Myriam Dunn Cavelty: Catalogue data in Autumn Semester 2021 |
Name | Dr. Myriam Dunn Cavelty |
Name variants | Myriam Dunn Cavelty Myriam Cavelty Myriam Dunn |
Address | Schweiz.- u. Int. Sicherheitspol. ETH Zürich, IFW C 25.1 Haldeneggsteig 4 8092 Zürich SWITZERLAND |
Telephone | +41 44 632 07 55 |
dunn@sipo.gess.ethz.ch | |
Department | Humanities, Social and Political Sciences |
Relationship | Lecturer |
Number | Title | ECTS | Hours | Lecturers | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
853-0061-00L | Introduction to Cybersecurity Politics | 3 credits | 2G | M. Dunn Cavelty, F. J. Egloff | |||||||||||||||||||||||||||||||||||
Abstract | The lecture is an introduction to global cybersecurity politics. The focus is on the strategic use of cyberspace by state and non-state actors (threats) and different answers to these new challenges (countermeasures). | ||||||||||||||||||||||||||||||||||||||
Learning objective | Participants learn to assess the advantages and disadvantages of cyberspace as a domain for strategic military operations. They understand the technical basics of cyber operations and know how technology and politics are interlinked in this area. They understand the security challenges for and the motivations of states to be active in cyberspace offensively and defensively and they are familiar with the consequences for international politics. | ||||||||||||||||||||||||||||||||||||||
Content | We start with an overview of cybersecurity issue from 1980 to today and look at events and actors responsible for turning cybersecurity matters into a security political issue with top priority. After familiarizing ourselves with the technical basics, we look at different forms of cyberviolence and trends in cyber conflicts (technique in social and political practice). Then, we turn to countermeasures: we compare national cybersecurity strategies, examine international norms building, and scrutinize concepts such as cyber-power and cyber-deterrence (technique in social and political regulartory contexts). | ||||||||||||||||||||||||||||||||||||||
Lecture notes | A script with background information and comments on the literature will be made available at the beginning of the semester. | ||||||||||||||||||||||||||||||||||||||
Literature | Literature for each session will be available on Moodle. | ||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | The lecture is being supported by a website on Moodle. | ||||||||||||||||||||||||||||||||||||||
Competencies |
| ||||||||||||||||||||||||||||||||||||||
857-0098-00L | The Politics of Cybersecurity Number of participants limited to 15. MACIS students are given priority. | 8 credits | 2S | M. Dunn Cavelty, M. Leese | |||||||||||||||||||||||||||||||||||
Abstract | This research seminar focuses on the rise of “cyber security” as a security political issue. We focus on the interrelationship between digital technologies, their development, their use and misuse by human actors on the one hand and enduring negotiation processes between the state and its bureaucracies, society, and the private sector to develop solution on the other. | ||||||||||||||||||||||||||||||||||||||
Learning objective | The aim of this research seminar is to introduce students to different waves of cybersecurity literature, have them reflect critically on the development and main focal points, and to give them enough theoretical background so that they can write a research papers on a cybersecurity politics topic of their choice. | ||||||||||||||||||||||||||||||||||||||
Competencies |
|