Threats in cyberspace (konwersatorium) - 2019/2020

Course description
General information
Lecturer:dr Alina Betlej
Organising unit:Faculty of Social Sciences - Instytut Nauk o Polityce i Administracji
Number of hours (week/semester): 2/30
Language of instruction:Język polski
Course objective
G1 – To acquaint students with contemporary threats in cyberspace
G2 – To present dilemmas, challenges and threats to the social order related to the development of new technologies to students.
Prerequisites
W1 - interest in issues;
W2 - the ability to analyze scientific texts
Learning outcomes
Knowledge
A student has knowledge about contemporary threats in cyberspace - K_W01
A student knows dilemmas, challenges and threats to the social order related to the development of new technologies K_W02
SKILLS:
A student defines contemporary threats in cyberspace - K_U02
A student compares and analyzes various dilemmas, challenges and threats to the social order related to the development of new technologies - K_U01
SOCIAL COMPETENCE
A student is sensitive to security problems in cyberspace - K_K06;
A student is aware of the threats to the social order related to the development of new technologies - K_K02
Teaching method
Discussion, team work, case studies
Course content description
1.Virtualization: challenges and effects
2. Security in the network versus network security
3.Manipulation and propaganda
4. Unsolicited and inappropriate content
5.Cyberbyulling
6. Criminality in the network
7. Addictions in the network
8. Activism versus activism
9.Cyberterrorism
10.Darknet
11.Alternative society and alternative economy?
12. Social assessment of new technologies
13. Future scenarios
Forms of assessment
Methods:
Discussion, group work, analysis of case studies, preparation of an oral statement on a selected topic.
Rating 2:
K-Student does not have basic knowledge about contemporary threats in cyberspace. The student does not know the basic dilemmas, challenges and threats to the social order related to the development of new technologies.
S-Student does not define selected contemporary threats in cyberspace. The student does not compare and does not analyze selected dilemmas, challenges and threats to the social order related to the development of new technologies.
C-Student is not sensitive to selected security problems in cyberspace. The student is aware of selected threats to the social order related to the development of new technologies.
Rating 3:
K-Student has basic knowledge about contemporary threats in cyberspace.
The student knows the basic dilemmas, challenges and threats to the social order related to the development of new technologies.
S-Student defines selected contemporary threats in cyberspace. The student compares and analyzes selected dilemmas, challenges and threats to the social order related to the development of new technologies.
C-Student is sensitive to selected security problems in cyberspace. The student is aware of selected threats to the social order related to the development of new technologies.
Rating 4:
K-Student has a good knowledge of contemporary threats in cyberspace.
The student knows many dilemmas, challenges and threats to the social order related to the development of new technologies.
S-Student defines numerous contemporary threats in cyberspace. The student compares and analyzes numerous dilemmas, challenges and threats to the social order related to the development of new technologies.
C-Student is sensitive to security problems in cyberspace. The student is aware of the threats to the social order related to the development of new technologies.
Rating 5:
K-Student has a very good knowledge of contemporary threats in cyberspace.
The student knows dilemmas, challenges and threats to the social order related to the development of new technologies.
S-Student defines contemporary threats in cyberspace. The student compares and analyzes dilemmas, challenges and threats to the social order related to the development of new technologies.
C-Student is sensitive to security problems in cyberspace. The student is aware of the threats to the social order related to the development of new technologies
Required reading list
Basic literature:
Betlej A., Society of e-control in Hyperconnected Reality, [in:] Transformations, nr 3-4 (94-95), p. 38-47.
Liedel K, Piasecka P., Aleksandrowicz T. R. (red.), Sieciocentryczne bezpieczeństwo. Wojna, pokój i terroryzm w epoce informacji, Difin 2014.
Podraza A., Potakowski P., Wiak K. (red.), Cyberterroryzm zagrożeniem XXI wieku. Perspektywa politologiczna i prawna, Difin 2013.
Zacher L. W. (red.), Potencjały i relacje sił w cyfrowym społeczeństwie wiedzy, MT Biznes, Warszawa 2018.
Additional literature:
Betlej A., Społeczeństwo sieciowe- relacje siły, [w:] L. W. Zacher (red.), Potencjały i relacje sił w cyfrowym społeczeństwie wiedzy, Wydawnictwo POLTEXT, Warszawa 2018, s.37-54.
Górka M. (red.), Cyberbezpieczeństwo jako podstawa bezpiecznego państwa i społeczeństwa w XXI wieku, Difin 2014.
Field of study: International Relations
Course listing in the Schedule of Courses:
Year/semester:Year III - Semester 5
Number of ECTS credits: 2
Form of assessment: Grade