Last modified: 31 Jul 2023 11:35
The course analyses international legal issues raised by the increasing need to secure cyberoperations. It therefore addresses the emerging international cybersecurity law.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | Second Term | Credit Points | 30 credits (15 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
The course analyses international legal issues raised by the increasing need to secure cyberoperations. It therefore addresses the emerging international cybersecurity law. In particular, this course explores the modalities of cyberattacks and the challenges raised by their attribution; studies European general data protection law; questions the scope of the obligation of States to secure cyberspace; analyses what cyberattacks are unlawful under international law and how States could react to them; and finally, examines the role of international organisations, non-governmental organisations and IT companies in international cybersecurity.
Information on contact teaching time is available from the course guide.
Assessment Type | Summative | Weighting | 30 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Assessment Type | Summative | Weighting | 50 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Online Exam. |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Assessment Type | Summative | Weighting | 20 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
There are no assessments for this course.
Assessment Type | Summative | Weighting | 100 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Factual | Evaluate | An ability to critically analyse whether current international rules related to security can be applied to cyberspace and whether they should be adapted to this new area of activities |
Reflection | Analyse | An ability to access, and use for analysis, relevant texts and electronic databases |
Procedural | Create | An ability to organise and communicate ideas clearly and cogently, orally and in writing |
Conceptual | Understand | An enhanced knowledge of international cybersecurity law |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.