sites, Analysis of Social Issues and Public Policy, 14(1), 352–370.
• Greenleaf, G. (2012). Independence of data privacy authorities (Part I): International standards, Computer Law & Security Review 28(1), 3–13.
• Janssen, M., Charalabidis, Y., and Zuiderwij, A. (2012). Benefits, Adoption Barriers and Myths of Open Data and Open Government, Information Systems Management 29(4), 258–268.
• Justice Committee (2012). Post-legislative scrutiny of the Freedom of Information Act 2000, In particular Conclusions and Recommendations, (available at http://www.publications.parliament.uk/pa/cm201213/cmselect/cmjust/96/9602.htm).
• Kaye, J., Whitley, E. A., Lund, D., Morrison, M., Teare, H., and Melham, K. (2014). Dynamic Consent – A Patient Interface for 21st Century Research Networks, European Journal of Human Genetics 23(2), 141–146.
• Murray, A. (2010). Chapter 18: Data protection, in Information technology law: the law and society , Oxford University Press Oxford
• Ozdemir, Z. D., Smith, H. J., and Benamati, J. H. (2017). Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study, European Journal of Information Systems 26(6), 642–660.
• Posner, R. A. (2006). Rights of privacy, in Not a Suicide Pact: The Constitution in a Time of National Emergency , Oxford University Press Oxford
• Solove, D. J. (2008). Privacy: A concept in disarray, in Understanding privacy , Harvard University Press Cambridge, Mass., 1–11
• Whitley, E. A., Gal, U., and Kjaergaard, A. (2014). Who do you think you are? A review of the complex interplay between information systems, identification and identity, European Journal of Information Systems 23(1), 17–35.
Coursework (20%, 800 words) and essay (70%, 5000 words).
Class participation (10%) in the LT.
10% class participation.
20% 800 word “blog” article that summarises the key argument of the research essay.
70% 5000 word research essay on an approved topic .
Total students 2017/18: 63
Average class size 2017/18: 15
Controlled access 2017/18: Yes
Lecture capture used 2017/18: Yes (LT)
Value: Half Unit
Personal development skills
- Team working
- Application of information skills
- Commercial awareness
- Specialist skills
Course survey results
(2014/15 - 2016/17 combined)1 = "best" score, 5 = "worst" score
The scores below are average responses.
Response rate: 84%
Reading list (Q2.1)
Course satisfied (Q2.4)