Show/hide contentOpenClose All
Curricular information is subject to change
On completion of this module, students will be able to: Understand how encryption technologies and their counter-agents work; Situate the cybersecurity industry in a historical and contemporary economic and industrial context; Relate the impact of cybersecurity technologies to social and political issues drawn from other disciplines; Understand the functional, ideological, and economic inputs that inform decisions to implement cybersecurity technologies at all scales in society.
|Student Effort Type||Hours|
|Specified Learning Activities||
|Autonomous Student Learning||
Not applicable to this module.
|Remediation Type||Remediation Timing|
|In-Module Resit||Prior to relevant Programme Exam Board|
• Feedback individually to students, on an activity or draft prior to summative assessment
• Feedback individually to students, post-assessment
Summative feedback on in-class tests when set. Formative feedback in-class on work-in-progress group assignment. Summative feedback on completed activities.
|Dr Quinn Dupont||Lecturer / Co-Lecturer|