CW1 (Portfolio of 3 Tasks)
The following coursework should be completed for this module:
â¢ CW1 (Portfolio of 3 Tasks)
â¢ CW2 (Presentation)
Please check below for more information.
CW 1: Portfolio of 3 Tasks (1,800 words â 70% of the final module mark)
Final deadline for all CW1 (Portfolio) tasks: Tuesday 11th January 2022, 1pm It is strongly recommended NOT to submit all 3 CW1 tasks on 11th January (final deadline), but work on them during the term and submit them by the following early submission deadlines:
o Task 1 early submission deadline: Monday 1st November, 1pm
o Task 2 early submission deadline: Monday 29th November, 1pm
o There is no early submission deadline for Task 3.
Submitting your work by the early submission deadlines will give you the opportunity to consider the feedback you will receive on your early submitted work and improve your performance in theremaining portfolio tasks. Check the marking criteria for suggestions on how to use your feedback. Please note: No re-submissions are allowed once a task has been submitted. Early submissionbdeadlines are purely for receiving feedback early and improving performance in subsequent tasks.
Task 1: Annotated bibliography - 400 words (due by either 1st Nov. 1pm or 11th Jan. 1pm)
Create a list of 4-5 sources for the following topic (same topic as CW1, Task 2) and add a few comments under each source to evaluate it in terms of relevance and quality.
Topic: Protecting Usersâ privacy through Computer Security and Forensics applications Please check the marking criteria for more details on Task 1 requirements and how to use feedback on this task.
CW1 (Portfolio), Task 2: Academic writing - 650 words (due by either 29th Nov. 1pm or 11th Jan. 1pm)
Write a short report answering the topic below:
Topic: Research the area of Protecting usersâ privacy through Computer Security and Forensics applications
Your answer should address the following:
â¢ Define how Computer Security and Forensics applications can ensure usersâ privacy.
â¢ Provide examples which demonstrate how important such Computer Security and Forensics applications are for software companies; public and private providers; and individual users.
â¢ Discuss some of the key considerations for a developer from your specialism to ensure that usersâ privacy is protected (for example, for a Computer Games developer, a Software Engineer, or a Data scientist, among others).
â¢ Offer advice to users in order to protect their privacy when using software, hardware, and personal data.
Please check the marking criteria for more details on Task 2 requirements and how to use feedback on this task.
CW1 (Portfolio), Task 3: Reflective writing - 750 words (due by 11th Jan. 1pm)
Choose 3 skills you developed in Introduction to Academic Practice. Reflect on your learning experiences in relation to these skills, addressing the following areas:
1. What is the skill you developed?
2. How did you develop it? To what extent did you develop it? Why?
3. What can you do to continue improving that skill?
4. Why is that skill important? How can you use it in other contexts?
Some examples of skills you could reflect on (the list is not exhaustive):
o Managing your time effectively;
o Being an independent learner;
o Using feedback;
o Breaking down an assignment question;
o Researching and selecting relevant sources;
o Evaluating the quality of your sources;
o Explaining and supporting your views;
o Referencing (e.g. Harvard, IEEE, Vancouver);
o Producing a well-structured text in your discipline (written or oral);
o Writing coherent paragraphs;
o Linking ideas effectively;
o Using appropriate language in your assignments;
o Designing visual aids for an academic presentation;
o Delivering an academic presentation.