Public Privacy: Cyber Security & Human Rights

Provided by:
7/10 stars
based on  1 review
Provided by:
Cost FREE
Start Date On demand
Public Privacy: Cyber Security & Human Rights

Course Details

Cost

FREE

Upcoming Schedule

  • On demand

Course Provider

Iversity online courses
Iversity's vision is to share world-class knowledge. Based out of Berlin, iversity works directly with professors instead of through universities to provide its high-quality courses in multiple different languages. Contemporary Architecture taught by internationally known professor Dr. Ivan Shumkov and Dark Matter in Galaxies: The Last Mystery led by world-famous astrophysicist Paolo Salucci are only two examples of the kind of top-tier courses you can take at Iversity. Google, Shell Compa...
Iversity's vision is to share world-class knowledge. Based out of Berlin, iversity works directly with professors instead of through universities to provide its high-quality courses in multiple different languages. Contemporary Architecture taught by internationally known professor Dr. Ivan Shumkov and Dark Matter in Galaxies: The Last Mystery led by world-famous astrophysicist Paolo Salucci are only two examples of the kind of top-tier courses you can take at Iversity. Google, Shell Company and Deutsche Bank - three of the most innovative and successful companies in the world - declared iversity a Lighthouse Project in Higher Education, a prestigious and highly sought after international honor. PC Magazine named Iversity as one of the best websites of 2013. Iversity's broad range of courses led by the best professors in the world gives you access to previously unattainable knowledge.

Provider Subject Specialization
Humanities
Sciences & Technology
4 reviews

Course Description

Course Description “The Internet is the first thing that humanity has built that humanity doesn't understand, the largest experiment in anarchy that we have ever had.” Eric Schmidt, Executive Chairman of Google Arguably, the internet poses severe challenges to state sovereignty and legitimacy. Governments around the world find it increasingly difficult to control, regulate or monitor the massive flow of data within the cyber-world. At the same time, the internet is one of the main prerequisites for economic growth in capitalistic societies. It enables political change in all directions. Radical groups, democracy movements, development organizations and human rights NGOs all use the internet to further their goals. Since the former NSA contractor, Mr. Snowden, released a variety of confidential documents, the public knows of the existence of PRISM, TEMPORA and other programs and their massive privacy infringements. These programs were... Course Description “The Internet is the first thing that humanity has built that humanity doesn't understand, the largest experiment in anarchy that we have ever had.” Eric Schmidt, Executive Chairman of Google Arguably, the internet poses severe challenges to state sovereignty and legitimacy. Governments around the world find it increasingly difficult to control, regulate or monitor the massive flow of data within the cyber-world. At the same time, the internet is one of the main prerequisites for economic growth in capitalistic societies. It enables political change in all directions. Radical groups, democracy movements, development organizations and human rights NGOs all use the internet to further their goals. Since the former NSA contractor, Mr. Snowden, released a variety of confidential documents, the public knows of the existence of PRISM, TEMPORA and other programs and their massive privacy infringements. These programs were primarily designed to collect user data to increase the capability of intelligence services to protect societies from internal and external threats. But are those programs not undermining essential citizen freedoms and fundamental human rights? This course systematically examines the compliance between human rights and cyber security. Debates about the loss of state sovereignty over cyber security, paired with the idea of internet freedom and users’ and citizens’ responsibility lead to the question, whether individual and state responsibility based on reciprocity and human rights compliance are reconcilable. Learning Outcomes Students taking this course will learn: • how human rights are used in the debate about Public Privacy • how individual, societal, political and governmental actors interact in this context • what cyber security in consistency with human rights is about. Using this information, students will practice assessing and analyzing cyber security issues based on international human rights norms, standards and regimes. Course Structure The first part of the course will provide an overview of the current state of international and regional human rights regimes and their efforts to protect freedom rights while also ensuring private security. The second part will then go into the evolution of human rights, their violations and protection mechanism in era of the internet. Week 1: Public Privacy: an introduction to notion, concepts of cyber security and human rights. Week 2: Private, political, as well as social and economic human rights. Week 3: Human rights regime in or against consistency with the cyber regime Week 4: Institutions, actors and agencies Week 5: Governance of the non-governmental: Sovereignty & legitimacy through human rights compliance. Week 6: Chances and challenges of cyber-rights Week 7: Security and privacy assurance through Internet Week 8: Public Privacy, internet freedom and state responsibility Week 7: Security and Privacy Assurance through Internet Week 8: Public Privacy, Internet Freedom and State responsibility Course Format The course will be hosted online and will consist of lectures by the instructor, as well as guest lectures and exclusive interviews with respective stakeholders. Additional reading material, animations and images will support each learning objective. Students will be assessed through quizzes, peer-to-peer review and their participation in interactive discussion forums.
Reviews 7/10 stars
1 Review for Public Privacy: Cyber Security & Human Rights

Ratings details

  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars
  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars
  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars

Rankings are based on a provider's overall CourseTalk score, which takes into account both average rating and number of ratings. Stars round to the nearest half.

Sort By
Dennis Horne profile image
Dennis Horne profile image
8/10 starsCompleted
  • 24 reviews
  • 23 completed
5 years, 8 months ago
This was a course focussing on the political and human rights issues raised by the advent of the internet and our networked world. It did not cover these aspects in technical detail, nor did it assume any previous knowledge in either political science or the legal aspects of human rights. It was thus suitable for anyone to take up, just as well as I had no background in the field. The material was clearly laid out, driven by clearly spoken videos plus short end of video quizzes. There were additional references, links and readings available for each module. Evaluation consisted of 2 peer reviewed essays and a final exam (which was a larger variant of the quizzes).
Was this review helpful? Yes0
 Flag

Rating Details


  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars
  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars
  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars

Rankings are based on a provider's overall CourseTalk score, which takes into account both average rating and number of ratings. Stars round to the nearest half.