大学院
HOME 大学院 国際公共政策実践研究(Introduction to Cybersecurity Policy)
過去(2022年度)の授業の情報です
学内のオンライン授業の情報漏洩防止のため,URLやアカウント、教室の記載は削除しております。
最終更新日:2024年4月1日

授業計画や教室は変更となる可能性があるため、必ずUTASで最新の情報を確認して下さい。
UTASにアクセスできない方は、担当教員または部局教務へお問い合わせ下さい。

国際公共政策実践研究(Introduction to Cybersecurity Policy)

This course offers students political, economic, and technology perspectives to exam-ine cybersecurity from the standpoint of national governments, international laws and/or politics, and private sector. Interdisciplinary nature of cybersecurity, this course also welcomes students from outside the Graduate School of Public Policy, par-ticularly students from law, computer science, information management, or sociology. Students will encounter some basic technical terms and principles regarding the nature of the internet, cyberspace, vulnerabilities, exploits, incidence response, etc. Although this is not a technical course and technical knowledge about computer skills are not required, it is desirable for the students to be familiar with a variety of literatures such as up-to-date published research reports, policy documents, news articles, academic articles, etc.
The course objectives include but are not limited to
● Understanding the policy issues that center on international relations, business con-tinuity, and risk/crisis management to protect intellectual property, assets, reputation, and other organizational assets from any threat or attack related to cybersecurity.
● Understanding the role of technical standards to supplement legal and regulatory requirements;
● Analyzing critical incidents including data breaches or related events to design and implement organizational strategies to address such risks;
● Gaining a basic understanding for future technical and other research in security (whether it is public or public sector)
● Gaining a basic grounding for policy via the examination of current research issues and problems
● Gaining experience handling real-world security policy challenges through analysis of public documents and artifacts using written and oral communication.
● Developing the multidisciplinary skills needed to analyze, manage, and resolve the challenges associated with public policy, international relations, and governance.
● Students are encouraged to take experiment provided by Interfaculty Initiative in Information Studies/Graduate School of Interdisciplinary Information Studies
MIMA Search
時間割/共通科目コード
コース名
教員
学期
時限
5179008
GPP-DP6T00L3
国際公共政策実践研究(Introduction to Cybersecurity Policy)
大西 昭郎
S1 S2
火曜5限
マイリストに追加
マイリストから削除
講義使用言語
英語
単位
2
実務経験のある教員による授業科目
NO
他学部履修
開講所属
公共政策学教育部
授業計画
/Schedule*This course schedule is tentative and subject to change. Week 1(4/05): Introduction Instructor: Prof.Hayashi <Questions> What is cyberspace? Why do we care Internet Security? ・Week 2 (4/19): Foundation of Security: Internet and Network Com-munication Instructor: Mr. Asaba(IIJ Inc.) <Questions> What are technical components of internet communication? ・Week 3 (4/26): Economic Incentives for Cybersecurity Instructor: Prof. Onishi <Questions> What are economic incentives in cybersecurity? In what way is it important to the interest of stakeholders in the intersection of business, finance, and economy? ・Week 4 (4/28) Governing Body of Cybersecurity I (Public Policy) Guest Speaker: Mr. Eguchi(NISC/METI) <Questions> What is NISC? How has the founding of NISC shaped/reshaped Japan’s understanding of information/cybersecurity in the last 20 years? How does their mission assurance guide government officials/workers and their private partners to effective implementation of security policy and practice? ・Week 5 (05/10) Governing Body of Cyber Security II (Public Policy: International Strategy) Guest Speaker: Mr. Takema (NISC) <Questions> What are NISC’s key strategies for international dimensions? How does international perception of cybersecurity reflect on current Japanese security policy? ・Week 6 (05/187) Governing Body of Cyber Security III (Public Policy: industrial Strategies) Guest Speaker: Mr. Inose(METI) <Questions>
What is the main objective of METI in cybersecurity policy? How do they incorporate their cybersecurity policy into their main industrial/economic policy? ・Week 7 (05/24) Governing Body of Cybersecurity IV (Administering Technologies) Guest Speaker: Mr. Ogawa (IPA) <Central Questions> What is the chief role of IPA? Whom are they working closely with? What kind of security training programs and/or research do they provide to both public and private sectors? ・Week 8 (05/31) Governing Body of Cyber Security V (Incident Reporting/Communications) Guest Speakers: TBA (JP-CERT/CC) <Questions> What is the role of JP-CERT/CC? Which sector/field are they primarily focusing on? How do they set up communications to detect, analyze, and report the incidents to their main clients and related stakeholders? ・Week 9 (06/07) Protecting Your Workplace & Entire Corporate Group Guest Speakers: Mr. Furusawa (NTT) & Mr. Abe (NTT) <Question>
