大学院
HOME 大学院 Introduction to Cybersecurity Policy
学内のオンライン授業の情報漏洩防止のため,URLやアカウント、教室の記載は削除しております。
最終更新日:2024年4月22日

授業計画や教室は変更となる可能性があるため、必ずUTASで最新の情報を確認して下さい。
UTASにアクセスできない方は、担当教員または部局教務へお問い合わせ下さい。

Introduction to Cybersecurity Policy

This course is designed to provide students with a comprehensive understanding of cybersecurity from multiple perspectives. The course will cover political, economic, and technology aspects of cybersecurity, including national and international laws and policies, government initiatives, and private sector involvement. The interdisciplinary nature of cybersecurity means that students from various fields outside the Graduate School of Public Policy, such as law, computer science, information management, or sociology, can also benefit from this course. Although the course will cover some basic technical terms and principles related to cybersecurity, it is not a technical course, and technical knowledge about computer skills is not required. However, it is desirable for students to have a familiarity with a variety of literatures, such as up-to-date published research reports, policy documents, news articles, and academic articles, to be able to engage with the course material effectively. Overall, this course is designed to equip students with the knowledge and skills needed to understand cybersecurity challenges and solutions from multiple perspectives and to develop effective policies and strategies to address cybersecurity threats in various contexts.
The course objectives include but are not limited to,
● Understanding the policy issues that center on international relations, business continuity, and risk/crisis management to protect intellectual property, assets, reputation, and other organizational assets from any threat or attack related to cybersecurity.
● Understanding the role of technical standards to supplement legal and regulatory requirements.
● Analyzing critical incidents including data breaches or related events to design and implement organizational strategies to address such risks.
● Gaining a basic understanding for future technical and other research in security (whether it is public or private sector)
● Gaining a basic grounding for policy via the examination of current research issues and problems
● Gaining experience handling real-world security policy challenges through analysis of public documents and artifacts using written and oral communication.
● Developing the multidisciplinary skills needed to analyze, manage, and resolve the challenges associated with public policy, international relations, and governance.
● Students are encouraged to take experiment provided by Interfaculty Initiative in Information Studies/Graduate School of Interdisciplinary Information Studies
MIMA Search
時間割/共通科目コード
コース名
教員
学期
時限
5130248
GPP-MP6Z30L3
Introduction to Cybersecurity Policy
鈴木 寛
S1 S2
月曜2限
マイリストに追加
マイリストから削除
講義使用言語
英語
単位
2
実務経験のある教員による授業科目
NO
他学部履修
開講所属
公共政策学教育部
授業計画
The Course schedule is tentative and subject to change. Week 1(April 08): Introduction (Professors: Suzuki/Takamizawa)   Week 2 (April 15): Threat landscape in cyberspace (Ms. Matsubara, NTT) Week 3 (April 22): Foundation of Security. Internet and Network Communication (Mr. Asaba (IIJ Inc.) )  Week 4 (May 13): Cybersecurity policy framework of Japan and role of the NISC (Mr. Yoshikawa, NISC) Week 5 (May 20):Cyber(security) strategies of the major countries; Common elements and uniqueness (TBD) Week 6 (May 27): Incident response/reporting/communication; Case study (TBD) Week 7 (June 03): ISAC: Strategic Communications to Defend Financial Industries (Mr. Kamata, Financial ISAC) Week 8 (June 10) Cybersecurity and Government’s Industrial and Economic Policy (Mr. Hoshi, METI) Week 9 (June 17): Security Innovation & Its Proliferation (Mr. Fujii (NRI Secure)    Week 10 (June 24): Cybersecurity and national/international peace and security (Ambassador Ishizuki, MOFA)  Week 11 (July 01): Protecting Your Workplace & Entire Corporate Group (NTT) Week 12 (July 08): Challenges to Cybersecurity and measures to be taken (Suzuki/Takamizawa) Discussion Week 13 (July 22): Student presentations and Q&A (Suzuki/Takamizawa)
授業の方法
The course applies Omnibus structures. For each subject of the course, professional guest speaker(s) is invited for giving the lecture. Students are expected to submit questions in advance and participate in Q&A sessions for each class, and asked submission of research paper after the class lecture series.
