Free Online Course in Public Privacy: Cyber Security and Human Rights

Course Description

“For the internet to remain global and open, it is imperative that countries, including those currently lacking capacity to adequately deal with security concerns, to adopt a growth- and freedom-oriented, participative, bottom-up perspective on security that has human rights at its core.” (Joint Governmental Statement at UN Human Rights Council in June 2013)

Arguably, the internet poses severe challenges to state sovereignty and governmental legitimacy. Governments around the world find it increasingly difficult to control, regulate or monitor the massive flow of data within the cyber-world and uphold human rights and fundamental freedoms at the same time. Nevertheless, the world wide web is one of the main prerequisites for economic growth and democracy. It enables citizen participation , engagements and inter-action on all levels that can lead to social transformation and political change. Radical groups, democracy movements, development organizations and human rights NGOs all use the internet to further their goals.

Since the former NSA contractor, Edward Snowden, released a variety of confidential documents we all know of PRISM, TEMPORA and other programs and their massive privacy infringements. These programs were primarily designed to collect user data to increase the capability of intelligence services to protect societies from internal and external threats. But are those programs not undermining essential citizen freedoms and fundamental human rights?

This course systematically examines the compliance between international human rights norms, standards and mechanism within legal and political frameworks and the growing cyber security regime. Debates about the loss of state sovereignty over cyber security, paired with the idea of internet freedom and users’ and citizens’ responsibility lead to the question, whether individual and state responsibility based on reciprocity and human rights compliance are reconcilable.

Learning Outcomes
Students taking this course will learn:
• how human rights are used in the debate about Public Privacy
• how individual, societal, political and governmental actors interact in this context
• what cyber security in consistency with human rights is about.

Using this information, students will practice assessing and analyzing cyber security issues based on international human rights norms, standards and regimes.

Course StructureThe first part of the course will provide an overview of the current state of international and regional human rights regimes and their efforts to protect freedom rights while also ensuring private security. The second part will then go into the evolution of human rights, their violations and protection mechanism in era of the internet.

Week 1: An introduction to public privacy, cyber security and human rights

Week 2: Yours and the rights of others: civic and social human rights

Week 3: Human rights cyber regime

Week 4: Agencies for the human rights cyber space

Week 5: Security, human rights and privacy assurance through Internet

Week 6: E-democracy and social networks

Week 7: Public versus State Sovereignty

Week 8: Public Privacy, internet freedom and state responsibility.

Course Format

The course will be hosted online and will consist of lectures by the instructor, as well as guest lectures and exclusive interviews with respective stakeholders. Additional reading material, animations and images will support each learning objective. Students will be assessed through quizzes, peer-to-peer review and their participation in interactive discussion forums.

For More information click: https://iversity.org/courses/public-privacy-cyber-security-and-human-rights?r=372b8

Or visit: https://www.facebook.com/theknowledgesteez

One response to “Free Online Course in Public Privacy: Cyber Security and Human Rights

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.