Prospectus

nl en

Global Politics of Cybersecurity

Course
2021-2022

Admission requirements

Admission only after intake, please see our website.

Admission only for those who are enrolled in the governance track.

Description

This course examines the global politics of cybersecurity. National politics greatly affects cybersecurity governance, as political decisions decide national cybersecurity strategies and relevant legislation, while the ‘buzzword’ of cybersecurity is regularly deployed by political actors to advance their own projects and agendas. However, the politics of cybersecurity, like internet communications themselves, are also transnational, operating across and beyond state borders. This course therefore examines the global politics of cybersecurity, drawing on international relations and other political theories to put questions of cybersecurity in their appropriate theoretical context. It explores the conceptual underpinnings of common terms like cyber conflict, espionage, and war, and difficulties in empirical measurement, attribution and data collection. It critically examines the growth of international norm initiatives and their future potential, and the emergence of foreign interference through disinformation and social media manipulation. Finally, it expands the global politics of cybersecurity beyond interstate disputes to include alternative interpretations of security, such as those based on human rights, gender and post-colonial perspectives rooted in the global South.

Course objectives

After completing this module successfully, participants will have:

  • knowledge and understanding of the different theories on international relations and global politics, the implications of cyberspace and the internet for traditional notions such as sovereignty, power, war and conflict, espionage, terrorism and crime, and how key events have led to the current state of affairs

  • knowledge and understanding of the political challenges regarding malicious activities in cyberspace such as cybercrime, cyberwar, espionage, etc.

After completing this module successfully, participants will be able to:

  • apply conceptual knowledge of political theories and technical aspects to specific situations and case-studies;

  • translate empirical observations of cyber-events into concepts, trends and theories and communicate about these concepts in a clear and concise way;

  • apply knowledge of the global politics of cybersecurity to practical, policy-orientated questions;

  • use a sound knowledge base of the global politics of cybersecurity to determine the reliability of reporting on cybersecurity issues and contextualise new developments.

Timetable

On the right-hand side of the programme front page of the E-Prospectus you will find a link to the online timetables.

Mode of instruction

Lectures, seminars, exercises, class discussion
Core lecturer: Dr. James Shires

Assessment method

Assignment (40%)

  • 40% of final grade

  • Grade must be 5.50 or higher to pass the course

  • Re-sit of a fail is possible.

  • Re-sit will take the same form

Written exam (60%)

  • 60% of final grade

  • Grade must be 5.50 or higher to pass the course

  • Re-sit of a fail is possible.

  • Re-sit will take the same form

Reading list

Compulsory literature and literature for further consultation will be announced via Brightspace.

Registration

No registration is required for lectures and exams.

Contact

Dr. James Shires Chantal de Groot, study coordinator

Remarks

For more information see our website.