ATTENTION

Smart PLS Workshop @ LekSha Research Centre (OPC), Pvt. Ltd., India

Visitor Number

Monday, December 2, 2013

Free Online Course


Course Description
"For the internet to remain global and open, it is imperative that countries, including those currently lacking capacity to adequately deal with security concerns, to adopt a growth- and freedom-oriented, participative, bottom-up perspective on security that has human rights at its core." (Joint Governmental Statement at UN Human Rights Council in June 2013)
Arguably, the internet poses severe challenges to state sovereignty and governmental legitimacy. Governments around the world find it increasingly difficult to control, regulate or monitor the massive flow of data within the cyber-world and uphold human rights and fundamental freedoms at the same time. Nevertheless, the world wide web is one of the main prerequisites for economic growth and democracy. It enables citizen participation , engagements and inter-action on all levels that can lead to social transformation and political change. Radical groups, democracy movements, development organizations and human rights NGOs all use the internet to further their goals.
Since the former NSA contractor, Edward Snowden, released a variety of confidential documents we all know of PRISM, TEMPORA and other programs and their massive privacy infringements. These programs were primarily designed to collect user data to increase the capability of intelligence services to protect societies from internal and external threats. But are those programs not undermining essential citizen freedoms and fundamental human rights?
This course systematically examines the compliance between international human rights norms, standards and mechanism within legal and political frameworks and the growing cyber security regime. Debates about the loss of state sovereignty over cyber security, paired with the idea of internet freedom and users' and citizens' responsibility lead to the question, whether individual and state responsibility based on reciprocity and human rights compliance are reconcilable.
Learning Outcomes
Students taking this course will learn:
• how human rights are used in the debate about Public Privacy
• how individual, societal, political and governmental actors interact in this context
• what cyber security in consistency with human rights is about.
Using this information, students will practice assessing and analyzing cyber security issues based on international human rights norms, standards and regimes.
Course StructureThe first part of the course will provide an overview of the current state of international and regional human rights regimes and their efforts to protect freedom rights while also ensuring private security. The second part will then go into the evolution of human rights, their violations and protection mechanism in era of the internet.
Week 1: An introduction to public privacy, cyber security and human rights
Week 2: Yours and the rights of others: civic and social human rights
Week 3: Human rights cyber regime
Week 4: Agencies for the human rights cyber space
Week 5: Security, human rights and privacy assurance through Internet
Week 6: E-democracy and social networks
Week 7: Public versus State Sovereignty
Week 8: Public Privacy, internet freedom and state responsibility.
Course Format
The course will be hosted online and will consist of lectures by the instructor, as well as guest lectures and exclusive interviews with respective stakeholders. Additional reading material, animations and images will support each learning objective. Students will be assessed through quizzes, peer-to-peer review and their participation in interactive discussion forums.
Nitish Upadhyay
for this information

No comments:

Post a Comment