Public Privacy: Cyber Security & Human Rights
Provided by:

Provided by:

Course Details
Cost
FREE
Upcoming Schedule
- On demand
Course Provider

Iversity online courses
Iversity's vision is to share world-class knowledge. Based out of Berlin,
iversity works directly with professors instead of through universities to
provide its high-quality courses in multiple different languages. Contemporary
Architecture taught by internationally known professor Dr. Ivan Shumkov and
Dark Matter in Galaxies: The Last Mystery led by world-famous astrophysicist
Paolo Salucci are only two examples of the kind of top-tier courses you can
take at Iversity. Google, Shell Compa...
Iversity's vision is to share world-class knowledge. Based out of Berlin,
iversity works directly with professors instead of through universities to
provide its high-quality courses in multiple different languages. Contemporary
Architecture taught by internationally known professor Dr. Ivan Shumkov and
Dark Matter in Galaxies: The Last Mystery led by world-famous astrophysicist
Paolo Salucci are only two examples of the kind of top-tier courses you can
take at Iversity. Google, Shell Company and Deutsche Bank - three of the most
innovative and successful companies in the world - declared iversity a
Lighthouse Project in Higher Education, a prestigious and highly sought after
international honor. PC Magazine named Iversity as one of the best websites of
2013. Iversity's broad range of courses led by the best professors in the
world gives you access to previously unattainable knowledge.
Provider Subject Specialization
Humanities
Sciences & Technology
Course Description
Course Description “The Internet is the first thing that humanity has built
that humanity doesn't understand, the largest experiment in anarchy that we
have ever had.” Eric Schmidt, Executive Chairman of Google Arguably, the
internet poses severe challenges to state sovereignty and legitimacy.
Governments around the world find it increasingly difficult to control,
regulate or monitor the massive flow of data within the cyber-world. At the
same time, the internet is one of the main prerequisites for economic growth
in capitalistic societies. It enables political change in all directions.
Radical groups, democracy movements, development organizations and human
rights NGOs all use the internet to further their goals. Since the former NSA
contractor, Mr. Snowden, released a variety of confidential documents, the
public knows of the existence of PRISM, TEMPORA and other programs and their
massive privacy infringements. These programs were...
Course Description “The Internet is the first thing that humanity has built
that humanity doesn't understand, the largest experiment in anarchy that we
have ever had.” Eric Schmidt, Executive Chairman of Google Arguably, the
internet poses severe challenges to state sovereignty and legitimacy.
Governments around the world find it increasingly difficult to control,
regulate or monitor the massive flow of data within the cyber-world. At the
same time, the internet is one of the main prerequisites for economic growth
in capitalistic societies. It enables political change in all directions.
Radical groups, democracy movements, development organizations and human
rights NGOs all use the internet to further their goals. Since the former NSA
contractor, Mr. Snowden, released a variety of confidential documents, the
public knows of the existence of PRISM, TEMPORA and other programs and their
massive privacy infringements. These programs were primarily designed to
collect user data to increase the capability of intelligence services to
protect societies from internal and external threats. But are those programs
not undermining essential citizen freedoms and fundamental human rights? This
course systematically examines the compliance between human rights and cyber
security. Debates about the loss of state sovereignty over cyber security,
paired with the idea of internet freedom and users’ and citizens’
responsibility lead to the question, whether individual and state
responsibility based on reciprocity and human rights compliance are
reconcilable. Learning Outcomes Students taking this course will learn: • how
human rights are used in the debate about Public Privacy • how individual,
societal, political and governmental actors interact in this context • what
cyber security in consistency with human rights is about. Using this
information, students will practice assessing and analyzing cyber security
issues based on international human rights norms, standards and regimes.
Course Structure The first part of the course will provide an overview of the
current state of international and regional human rights regimes and their
efforts to protect freedom rights while also ensuring private security. The
second part will then go into the evolution of human rights, their violations
and protection mechanism in era of the internet. Week 1: Public Privacy: an
introduction to notion, concepts of cyber security and human rights. Week 2:
Private, political, as well as social and economic human rights. Week 3: Human
rights regime in or against consistency with the cyber regime Week 4:
Institutions, actors and agencies Week 5: Governance of the non-governmental:
Sovereignty & legitimacy through human rights compliance. Week 6: Chances and
challenges of cyber-rights Week 7: Security and privacy assurance through
Internet Week 8: Public Privacy, internet freedom and state responsibility
Week 7: Security and Privacy Assurance through Internet Week 8: Public
Privacy, Internet Freedom and State responsibility Course Format The course
will be hosted online and will consist of lectures by the instructor, as well
as guest lectures and exclusive interviews with respective stakeholders.
Additional reading material, animations and images will support each learning
objective. Students will be assessed through quizzes, peer-to-peer review and
their participation in interactive discussion forums.