05 February 2014

iversity, Berlin
Open course on Public Privacy: Cyber Security and Human Rights

iversity is a diverse interdisciplinary team from Berlin. Its members have attended some of the world’s finest institutions. Yet, wherever they went, they were frustrated by the dearth of digital infrastructure in use. That is why they set out to garner the wealth of opportunities to improve the quality of teaching and learning for future generations of students.

iversity want to move beyond the existing teaching formats to enable wholly new forms of online teaching and learning. In order to develop open courses they call upon individual instructors, universities and knowledge-based companies to join us in this effort to democratize education.

iversity is offering a course on Public Privacy: Cyber Security and Human Rights.
Course description
“For the internet to remain global and open, it is imperative that countries, including those currently lacking capacity to adequately deal with security concerns, to adopt a growth- and freedom-oriented, participative, bottom-up perspective on security that has human rights at its core.”
 (Joint Governmental Statement at UN Human Rights Council in June 2013)
 
Arguably, the internet poses severe challenges to state sovereignty and governmental legitimacy. Governments around the world find it increasingly difficult to control, regulate or monitor the massive flow of data within the cyber-world and uphold human rights and fundamental freedoms at the same time. Nevertheless, the world wide web is one of the main prerequisites for economic growth and democracy. It enables citizen participation , engagements and inter-action on all levels that can lead to social transformation and political change. Radical groups, democracy movements, development organizations and human rights NGOs all use the internet to further their goals.
 
Since the former NSA contractor, Edward Snowden, released a variety of confidential documents we all know of PRISM, TEMPORA and other programs and their massive privacy infringements. These programs were primarily designed to collect user data to increase the capability of intelligence services to protect societies from internal and external threats. But are those programs not undermining essential citizen freedoms and fundamental human rights?

This course systematically examines the compliance between international human rights norms, standards and mechanism within legal and political frameworks and the growing cyber security regime. Debates about the loss of state sovereignty over cyber security, paired with the idea of internet freedom and users’ and citizens’ responsibility lead to the question, whether individual and state responsibility based on reciprocity and human rights compliance are reconcilable.

Learning outcomes
Students taking this course will learn:
• how human rights are used in the debate about Public Privacy
• how individual, societal, political and governmental actors interact in this context
• what cyber security in consistency with human rights is about

Using this information, students will practice assessing and analyzing cyber security issues based on international human rights norms, standards and regimes.

Course structure
The first part of the course will provide an overview of the current state of international and regional human rights regimes and their efforts to protect freedom rights while also ensuring private security. The second part will then go into the evolution of human rights, their violations and protection mechanism in era of the internet.

Chapter 1: An Introduction to Public Privacy, Cyber Space and Human Rights
Chapter 2: Human Rights - Yours and the Rights of Others
Chapter 3: Human Rights Cyber Regime
Chapter 4: Governance in Cyber Space
Chapter 5: Security & Surveillance in Cyber Space
Chapter 6: E-Governance & E-Democracy
Chapter 7: State Sovereignty vs. Public Privacy
Chapter 8: Cyber Justice through Public Privacy & Wrap Up of the MOOC Course

Course format
The course will be hosted online and will consist of lectures by the instructor, as well as guest lectures and exclusive interviews with respective stakeholders. Additional reading material, animations and images will support each learning objective. Students will be assessed through quizzes, peer-to-peer review and their participation in interactive discussion forums.

More information on the course and how to enroll, can be found here.

No comments:

Post a Comment