MIS41240 The Encrypted Information Society: Cybersecurity, Privacy, and Freedom in Context

Academic Year 2019/2020

This module contextualizes the cybersecurity industry, its technology, and its social impact. It adopts the broadest possible view of cybersecurity by locating the emergence of today’s cyber technologies in early systems of code, analyzes the philosophical theories implicit in such technologies, develops a political economy of the contemporary industry, situates predominant rhetoric and ideology about efficacy and freedom, and explores the wide-ranging social and political impacts that result from the ubiquity of encryption technologies. The module ties scholarly texts to real-world case studies, ranging from hacking and crime to corporate espionage to cyberwar. This module provides the groundwork for an argument that rejects simple binaries of “security” and “insecurity,” questions claims of unfettered freedom through technology, and contextualizes the rapidly growing $100-200 billion industry within larger labour, economy, and technology movements.

Show/hide contentOpenClose All

Curricular information is subject to change

Learning Outcomes:

On completion of this module, students will be able to: Understand how encryption technologies and their counter-agents work; Situate the cybersecurity industry in a historical and contemporary economic and industrial context; Relate the impact of cybersecurity technologies to social and political issues drawn from other disciplines; Understand the functional, ideological, and economic inputs that inform decisions to implement cybersecurity technologies at all scales in society.

Student Effort Hours: 
Student Effort Type Hours


Specified Learning Activities


Autonomous Student Learning




Approaches to Teaching and Learning:
Readings, critique. Case studies. Independent and team research for poster presentations. 
Requirements, Exclusions and Recommendations

Not applicable to this module.

Module Requisites and Incompatibles
Not applicable to this module.  
Assessment Strategy  
Description Timing Open Book Exam Component Scale Must Pass Component % of Final Grade
Continuous Assessment: Assessment encompassing: classroom quizzes; Learning Log; In-class exams; Group assignment. Throughout the Trimester n/a Graded Yes


Carry forward of passed components
Remediation Type Remediation Timing
In-Module Resit Prior to relevant Programme Exam Board
Please see Student Jargon Buster for more information about remediation types and timing. 
Feedback Strategy/Strategies

• Feedback individually to students, on an activity or draft prior to summative assessment
• Feedback individually to students, post-assessment

How will my Feedback be Delivered?

Summative feedback on in-class tests when set. Formative feedback in-class on work-in-progress group assignment. Summative feedback on completed activities.

Name Role
Dr Quinn Dupont Lecturer / Co-Lecturer
Timetabling information is displayed only for guidance purposes, relates to the current Academic Year only and is subject to change.  

There are no rows to display