Course Outline. ZHSS8441: Cyber Security and World Politics S2 2015. Course Staff. Student Learning Outcomes. Introduction/Context

Similar documents
PHILOSOPHY: THINKING ABOUT REASONING

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS. Criminology and Criminal Justice

Faculty of Science School of Mathematics and Statistics

Australian School of Business School of Information Systems, Technology and Management INFS4806 / INFS5906 INFORMATION SYSTEMS FORENSICS

Course outline. Code: SCS172 Title: Social Work and Human Services Practice

POSTGRADUATE PROGRAMME SPECIFICATION

HEYTHROP COLLEGE, UNIVERSITY OF LONDON. 1. Title: MA Philosophy of Religion and Ethics in Education

INFS3631 Innovation and Technology Management. Course Outline Semester 2, 2014

ACCT5949 Managing Agile Organisations

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

COURSE OR HONOURS SUBJECT TITLE: PG Cert/Diploma/MSc Communication, Advertising and Public Relations

Henley Business School at Univ of Reading. Postgraduate Pre-Experience Board of Studies

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

MECH9620 COMPUTATIONAL FLUID DYNAMICS

Programme Specification ( )

School of Education. EDST5142 Leading Educational Change. Semester 1

Course outline. Code: EDU101 Title: Human Development and Learning

Programme Specification and Curriculum Map for MA Global Governance and Public Policy

Programme Specification PG Cert/ PG Dip/ MA Integrative Counselling

ADHE W Proposal and Grant Writing in Adult and Higher Education

School of the Arts and Media

CMPS 109 Presentation Software

GENS9004 /PSYC1022 Psychology of Addiction

MACQUARIE UNIVERSITY MASTER OF ACCOUNTING (CPA EXTENSION) UNIT GUIDE

Australian School of Business School of Banking and Finance FINS 5533 REAL ESTATE FINANCE AND INVESTMENT

MA EDUCATION MA Education: Childhood and Youth Studies MA Education: Higher Education MA Education: Leadership and Management MA Education: TESOL

Programme Specification

BIRMINGHAM CITY UNIVERSITY. MA Criminology. Programme Specification

MA in Health and Social Care

International Communications and Development

1. Programme title and designation Intelligence and International Security

INFS 5848 PROJECT, PORTFOLIO and PROGRAM MANAGEMENT

Nottingham Trent University Course Specification

Course outline. Code: CMN120 Title: Public Relations: Contemporary Perspectives

ORIENTATION TO THE DOCTOR OF EDUCATION (EdD) Information Package 2011

PROGRAMME SPECIFICATION

Proposal submitted by

COURSE SYLLABUS PADM Introduction to Nonprofit Organizations Fall 2015

The University of New South Wales School of Aviation. AVIA5001 Law & Regulation in Aviation Course Outline

Henley Business School at Univ of Reading. Chartered Institute of Management Accounting (CIMA) Certificate Level (C01 to C05)

ART 315 WORLD PERSPECTIVES IN ART HISTORY Spring 2014 Online Course Professor Karen Schifman

Programme Specification 2015/16

Course Syllabus History 2620D U.S. History from 1865 Online Class

Course outline. Code: INF701 Title: Management Informatics

Programme Specification

MASTER OF SCIENCE DEGREE IN ACCOUNTING HANDBOOK

School of Social Work and Human Services. Assessment Policies

School of Education EDST1101/SAED2401. Educational Psychology. Semester 1, 2014

MMAN4400 ENGINEERING MANAGEMENT

Programme Specification (Postgraduate) Date amended:

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

Programme Specification. BA Early Childhood Studies (Top Up) Valid from: Sept 2015 Programme Code: X310

MSc Financial Risk and Investment Analysis

Australian School of Business School of Economics ECON 5111 ECONOMICS OF STRATEGY

master s courses fashion & law

College of Life and Natural Sciences PROGRAMME HANDBOOK. for. BSc (Hons) Psychological Studies

Programme Specification

Programme name International Business Law (distance learning)

THE UNIVERSITY OF NEW SOUTH WALES

ACCT5910 BUSINESS ANALYSIS AND VALUATION

Course outline. Code: EDU775 Title: Education for International Development (Project)

ADMINISTRATION OF JUSTICE 002 CRIMINAL LAW SYLLABUS

AGSM MBA Programs 2015 LEADERSHIP IN A COMPLEX ENVIRONMENT. Semester 2, Course Overview. Draft

Any special criteria equivalent MA Public Policy N/A 3. Nested award Award Title Credit value ECTS

INFS4830 SOCIAL MEDIA AND NETWORKING

Unit Outline: KXA352 Software Engineering Project B

Criminal Justice Honours

PROGRAMME SPECIFICATION: FULL-TIME AND PART-TIME MBA

Approved by the Health and Care Professions Council

Programme Curriculum for Master s Programme in European and International Tax Law

INFS 5848 PROJECT, PORTFOLIO and PROGRAM MANAGEMENT

Developing your Graduate Attributes: MA in Marketing

POSTGRADUATE PROGRAMME SPECIFICATION

UNIVERSITY OF ULSTER COURSE SPECIFICATION COURSE TITLE: Postgraduate Diploma/MSc in Political Lobbying and Public Affairs 1.

