Secure Big Data
Seminar, 2.00 ECTS
The course offers an application-oriented study of Big Data data models, architectures and principles. Storage and database systems in the Big Data environment are tested using practice-oriented scenarios. In particular, the security aspects of these technologies, as well as related best practices, are discussed. Special care is taken to provide enough room for discussion of current technological developments in the area of ??Big Data.
The students acquire detailed understanding of data security, especially the security of Big Data technologies. In addition to that, the students will be able to successfully participate in scientific research work in order to present his/her research impressively to the scientific community. He/ she is also able to create and present scientific posters.
Recommended or required reading and other learning resources / tools
Books: Natan R. Database Security, Ambler S. Database Refactoring; Marz N. Big Data; King, Ronald (2012). Research Methods for Information Systems. Orca Dorcauk Orphan; Hoboken, NJ. Robson, C. (2002). Real World Research. Blackwell Publishing, Oxford. Lebrun, J.-L.
Mode of delivery
2 ECTS seminar
Prerequisites and co-requisites
modul Information Systems
Assessment methods and criteria