There is a more recent version of this academic item available.

Overview

What if companies claimed ownership of your personal details or photos and charged you to prevent them being made public? Or if devices were controlled by buggy software or software with potentially malicious backdoors? The pervasive nature of computing in today’s society puts a great deal of responsibility on IT … For more content click the Read More button below.

Conditions for Enrolment


Completed more than or equal to 144 UOC in SENGAH, BINFAH or COMPBH

Prerequisite: COMP2511

Delivery

In-person - Standard (usually weekly or fortnightly)

Course Outline

To access course outline please visit below link (Please note that access to UNSW Canberra course outlines requires VPN):

Fees

Pre-2019 Handbook Editions

Access past handbook editions (2018 and prior)