FINAL COURSE OUTLINE BUSI2025 International Business Semester 2, 2013

University of Cambridge: Programme Specifications

How to use the Online Module Enrolment Application

1. Programme title and designation French Language and Culture

Teaching institution: Institute of Education, University of London

Programme approval 2006/07 PROGRAMME APPROVAL FORM SECTION 1 THE PROGRAMME SPECIFICATION. ECTS equivalent

Course Outline. School of Photovoltaic & Renewable Energy Engineering SOLA5051/SOLA9015. Life Cycle Assessment. Session 2, Course Coordinators

UNIVERSITY OF BRADFORD Faculty of Social Sciences Division of Economics Programme title: MSc in Financial Economics

Awarding Institution: UCL Institute of Education, University College London

MBA Business Administration (Information Technology)

MSc in Management and Entrepreneurship

HTMT 210, Principles & Practices in Hospitality & Tourism

Transcription:

Course Outline ZHSS8441: Cyber Security and World Politics S2 2015 School of Humanities & Social Sciences Course Staff Professor Toni Erskine Room 28-205 e-mail: t.erskine@adfa.edu.au ph: 6268 6254 E-mail is always the best way to contact me with any questions or concerns relating to the course. I check e- mail regularly during the teaching session and will respond to you as quickly as possible. I am also available for face-to-face meetings, phone consultations or Skype discussions during normal working hours. If you would like to speak to me, please email me first to arrange an appointment. Introduction/Context Cyber security is increasingly dominating debates about Internet technology. Despite the fact that the Internet is a quarter of a century old, thinking about how it can impact on, and is shaped by. world politics is relatively undeveloped. There can be little doubt that the challenges and opportunities of integrating cyber technology into practices and conceptions of global order, security, peace, war, equity, justice and cooperation will be the work of generations. This course introduces post-graduate students to some of the key debates currently taking place and invites them to develop a critical approach to the assumptions that underpin them. This course will provide postgraduate students with a detailed and comprehensive understanding of some of the most significant incidents and actors in cyber security, coupled with an understanding of some of the challenges of addressing this particular problem. This combined focus on functional and conceptual factors helps students to develop a perspective suitable to creative and powerful analysis rather than reactive, bounded thinking. This will equip students with the background to move beyond the parameters of existing thinking on cyber security in practice, in policy and in terms of what it means to be secure in the Information Age. This course will complement the range of courses currently being taught at the postgraduate level as part of both the International and Political Studies programme offered through HASS and the new Cyber Security programme offered through SEIT. Student Learning Outcomes At the end of this course students should be able to: LO1. Demonstrate knowledge and understanding of the threats and opportunities that cyber insecurity offers to actors in world politics. [Insert course name] COURSE CODE: [insert course code] LO2. Demonstrate knowledge and understanding of the Semester 1, 2012 [insert #] UOC range and nature of significant actors and major incidents in cyber security. School of [insert school name] LO3. Apply a theoretical understanding of security generally and cyber security more specifically to case studies of cyber vulnerabilities and responses. LO4. Critically evaluate some of the major policy and regulatory responses that have emerged to address cyber security vulnerabilities. LO5. Demonstrate knowledge and understanding of the challenges of making a distinction between cyber war, cyber espionage and cyber crime. Students will also develop the following generic graduate attributes in the course of undertaking the course activities and mastering the knowledge content: GA1. The necessary skills to gather, organise and employ evidence from a variety of primary and secondary sources in order to build a coherent and compelling argument. GA2. A sophisticated understanding of the relevant disciplinary material. GA3. The capacity for analytical and critical thinking and for creative problem-solving. GA4. The ability to engage in independent and reflective learning. GA5. Skills for effective communication. Resources for Students There is no core text book for this module. Cyber Security particularly in the context of world politics is a new area of study and we are looking at some diverse issues in this module. Instead of relying on a single

