Revise and finalize the report
- Due 18 Oct 2021 by 18:00
- Points 5
- Submitting a file upload
- File types pdf
Format: pdf, ACM style (link), double column.
Length: 6-8 pages, including abstract.
Content: Introduction to your topic (check the instructions for the draft again for what that entails) in more depth than the presentation, summary of the discussion you documented. Include a bibliography with references to all sources used; most of them should be scientific publications. Audience: computer scientists somewhat familiar with privacy-enhancing technologies.
This is the final version and should take into account any feedback you received on the draft version. Check the rubric.
Rubric
Keep in mind that 33 students have already been assessed using this rubric. Changing it will affect their evaluations.
Criteria | Ratings | Pts | |||||
---|---|---|---|---|---|---|---|
This criterion is linked to a learning outcome
explain and use basic terminology in the area correctly,
Clear, concise, and correct.
threshold:
2.0 pts
|
|
pts
--
|
|||||
This criterion is linked to a learning outcome
find and use documentation of privacy-related problems and technologies
Relevant, well-written, well-reasoned, with appropriate level of abstraction, timely (early if influential, otherwise not outdated), peer-reviewed, scientific, number of papers published at respectable venues. If appropriate, news, opinion, popular-science resources for motivation.
threshold:
2.0 pts
|
|
pts
--
|
|||||
This criterion is linked to a learning outcome
analyse descriptions of PET systems with regard to their protection of privacy and function
whenever applicable: identify vulnerabilities from PET system descriptions, predict their equivalent threat, and choose countermeasures against identified threats and show their efficiency, compare countermeasures and evaluate their side effects.
threshold:
2.0 pts
|
|
pts
--
|
|||||
This criterion is linked to a learning outcome
demonstrate an overview of privacy enhancing technologies (PET)
threshold:
3.0 pts
|
|
pts
--
|
|||||
This criterion is linked to a learning outcome
identify threats against privacy in an IT system
threshold:
3.0 pts
|
|
pts
--
|
|||||
This criterion is linked to a learning outcome
present and explain their reasoning to others
Clear, concise, logical, with appropriate level of abstraction, substantiated.
threshold:
2.0 pts
|
|
pts
--
|
|||||
follow format instructions
threshold:
pts
|
|
pts
--
|
|||||
Total points:
35
out of 35
|