Studiegids

nl en

Governance of Cyber Security

Vak
2015-2016

Admission requirements

Course for students enrolled in master program Crisis and Security Management

Description

‘Contested spaces’, where a state is unable or unwilling to exert its authority, have frequently been defined as threats to international security in the past twenty years. These were often geographical areas synonymous with ‘failed states’, where non-state actors such as terrorist or criminal organisations would seek sanctuary. According to public perception cyber space has now become one of these ‘ungoverned spaces’, out of reach for governments and businesses alike. Cyber-crime and cyber-terrorism have proliferated as a result, and according to some the threat of cyber war looms ahead. This cyber-governance module will look at where responsibility for cyber-security in the public-private-individual triangle is placed and how government institutions have shared, distributed or obtained cyber tasks and duties. Strategies and doctrines will also be covered, and how they combine with traditional state responsibilities such as defence (offensive and defensive) and intelligence (espionage).

In practice, however, internet is not so much ungoverned as subjugated to alternative forms of governance, often by non-state actors. Although relatively little has as yet been written in academia on cyber governance, this module will explore the customary theories from public administration, conflict studies and international relations perspectives.

Cyberspace has important repercussions for conflict studies. Traditional concepts such as sovereignty, power, war, espionage and terrorism could face fundamental changes as global internet connectivity and dependence continues to grow. This module will look at competing views on cyber threats (from a ‘digital pearl harbour’ to cyber-operations in support of conventional military attacks), working through definitions, concepts and policies to sketch some of the possible implications for future inter and intra-state relations.

Course objectives

After the course the student:

  • Understand the basic concepts of cyber space and the Internet

  • Understand and grasps the historical developments in cyber governance and how they have led to the current state of affairs

  • Understands the possible implications of cyberspace and the internet for traditional notions such as sovereignty, power, war and conflict, espionage, terrorism and crime.

  • Understand the concept of cyber security through a risk management perspective

  • Understand the interests, motivations and behaviour of key actors in the realm of cyber governance

  • Autonomously collect, interpret, and analyze primary and secondary source materials.

  • Conduct an independent analysis of an issue in cyber security governance by writing a scientific paper based upon the concepts and theories adopted in this course.

Timetable

Timetable

Mode of instruction.

Interactive lectures and guest speakers

Course Load

  • total study load 140 hrs., of which: – contact hours: 21 – self-study hours: 119

Assessment method

  1. Students have to write a short midterm assignment on a particular subject of cyber security governance to show that they understand the implications of cyber-space internet for traditional notions such as sovereignty, power, war and conflict, espionage, terrorism and crime. This short paper counts for 25 % of the final grade.
    1. Students have to write a research paper in which they apply conceptual knowledge of cyber governance theories to specific case-studies (75% of total grade).
    2. When guest lectures are planned, students have to prepare questions for the speakers based on the literature of that week.

Failed partial grades weighing less than 30% should be compensated by a passed partial grade weighing more than 30%. The calculated grade must be at least 5,50 in order to pass the course.

The resit of the research paper takes the same form

You can find more information about assessments and the timetable exams on the website.
Details for submitting papers (deadlines) are posted on Blackboard.
On the Public Administration front page of the E-guide you will find links to the website, uSis and Blackboard.

Resit
Students will be permitted to resit an examination if they have taken the first sit and have a mark lower than 5.5 or with permission of the Board of Examiners.

Resit written exam
Students that want to take part in a resit for a written exam, are required to register via uSis. Use the activity number that can be found on the ‘timetable exams’.

Blackboard

Yes; BB will become available two weeks before the course starts and be used for the hand in of the assignments

Reading list

To be announced

Registration

Use both uSis and Blackboard to register for every course.
Register for every course and workgroup via uSis. Some courses and workgroups have a limited number of participants, so register on time (before the course starts). In uSis you can access your personal schedule and view your results. Registration in uSis is possible from four weeks before the start of the course.
Also register for every course in Blackboard. Important information about the course is posted here.

Contact

André Hoogstrate : a.j.hoogstrate@cdh.leidenuniv.nl
Sergei Boeke: s.boeke@cdh.leidenuniv.nl

Remarks