book, the reading material is gathered from the most significant and up to date peer-reviewed journals, as well as from some book chapters. You will also read reports, policy documents and, in some cases, we ve included online material like lectures and talks as supplementary material. Course Schedule Background and Concepts Week 1 Week 2 Week 3 Introduction and Overview Hard case studies: Stuxnet and Estonia Conceptions of Cyber Security Threats, Opportunities and Targets: Global Uncertainty Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Technological Issues 1: Attribution Technological Issues 2: Attack Vectors Cyber-crime Cyber-espionage Cyber War China Online Policy and Legal Responses Week 10 Strategy and Policy: US/Australian relations Course Evaluation and Development This will be the second time that this course is run. It will be based on my experience of teaching postgraduate courses in International Relations (IR) at Cambridge University, Aberystwyth University, and, most recently, UNSW Canberra over the past 16 years. I warmly welcome your feedback on the course, both formally in the form of CATEI, and informally throughout the semester. Teaching Strategies The course comprises three main sections; Background and Concepts (weeks 1 3), Threats, Opportunities and Targets (weeks 4 9) and Policy and Legal Responses (weeks 10 12). We have one concluding week in which you will have an opportunity to look more broadly at the material we cover in the first 12 week and reflect on what you have learned, ask any questions you still have and discuss how your ideas might have been reinforced or changed over the semester. Readings for each week will be on Moodle, as will a range of supplementary reading that you may dip into if you have time or if you feel that you need more background on any of the topics. The supplementary material can also serve as a starting point for researching your essays. By doing the weekly reading and engaging in discussion through the online forum, you will learn about the key issues, read some of the important texts, and be able to work out (with your colleagues) your own views on these complex and challenging issues. The two other assessments provide an opportunity for you to go deeper in your understanding, analysis and knowledge of cyber security in world politics. The emphasis in these assignments is on the quality of your research and your argument. Remember that many of these debates remain highly contested so responses need to be well argued. your Week 11 Week 12 Week 13 Reading break International Law and Cyber Security Ethics in Cyberspace? Conclusion Like most classes of this nature, the more students put into the course, the more they will get out of it. My role as course convenor is to push and challenge you. By this I mean to expose you to some key global issues, help you to critically engage with a range of perspectives and arguments made in relation to them, and, however you interpret or explain (or, indeed, reject) these positions, insist that you have well-informed reasons for holding your position. Moodle: https://moodle.telt.unsw.edu.au/login/index.php (zpass required). 2

For enrolment and login issues contact: IT Service Centre Email: itservicecentre@unsw.edu.au Internal: x51333 External: (02) 9385-1333 International: +61 2 9385 1333 For ALL other Moodle issues: External TELT Support Email: externalteltsupport@unsw.edu.au Internal: x53331 External: (02) 9385-3331 International: +61 2 938 53331 UNSW Moodle supports these web browsers: Recommend Win 7, Mac OSX 10.7+:» Internet Explorer 9.0+» Mozilla Firefox 15+» Google Chrome 22+» Safari 6+ ** Google Chrome is recommended for optimal compatibility ** Addons and Toolbars can affect the browsers performance. Assessment Requirements will be asked to package together his or her five best forum contributions (from five separate weeks), reflect on them and give them a little context. Each students will be assessed on the level of engagement with and understanding of the topics; the engagement with and responses to questions raised (and his or her own raising of questions); and reflections on his or her own learning and intellectual development. Obviously, the preparation for this assignment involves students doing the required reading for each week, forming questions, and regularly making quality contributions in the weekly forums. Please remember quality matters. Brief question raising and direct on-the-point posts are usually preferable to longer more verbose posts (maximum post length is 200 words). All written work should be submitted via Moodle. Assessment Criteria: Compulsory components or minimum performance standards You must submit all pieces of assessment in order to pass the course. Full details for each piece of assessment can be found later in the course manual, and on Moodle. Outcomes-Assessment Matrix Assessment item LO 1 LO 2 LO 3 LO 4 LO 5 Assessment Due Date Weighting Short Essay (1500 words) Major Essay (2500-3000 words) 1 Sept. 30% 20 Oct. 50% Journal 3 Nov. 20% The question for the Short Essay will be made available on Moodle at the start of the course, and will involve knowledge and understanding of the first three weeks of teaching. The Major Essay involves two parts: the essay itself, and an online presentation. Students will choose a topic from weeks 4-12, and, after completing the required reading, will post a position in response on the forum at the beginning of the relevant week this should be no more than 600 words and must engage with the literature. Students are then expected to respond to other presentations and to be involved in the general discussion that follows. The research essay should be an expansion and revaluation of their original presentation. Journal: All students are expected to both contribute to the success of the course and to engage and learn from all of its aspects. At the end of the course each student Short Essay X X X Major Essay + Presentation X X X X X Journal X X X X X Late Submission of Assessment A late penalty of 5 per cent per day will apply to any assessable work delivered after the due date. The reinstatement of lost marks will be considered (but not guaranteed) after the period of assessment, and will be granted (on, for example, medical or compassionate grounds) only if the appropriate supporting documentation is provided. Please contact the course convenor if you have any questions about this policy. Academic Honesty and Plagiarism Plagiarism is using the words or ideas of others and presenting them as your own. Plagiarism is a type of intellectual theft. It can take many forms, from deliberate cheating to accidentally copying from a source without acknowledgement. For more information, please refer to the UNSW Canberra Academic Misconduct website (https://my.unsw.edu.au/student/academiclife/assessme nt/studentconductpolicy.html)..

Getting Started Guide http://sas.unsw.adfa.edu.au/publications/pdf/gettin g_started.pdf f The Getting Started Guide has lots of useful information regarding: Where to get help Administrative matters Getting your passwords set up How to log on to Moodle Accessing the Library and other areas. Cricos Provider Code: 00100G The University of New South Wales Canberra 4