PSIA, Master in International Security
understand how crises can be prevented, managed and resolved in practice. It is organised around a series of case studies, drawing on the personal experiences of the teachers, and exploring the ideas and techniques that are in use today. These ideas and techniques will be employed in the simulation exercise. The course will be of 12 sessions, each of two hours, plus the practical exercise. The teachers will vary depending on the subject being addressed. Required reading : David Keen, "The Forever Wars", available at http://yalebooks.wordpress. com/2012/05/08/the-forever-wars-author-davidkeen-discusses-how-global-conﬂicts-are-deliberately-sustained/ ; David Chandler, “R2P or Not R2P ? More Statebuilding, Less Responsibility”, available at http://www.davidchandler.org/ pdf/journal_articles/GlobalR2P%20-%20published.pdf ; Patrice Sartre, Making International Peacekeeping More Robust, available at http:// www.ipacademy.org/media/pdf/publications/ ipi_epub_robustpeacekeeping.pdf ; Humanitarian Negotiations Revealed : The MSF Experience : Introduction and Part II (History), available at http://www.msf-crash.org/livres/en/humanitarian-negotiations-revealed.
part of each 2-hour module consists of an interactive lecture. In the second part of each there will be a seminar element where students are expected to have prepared themselves with the response to one or more assignment questions and to be prepared to discuss them and present their own opinions in order to test their understanding and engagement with key issues using the Socratic method. Occasional written exercises will test comprehension of key learning points. 12 weeks Course Description : It begins by providing a theoretical framework for the regulation of the Internet, examining questions such as whether the Internet is capable of regulation, whether such regulation should be neutral and who should assume the task of regulating the online environment. Armed with this theoretical background, students will then be asked to consider how these values are reﬂected in the regulatory design of the online environment. This examination will be conducted by considering a number of case studies relating to online privacy, defamation, criminal activity and market power. The course concludes by examining the topical and politically charged question of whether online providers should be allowed to vary service conditions by types of content. This course is mainly theoretical but with case studies and practical elements Required reading : 1.Lawrence Lessig, Code and Other Laws of Cyberspace Ver. 2.0 (2005) (This book may be downloaded from http://codev2.cc/ download+remix/). ; 2.Andrew Murray, Information Technology Law : The Law and Society 3ed (2016) ; 3.Andrew Murray, The Regulation of Cyberspace : Control in the Online Environment (2007) ; 4.Orin Kerr, The Problem of Perspective in Internet Law, 91 Georgetown Law Journal 357 (2003). Available at SSRN : https ://ssrn.com/ abstract=310020 or http://dx.doi.org/10.2139/ ssrn.310020.
Semester : Spring Number of hours : 24 Language of tuition : English
Teachers : Andrew MURRAY (Professor of Law). Pedagogical format : Lecture alone Course validation : The completion of a short written paper after 1/3 of the course : 30% A ﬁnal written paper at the end of the course : 60%. The ﬁnal scoring will take into account the students' behavior and active participation in the courses (10%) Workload : The course demands that students undertake a minimum of required reading before each session as well as preparation for discussion on a speciﬁc topic. 3 to 6 hours estimated Pedagogical method : The course is twelve modules, each autonomous but building on the previous modules. Each module is 2 hours. The ﬁrst
CYBERSECURITY OPERATIONAL AND POLICY CHALLENGES
Semester : Autumn Number of hours : 24 Language of tuition : English