Revise and finalize the report
- Due 18 Oct 2021 by 18:00
- Points 5
- Submitting a file upload
- File types pdf
Format: pdf, ACM style (link), double column.
Length: 6-8 pages, including abstract.
Content: Introduction to your topic (check the instructions for the draft again for what that entails) in more depth than the presentation, summary of the discussion you documented. Include a bibliography with references to all sources used; most of them should be scientific publications. Audience: computer scientists somewhat familiar with privacy-enhancing technologies.
This is the final version and should take into account any feedback you received on the draft version. Check the rubric.
Rubric
Please include a title
Keep in mind that 33 students have already been assessed using this rubric. Changing it will affect their evaluations.
Criteria | Ratings | Pts |
---|---|---|
This criterion is linked to a learning outcome
explain and use basic terminology in the area correctly,
Clear, concise, and correct.
threshold:
2.0 pts
|
pts
--
|
|
This criterion is linked to a learning outcome
find and use documentation of privacy-related problems and technologies
Relevant, well-written, well-reasoned, with appropriate level of abstraction, timely (early if influential, otherwise not outdated), peer-reviewed, scientific, number of papers published at respectable venues. If appropriate, news, opinion, popular-science resources for motivation.
threshold:
2.0 pts
|
pts
--
|
|
This criterion is linked to a learning outcome
analyse descriptions of PET systems with regard to their protection of privacy and function
whenever applicable: identify vulnerabilities from PET system descriptions, predict their equivalent threat, and choose countermeasures against identified threats and show their efficiency, compare countermeasures and evaluate their side effects.
threshold:
2.0 pts
|
pts
--
|
|
This criterion is linked to a learning outcome
demonstrate an overview of privacy enhancing technologies (PET)
threshold:
3.0 pts
|
pts
--
|
|
This criterion is linked to a learning outcome
identify threats against privacy in an IT system
threshold:
3.0 pts
|
pts
--
|
|
This criterion is linked to a learning outcome
present and explain their reasoning to others
Clear, concise, logical, with appropriate level of abstraction, substantiated.
threshold:
2.0 pts
|
pts
--
|
|
follow format instructions
threshold:
pts
|
pts
--
|