Prospectus

nl en

Regulating Security in Cyberspace

Course
2019-2020

Admission requirements

Admission only after intake, see website of the Cyber Security Academy.
Admission only for those who are enrolled in the governance track.

Description

‘Regulating security on the internet’ is about law and regulation in relation to the internet. The Internet has become a critical infrastructure in our modern society. We use it at home, at work, and when in transit, to email, look up information on Google, or check in with friends via social media. This global network with its wide variety of application domains has enriched our lives and made them more fun and more efficient. But it also raises a host of legal and regulatory questions, especially in the field of security. As we have already seen in the introductory lecture on regulating the internet in the first course of this Executive Master, first and foremost, regulatory questions arise because the internet is a global network, on which individuals, businesses and governments from different countries and cultures interact.

This raises issues in relation to jurisdiction and sovereignty: legal frameworks are organised along national (or regional) lines. But if the internet has a global reach, then whose laws apply?

Second, the internet also raises all sorts of specific regulatory issues relating to our security. Is our privacy safe in a world of interconnected, always on technologies? What is the balance between storing citizens’ personal details to combat terrorism and enabling individuals to use the web, sometimes anonymously, to search for or share information, or to freely express their opinions? Is there a difference, legally and morally, between governments that store citizens’ information, and companies that store consumers’ information, and if so, why do we value these forms of collecting personal information differently?
Taken together, all of these questions lead to the following: how can we regulate the behaviours of individuals on the internet to ensure its safety and that of its users? What is the role of law in this promoting and protecting cybersecurity, and which other strategies for regulation exist, if and when law cannot deliver the proper levels of protection?
Technological developments relating to the Internet in general and cybersecurity in particular occur at dazzling speed, and this entails that regulators and policy makers need to be able to think creatively and flexibly about solutions for potential problems. This course will provide students with an understanding of the complexity of some of the fundamental legal and regulatory issues in relation to cybersecurity, and it will equip them for the multidisciplinary dialogue with policy makers and ICT specialists that is necessary to tackle these issues.

Course objectives

Participants have:

  • basic knowledge of regulation theory and the many means and ends of regulating human behaviour, of the web of key concepts in the fields of law and regulation that are relevant for the cybersecurity domain

  • advanced knowledge and understanding of the fundamental legal and regulatory issues that have emerged in relation to cybersecurity, and the relevance of design choices in the architecture of the network for both the creation and solution of these issues

  • advanced knowledge of the intricacies of specific regulatory security domains of the Internet, including social network sites (SNS), online marketplaces and Internet forums

  • awareness of the limitations of regulation in general, and of regulating cybersecurity in particular

Participants are able to:

  • present arguments pro and contra regulating security on the internet in general, to weigh good and bad outcomes when choosing specific regulatory solutions in particular cases and to present a best possible solution

  • translate complex regulatory issues, into a comprehensible, practical set of regulatory options and tools

  • engage in a multidisciplinary dialogue with policy makers and ICT specialists to tackle the regulatory issues that are raised by and on the internet, with a special focus on cybersecurity

Timetable

7 days from 9.30 until 17.00:

Thursday 12 December 2019
Friday 13 December 2019
Friday 20 December 2019
Friday 10 January 2020
Friday 17 January 2020
Friday 24 January 2020
Friday 31 January 2020 (exam)

Mode of instruction

Lectures, seminars, exercises, class discussion
Lecturers: Prof.dr. Bibi van den Berg

Course Load

5 EC

Assessment method

  • Assignment (20%)

  • Written exam (80%)

Only assessments with the weight of 30% and lower are compensable. This means that one does not have to pass an assessment if it weighs 30% or less in order to pass the course, if the average of all assessments combined is at least a 5.5. In addition, assignments weighing up to and including 30% are not re-sitable, meaning that if one failed an assessment of 30% or less one is not allowed to redo it and that assessment must be compensated by the other assessment(s).

The resit will take the same form.

Blackboard

Yes, for posting slides of lectures, relevant literature and assignments.

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard.

Registration

No registration is required for lectures and exams.

Contact

Prof.dr. Bibi van den Berg Chantal de Groot, study coordinator

Remarks

For more information see the website of the Cyber Security Academy.