AMST40560 The Global Politics of Cyber Security

Academic Year 2023/2024

Cyber security is no longer the exclusive preserve of disciplines like computer science or computer engineering. Rather, understanding cyber security has become a critical skill for all of us. Importantly, a previous knowledge of cyber security is not required to successfully complete this module.

The module will especially look at the ways in which cyber technologies, including the internet, are having a growing impact on global politics – and our lives. We will investigate the meaning of the Information Revolution and Cyber Space; we will analyze the extent to which cyber techs have changed traditional features of global politics with particular attention to the role of the United States as a trend setter in cyber space; and we will discuss cyber techs' implications for international conflict and the development of international norms, among other topical issues.

Show/hide contentOpenClose All

Curricular information is subject to change

Learning Outcomes:

At the end of this module, you will gain a sophisticated understanding of the effects that emerging cyber technologies are having on global politics and contemporary society.

Indicative Module Content:

Cyber technologies' impact on global politics and contemporary society, including how state and non-state actors:
- wage war
- collect intelligence
- negotiate
- understand security
- spread disinformation
- privacy
- international law and norms

Student Effort Hours: 
Student Effort Type Hours
Seminar (or Webinar)

200

Total

200

Approaches to Teaching and Learning:
Key teaching and learning approaches used in the module include:
active/task-based learning;
peer and group work;
debates;
student presentations.
 
Requirements, Exclusions and Recommendations
Learning Recommendations:

No particular previous knowledge of IT is required. However, it would be very useful to familiarize with the language, concepts, and politics of cyber security by reading newsletters like POLITICO 'Morning Cyber Security' or The Washington Post 'Cybersecurity 202' or similar.


Module Requisites and Incompatibles
Not applicable to this module.
 
Assessment Strategy  
Description Timing Open Book Exam Component Scale Must Pass Component % of Final Grade
Continuous Assessment: Participation in in-class activities including individual and group presentations; debates; and other activities. Attendance is critical. Throughout the Trimester n/a Graded No

30

Essay: 3000 word essay. The essay will explore one or more significant issues concerning the global politics of cyber space. Coursework (End of Trimester) n/a Graded No

70


Carry forward of passed components
No
 
Remediation Type Remediation Timing
In-Module Resit Prior to relevant Programme Exam Board
Please see Student Jargon Buster for more information about remediation types and timing. 
Feedback Strategy/Strategies

• Feedback individually to students, post-assessment
• Group/class feedback, post-assessment
• Peer review activities
• Self-assessment activities

How will my Feedback be Delivered?

Students will receive individual and group feedback on their in-class activities throughout the duration of the module. Feedback on end-of-term coursework will instead be provided individually if requested.

The complete reading list will be presented at the beginning of the module and published on Brightspace.
Timetabling information is displayed only for guidance purposes, relates to the current Academic Year only and is subject to change.
 
Spring
     
Lecture Offering 1 Week(s) - 20, 21, 22, 23, 24, 25, 26, 29, 30, 31, 32, 33 Tues 15:00 - 16:50