Le Grand Syllabus 2017/2018
live side by side, Intellectual Property should not be seen as a constraint, but as a strategic tool that can be employed in favour of personal or business enterprises. The goal of this course is to provide Communication students with : an overview of the various intellectual property rights ; the key elements that can be used as part of a Communication strategy and the ways they can be employed ; practical examples that illustrate how this approach can be put to work in reality. The course will only to a lesser extent teach rules and legislation, and mainly focuses on the acquisition of a practical intelligence that can be applied in the ﬁeld, inspired by both the theory and practice of the rights. Required reading : Will be provided during the course. Additional materials (articles) may be provived during the course.
Reading material discussion, case studies and group working. 2 in-class written tests (dates will be provided). Course Description : This course seeks to examine the introduction of advanced technologies, data analytics and artiﬁcial intelligence (AI) in the ﬁeld of intelligence. After designing an analytical framework, students will learn how the ongoing development of software-based technologies, information and communication technologies (ICTs), big data and artiﬁcial intelligence (AI) lead to a paradigm shift in intelligence knowledge, decision-making and operations. More speciﬁcally, they will learn how open source intelligence (OSINT), digital communications intelligence, metadata intelligence, geospatial intelligence, sensor-based intelligence, biometrics, artiﬁcial intelligence and big data expand intelligence into new areas, which did not constitute its immediate gaze. Drawing on case studies, this course will provide students with basic technological, analytic, critical and practical knowledge to : 1) deﬁne a framework for analyzing the intelligence & technology nexus, 2) assess the relevance of the technological solutions for intelligence and analyze their impact, 3) examine the new issues they generate especially in light of the revelations on global mass surveillance and recent terrorist attacks. Required reading : A. Ceyhan, 2008, “Technologization of Security : Management of Uncertainty and Fear in the Age of Biometrics”, Surveillance & Society, no 5(2) ; M. Dunn Cavelty and V. Mauer, 2010, “Postmodern Intelligence : Strategic Warning in an Age of Reﬂexive Intelligence”, Security Dialogue, 40 (2) : 123-144 ; L.D. Introna and Wood D. 2004. “Picturing Algorithmic Surveillance : The Politics of Facial Recognition Systems, Surveillance & Society, 2(2/3) : 177198 ; P.O'Neil, “Complexity and Counterterrorism : Thinking about Biometrics”, 2005, Studies in Conﬂict and Terrorism, 28 : 547-566 ; S.Singh, “Cracking the Enigma”, 1999 in S.Singh, The Code Book, New York, Anchor Books.
INTELLIGENCE AND TECHNOLOGY
Semester : Spring Number of hours : 24 Language of tuition : English
Opened to the exchange program
Teachers : Ayse CEYHAN (consultante). Prerequisite : Interest in security and intelligence studies, new technologies and readiness to go beyond classical intelligence analysis frameworks and dive into an interdisciplinary approach would be an asset. Pedagogical Format : Seminar Course validation : Mandatory readings and class participation (20 % of the ﬁnal grade). This course is designed to allow active student involvement placing great attention on their contribution. Your active participation is welcome and will be facilitated through case studies. Two in-class tests (30%) to assess the level of the knowledge acquired. Tests are not essays, but only an assessment of the knowledge you acquired in class. Final paper (50%). Topics will be distributed. Workload : No exposé. Reading technical, conceptual and empirical materials. Class participation through case studies and discussions. Final paper. Pedagogical Method : Professor lectures. 1430
Semestre : Printemps Nombre d'heures