成績評価方法
A. Course Grade Based on the university course guidelines, grade scale is divided into two categories. A. Class Contribution: 30% B. Final Research Paper: 70% Total: 100% A+ = 90% or above, A = 80-89% B = 70-79% C = 60-69% F = 0-59% B. Attendance Policy: Student's attendance is mandatory. It is your responsibility to manage your schedule during semester. Since active participation in the class is the main portion of class contribution, attending every class is important. In this class, students have one free absence without penalty. There are two types of absence: excused absence and unexcused absence. Excused absence is the absence that is deemed excusable for the consequence of missing class work due to the circumstances that physically keep you from attending against your will. In case of unexcused absence, you will be docked 2.5 points per class you miss. If you miss four classes, you will also receive a letter grade penalty. Students who have six absences (whether you have excused absences or not) in total, will be dropped from this course. C. Research Proposal and Presentation: All students will make a short presentation of their research proposal during class on July 3. If you are unable to attend on this day, you must notify the instructors beforehand and arrange for an alternative presentation time. Your research proposal should be 1-2 pages in length or several slides and include the following elements: -A clear and concise statement of your research question or topic. -A brief overview of the key issues or debates you will address in your paper. -A preliminary list of sources you plan to consult in your research. Your research proposal must be submitted by 11:55 p.m. JST on Thursday, June29, 2023. D. Final Paper: Assignment Students will be assigned the final paper as a part of requirement for this course. In this assignment, you will write a research paper based on your choice of topic (with an approval from instructor(s)) related to policy, politics, or any practice of digital/internet communications focused on the scope of cybersecurity. In your paper, you will bring a case from your home country, Japan, or any other country, address, discuss (or debate), and analyze the key issues in academic/scholarly manner. Final Paper (7-10pp.) Due: 23:55 p.m. Friday, July 28, 2023
教科書
Required textbook: There are no required textbooks for the class. Handouts and/or brochures will be provided in weekly guest lectures. Students are free to collect and make their own list of ‘study materials’ such as books, academic journals, news arti-cles, or published papers for background knowledge.
参考書
Cybersecurity Sources: This is the list of sources that will be helpful for your understanding of cybersecurity issues. Books and articles are academic oriented and agenda specific, so you might want to check if they draw your interest in connection to your own research emphasis. You can use Google Scholar and Academic databases for searching additional sources. Also, it is highly recommended to check news articles and security experts’ blogs to become familiar with the recent security trend. A. Books Beginner’s Guide/Cybersecurity Policy National Research Council. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington, DC: The National Academies Press, 2014. Free download: http:// www.nap.edu/***** Kent Peterson. Cybersecurity, Cyberwar and Cyberweapon: A Beginner's Guide to Understanding Cyber Security And How It Affects You. 2021. ISBN-13: 979-8485749460 William Richards. CYBERSECURITY and CYBERWAR in 2021 For Beginners: Network Topologies, Protocols, And Strategies. Measures to Secure Your Cyber Networks. 2020. ISBN-13: 979-8566578675. Cyberwar/National Defense Richard A. Clark & Robert K. Knake. The Fifth Domain: Defending Our Country, Our Companies, And Ourselves in the Age of Cyber Threats. Penguin Press. 2019. ISBN: 978-0525561965 Andy Greenberg. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers. Knopf Doubleday, 2019. ISBN 978-0-385-54441-2. Sean T. Lawson. Cybersecurity Discourse in the United States: Cyber-doom Rhetoric And Beyond. Routledge, 2019. ISBN: 978-1138201828 P. W. Singer & Allan Friedman. Cybersecurity And Cyberwar. Oxford, UK: Oxford University Press, 2014. ISBN: 978-0199918119 Internet Governance Ronald J. Deibert. Reset: Reclaiming the Internet for Civil Society. September Publishing. 2021 ISBN: 978-1912836772 Laura DeNardis. The Internet in Everything. Yale University Press. 