Difference between revisions of "Cybersecurity and Cyberwarfare"

From Technologies of Politics and Control
Jump to navigation Jump to search
Line 1: Line 1:
<div class="editsection noprint editlink plainlinksneverexpand" align="right" style="float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;">
+
{{ClassCalendar}}
<big>'''Syllabus'''</big>
+
 
{| border="0" cellspacing="4" cellpadding="4" style="background:#eeeeff; text-align: left;"
 
|
 
* [[Politics and Technology of Control: Introduction|Jan 24]]
 
* [[Paradigms for Studying the Internet|Jan 31]]
 
* [[Regulating Speech Online|Feb 7]]
 
* [[New Economic Models|Feb 14]]
 
* [[Peer Production and Collaboration |Feb 21]]
 
* [[Copyright in Cyberspace |Feb 28]]
 
* [[New and Old Media, Participation, and Information |Mar 6]]
 
* Mar 13 - ''No class''
 
|
 
* [[Collective Action and Decision-making |Mar 20]]
 
* [[Internet and Democracy |Mar 27]]
 
* [[Control and Code: Privacy Online |Apr 3]]
 
* [[Internet and Democracy: The Sequel |Apr 10]]
 
* [[Internet Infrastructure and Regulation |Apr 17]]
 
* [[The Wikileaks Case |Apr 24]]
 
* [[Cybersecurity and Cyberwarfare|May 1]]
 
* [[Final Project|May 8]] - ''No class''
 
|}
 
<br clear="right" />
 
</div>
 
 
'''May 1'''
 
'''May 1'''
  

Revision as of 20:11, 20 January 2012

May 1

Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?


Readings

Optional Readings


Class Discussion

Links