Module ICL-3007:
Work-Based Project - PESTLE Evaluation (including GDPR)
Module Facts
Run by School of Computer Science and Electronic Engineering
20.000 Credits or 10.000 ECTS Credits
Semester 1
Overall aims and purpose
This module aims to allow the student to examine the data security and PESTLE (Professional, Ethical, Social, Technological, and Environmental) concerns within their workplace. This gives a situated, genuine educational experience of applying the theory to the real-world.
Course content
Indicative content includes:
- PESTLE
- GDPR
- Computer Misuse Act
- Computer Fraud and Abuse Act
- Data Protection Act
- Data Security Standards
- PCI DSS
Assessment Criteria
threshold
Equivalent to 40%. Uses key areas of theory or knowledge to meet the Learning Outcomes of the module. Is able to formulate an appropriate solution to accurately solve tasks and questions. Can identify individual aspects, but lacks an awareness of links between them and the wider contexts. Outputs can be understood, but lack structure and/or coherence.
good
Equivalent to the range 60%-69%. Is able to analyse a task or problem to decide which aspects of theory and knowledge to apply. Solutions are of a workable quality, demonstrating understanding of underlying principles. Major themes can be linked appropriately but may not be able to extend this to individual aspects. Outputs are readily understood, with an appropriate structure but may lack sophistication.
excellent
Equivalent to the range 70%+. Assemble critically evaluated, relevent areas of knowledge and theory to constuct professional-level solutions to tasks and questions presented. Is able to cross-link themes and aspects to draw considered conclusions. Presents outputs in a cohesive, accurate, and efficient manner.
Learning outcomes
-
Apply theoretical aspects of data security and PESTLE concerns to a real business.
-
Communicate the findings in an appropriate fashion - including references to appropriate statue, regulation, or standards - to interested parties.
-
Assess the data security/protection state of the workplace and recommend any changes required.
Assessment Methods
Teaching and Learning Strategy
Hours | ||
---|---|---|
Work-based learning | Work-based investigation of data protection/security. |
130 |
Lecture | Traditional Lecture (1 hr x 12) |
12 |
Private study | Private study, including individual assessments. |
58 |
Transferable skills
- Literacy - Proficiency in reading and writing through a variety of media
- Numeracy - Proficiency in using numbers at appropriate levels of accuracy
- Computer Literacy - Proficiency in using a varied range of computer software
- Self-Management - Able to work unsupervised in an efficient, punctual and structured manner. To examine the outcomes of tasks and events, and judge levels of quality and importance
- Exploring - Able to investigate, research and consider alternatives
- Information retrieval - Able to access different and multiple sources of information
- Inter-personal - Able to question, actively listen, examine given answers and interact sentistevely with others
- Critical analysis & Problem Solving - Able to deconstruct and analyse problems or complex situations. To find solutions to problems through analyses and exploration of all possibilities using appropriate methods, rescources and creativity.
- Presentation - Able to clearly present information and explanations to an audience. Through the written or oral mode of communication accurately and concisely.
- Argument - Able to put forward, debate and justify an opinion or a course of action, with an individual or in a wider group setting
- Self-awareness & Reflectivity - Having an awareness of your own strengths, weaknesses, aims and objectives. Able to regularly review, evaluate and reflect upon the performance of yourself and others
Subject specific skills
- Knowledge and understanding of facts, concepts, principles & theories
- Problem solving strategies
- Recognise legal, social, ethical & professional issues
- Knowledge and understanding of commercial and economic issues
- Knowledge of management techniques to achieve objectives
- Knowledge of information security issues
- Recognise risk/safety for safe operation of computing equipment
- Deploy tools effectively
- Development of general transferable skills
- Deploy systems to meet business goals
- Knowledge of systems architecture
- Specify, deploy, verify and maintain information systems
- Knowledge and/or understanding of appropriate scientific and engineering principles
- Principles of appropriate supporting engineering and scientific disciplines
Courses including this module
Compulsory in courses:
- H115: BSc Applied Cyber Security (Degree Apprenticeship) year 3 (BSC/ACS)
- H119: BSc Applied Cyber Security (Coleg Cambria) year 3 (BSC/ACSC)