What must corporate enterprises do to defend its assets from dogged, malicious cyberattack? ・Week 10 (06/14) Special Topic: Security Innovation & Its Proliferation Guest Speaker: Mr. Fujii (NRI Secure) <Central Questions> What are current trends in cybersecurity practice? What changes does cybersecurity bring into the various industrial fields such as communications, technologies, manufacturing, transportation, medicine, etc. as of today? ・Week 11 (06/21) Standard Models & Assessment Tools for Cybersecurity Guest Speaker: Dr. Mori (Mitsubishi Electric Information Systems <Question> What is/are the standard model(s) for capacity building? ・Week 12(06/28) Cybersecurity & International Rule Making Guest Speaker: Mr.Takamizawa (former head of NISC) <Central Questions> What are the considerations for building international norms in various areas of cyber security?How do we deal with issues effectively in different areas including military and law enforcement? ・Week 13 (07/05) Student Presentations Student Presentations Due.23:55p.m(JST) June18, 2022 Final Paper Due: 23:55 p.m. (JST) July 31, 2022
授業の方法
The course applies Omnibus structures. For each subject of the course, professional guest speaker is invited for giving the lecture. Students are expected to participate Q&A sessions for each class, and asked submission of research paper after the class lecture series..
成績評価方法
Course Grade Based on the university course guideline, grade scale is divided into two categories. A.Class Contribution: 30% Attendance: 30% B. Final Research Paper: 70% Total: 100% A+ = 90% or above A = 80-89% B = 70-79% C = 60-69% F = 0-59% Attendance Policy: Your attendance is mandatory. It is your responsibility to manage your schedule during semester. Since this is the main portion of class contribution, your ability to attend every class is very important. In this class, you have 1 free absence without penalty. There are two types of absence: excused absence and unexcused absence. Excused absence is the absence that is deemed excusable for the consequence of missing class work due to the circumstances that physically keep you from attending against your will. In case of unexcused absence, you will be docked 2.5 points per class you miss. If you miss 4 classes, you will also receive a letter grade penalty.. Students who have 6 absences (whether you have excused absences or not) in total, will be dropped from this course. Assignment: Final Paper You will be assigned the final paper as a part of requirement for this course. In this assignment, you will write a research paper based on your choice of topic (with an ap-proval from instructor(s)) related to policy, politics, or any practice of digital/internet communications focused on the scope of cybersecurity. In your paper, you will bring a case from your home country, Japan, or any other country, address, discuss(or debate), and analyze the key issues in academic/scholarly manner. Here is a couple of required writings: 1) Research Proposal (1-2 pp.) Due: 11:59 p.m JST Sunday, July 5, 2021 (See section C.) 2) Final Paper (7-10pp.) Due: 23:59 p.m. Friday, July 31, 2021 (See section D.) You will also have to make a short presentation of your research proposal at the class on July 7. If you are not available on this day, you need to notify us beforehand. For more, see section B. A. Selection of topic: Your research paper should critically discuss and analyze the scope of key themes covered in this class.
教科書
Required textbook: There are no required textbooks for the class. Handouts and/or brochures will be provided in weekly guest lectures. Students are free to collect and make their own list of ‘study materials’ such as books, academic journals, news arti-cles, or published papers for background knowledge.
参考書
Suggested Readings (Recommended): Followings are the books related to cybersecurity study: Partick Burkart & Tom McCourt. Why Hackers Win:Power and Disruption in the Net-work Society. University of California Press, 2019. Kathleen Hall Jamieson. Cyberwar: How Russian Hackers and Trolls Helped Elect a President: What We Don't, Can't, And Do Know. Oxford University Press, 2018. Susan Landau. Listening In: Cybersecurity in an Insecure Age. Hartford: Yale Univer-sity Press. 2017. Milton Mueller. Will the Internet Fragment? Sovereignty, Globalization and Cyber-space Sovereignty, Globalization and Cyberspace. Cambridge(UK)/MA(USA): Polity, 2017. P. W. Singer & Allan Friedman. Cybersecurity and Cyberwar. Oxford, UK: Oxford University Press, 2014. National Research Council. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington, DC: The National Academies Press, 2014. Free download: http://www.nap.edu/***** Also, UC Berkley APEC Study Center published the new working paper series named Comparative Industrial Policy and Cybersecurity (BWP18) (BWP18-01/02/03/04/05/06/07/08/09). The series consists of 9 pieces of articles including framework analysis(-01), and case studies of US(-02), China(-03), EU(-04), France(-05), Japan(-06), Finland(-07), Taiwan(-08), and UK(-09). All articles are available on UC Berkley APEC Study Center Website at https://basc.berkeley.edu/***** Reference Sources Citation Machine (http://www.citationmachine.net)/***** Purdue Online Writing Lab (https://owl.purdue.edu/*****)
履修上の注意
Although this is not a technical course and technical knowledge about computer skills are not required, it is desirable for the students to be familiar with a variety of litera-tures such as up-to-date published research reports, policy documents, news articles, academic articles, etc