2020. ISBN: 978-0300233070 Milton Mueller. Will the Internet Fragment? Sovereignty, Globalization and Cyberspace Sovereignty, Globalization And Cyberspace. Cambridge(UK)/MA(USA): Polity, 2017. ISBN: 978-1509501212 Damien Van Puyvelde & Aaron F. Brantly. Cybersecurity: Politics, Governance And Conflict in Cyberspace. Wiley. 2019. ISBN: 978-1509528103 Hacking/Social Media Infiltration Patrick Burkart & Tom McCourt. Why Hackers Win:Power And Disruption in the Network Society. University of California Press, 2019. ISBN: 978-0520300132 Kathleen Hall Jamieson. Cyberwar: How Russian Hackers And Trolls Helped Elect a President: What We Don't, Can't, And Do Know. Oxford University Press, 2018. ISBN: 978-0190915810 Bruce Schneier. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back. W. W. Norton & Company. 2023. ISBN: 978-0393866667 Data Privacy/Network Protection Susan Landau. Listening In: Cybersecurity in an Insecure Age. Hartford: Yale University Press. 2017. ISBN: 978-0300227444 Laurent Richard & Sandrine Rigaud. Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy. Henry Holt and Company. 2023. ISBN: 978-1250858696 Bruce Schneier. Click Here to Kill Everybody: Security And Survival in a Hyper-connected World (paperback). W. W. Norton & Company. 2019. ISBN: 978-0393357448 Business Solution/Risk Management Rob Arnold. Cybersecurity: A Business Solution: An Executive Perspective on Managing Cyber Risk Threat Sketch, LLC. 2017. ISBN: 978-0692944158 Douglas W. Hubbard et al. How to Measure Anything in Cybersecurity Risk. 1st edition. Wiley. 2016. IBSN: 978-1119085294 Gregory C. Rasner. Cybersecurity and Third-Party Risk: Third Party Threat Hunting. Wiley. 2021. ISBN: 978-1119809562 Paul Rohmeyer & Jennifer L. Bayuk. Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions. Stevens Institute of Technology. 1st ed. 2018. ISBN: 978-148424
履修上の注意
Although this is not a technical course and technical knowledge about computer skills are not required, it is desirable for the students to be familiar with a variety of literatures such as up-to-date published research reports, policy documents, news articles, academic articles, etc.
その他
Reference (continued) B. 5 Recommended Websites 1.CSO https://www.csoonline.com/***** 2.Cybersecurity Insiders https://www.cybersecurity-insiders.com/***** 3.Akamai Blog https://www.akamai.com/***** 4.Dark Reading https://www.darkreading.com/***** 5.The Citizen Lab https://citizenlab.ca/***** C. Academic Articles Ho-Chun Herbert Chang, Smart Haider, & Emilio Ferrara. “Digital Civic Participation and Misinformation during the 2020 Taiwanese Presidential Election.” Media and Communication (2021). DOI: https://doi.org/***** Marcus Millett. “The Cyber Dimension of the Russia–Ukraine War.” Global Politics and Strategy 64 (2022): 7-26. doi:10.1080/00396338.2022.2126193 Catherine Hart, Day Yong Lin, & Andrew Feenberg. “The Insecurity of Innovation: A Critical Analysis of Cybersecurity in the United States.” International Journal of Communication 8 (2014): 2860-2878. Stephen J. Harnett & Chiaoning Su. “Hacking, Debating, and Renewing Democracy in Taiwan in the Age of" Post-Truth" Communication.” Taiwan Journal of Democracy 17 (1) (2017): 21-43. Sean Lawson & Michael K. Middleton. “Cyber Pearl Harbor: Analogy, Fear, and the Framing of Cyber Security Threats in the United States, 1991-2016”. First Monday 24 (3) (2019). https:// doi.org/***** Harriet Moynihan. “The Vital Role of International Law In The Framework For Responsible State Behaviour in Cyberspace.” Journal of Cyber Policy 6 (2021): 394-410. doi: 10.1080/23738871.2020.1832550 Ryan Chandler & Miguel Alberto Gomez. “The Hidden Threat of Cyber-Attacks – Undermining Public Confidence In Government.” Journal of Information Technology & Politics (2022). doi: 10.1080/19331681.2022.2112796 Norman Shafik Fouad. “Securing Higher Education Against Cyberthreats: From an Institutional Risk To a National Policy Challenge.” Journal of Cyber Policy 6 (2021): 137-154. https:// doi.org/***** Keren L.G. Snider, Ryan Shandler, Shay Zandani & Daphna Canetti. “Cyberattacks, Cyber Threats, And Attitudes Toward Cybersecurity Policies.” Journal of Cybersecurity 7 (1) (2021), tyab019, https://doi.org/***** Bryan C. Taylor. “Defending The State From Digital Deceit: The Reflexive Securitization Of Deepfake.” Critical Studies in Media Communication 38 (2021): 1-17. https://doi.org/***** 10.1080/15295036.2020.1833058