+ All Categories
Home > Documents > PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg,...

PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg,...

Date post: 07-Jul-2018
Category:
Upload: lenga
View: 213 times
Download: 0 times
Share this document with a friend
12
1 FALL – 2015 HARVARD UNIVERSITY JOHN F. KENNEDY SCHOOL OF GOVERNMENT IGA–130M: International Regimes and Cyber Issues Tuesdays/Thursdays 10:15-11:30 PROFESSOR JOSEPH NYE Course Assistant: Faculty Assistant: Hugo Zylberberg Jeanne Marasca [email protected] [email protected] Phone number: 857-500-0760 (617) 495-4537 Week 1: Tuesday, September 1 – Shopping Day (43 pages) (35 pages) Keenan Mayo and Peter Newcomb, “How The Web Was Won”, Vanity Fair, July 2008, http://www.vanityfair.com/news/2008/07/internet200807 (6 pages) Evgeny Morozov, “Think Again: The Internet,” Foreign Policy, April 26, 2010, pp. 1-6, http://foreignpolicy.com/2010/04/26/think-again-the-internet/ (2 pages) John Perry Barlow, “A Declaration of the Independence of Cyberspace”, February 8, 1996, https://projects.eff.org/~barlow/Declaration-Final.html Thursday, September 3 – Power and Cyber Space (68 pages) (30 pages) Joseph Nye, The Future of Power, 2011, pp. 122-151. (20 pages) Jack Goldsmith and Tim Wu, Who Controls The Internet: Illusions of a Borderless World, 2006, pp. 65-85. (18 pages) Lawrence Lessig, “The Laws of Cyberspace”, 1998, https://cyber.law.harvard.edu/works/lessig/laws_cyberspace.pdf Optional: Hannes Ebert and Tim Maurer, “Contested Cyberspace and Rising Powers”, Third World Quarterly, Vol. 34, http://www.tandfonline.com/eprint/AIm2G9zziJbdUQSPRs34/full Joseph Nye, The Future of Power, 2011, pp. 5-22. Jack Goldsmith and Tim Wu, Who Controls The Internet: Illusions of a Borderless World, 2006, pp. 147-161, 179-184. Jill Rowland, Mason Rice, Sujeet Shenoi, “The anatomy of a cyber power,” International Journal of Critical Infrastructure Protection, Vol. 7, Issue 1, March 2014, pp. 3–11. Week 2:
Transcript
Page 1: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

1

FALL – 2015 HARVARD UNIVERSITY

JOHN F. KENNEDY SCHOOL OF GOVERNMENT

IGA–130M: International Regimes and Cyber Issues Tuesdays/Thursdays 10:15-11:30

PROFESSOR JOSEPH NYE

Course Assistant: Faculty Assistant: Hugo Zylberberg Jeanne Marasca [email protected] [email protected] Phone number: 857-500-0760 (617) 495-4537 Week 1: Tuesday, September 1 – Shopping Day (43 pages)

(35 pages) Keenan Mayo and Peter Newcomb, “How The Web Was Won”, Vanity Fair, July 2008, http://www.vanityfair.com/news/2008/07/internet200807

(6 pages) Evgeny Morozov, “Think Again: The Internet,” Foreign Policy, April 26, 2010, pp. 1-6, http://foreignpolicy.com/2010/04/26/think-again-the-internet/

(2 pages) John Perry Barlow, “A Declaration of the Independence of Cyberspace”, February 8, 1996, https://projects.eff.org/~barlow/Declaration-Final.html

Thursday, September 3 – Power and Cyber Space (68 pages)

(30 pages) Joseph Nye, The Future of Power, 2011, pp. 122-151.

(20 pages) Jack Goldsmith and Tim Wu, Who Controls The Internet: Illusions of a Borderless World, 2006, pp. 65-85.

(18 pages) Lawrence Lessig, “The Laws of Cyberspace”, 1998, https://cyber.law.harvard.edu/works/lessig/laws_cyberspace.pdf

Optional:

Hannes Ebert and Tim Maurer, “Contested Cyberspace and Rising Powers”, Third World Quarterly, Vol. 34, http://www.tandfonline.com/eprint/AIm2G9zziJbdUQSPRs34/full

Joseph Nye, The Future of Power, 2011, pp. 5-22.

Jack Goldsmith and Tim Wu, Who Controls The Internet: Illusions of a Borderless World, 2006, pp. 147-161, 179-184.

Jill Rowland, Mason Rice, Sujeet Shenoi, “The anatomy of a cyber power,” International Journal of Critical Infrastructure Protection, Vol. 7, Issue 1, March 2014, pp. 3–11.

Week 2:

Page 2: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

2

Tuesday, September 8 – International Regime Theory (70 pages)

(22 pages) Andreas Hasenclever, Theories of International Regimes, 1997, pp. 1-22.

(24 pages) Robert Keohane and David Victor, “The Regime Complex for Climate Change,” Perspectives on Politics, March 2011, pp. 2-25.

(24 pages) Joseph Nye, “Maintaining the Non-Proliferation Regime,” International Organization, Winter 1981, pp. 15-38.

Thursday, September 10 – Cyberspace and Regimes (67 pages)

(15 pages) Joseph Nye, “The Regime Complex for Managing Global Cyber Activities,” November 2014, pp. 1-15, http://belfercenter.hks.harvard.edu/files/global-cyber-final-web.pdf

(30 pages) Tim Maurer, “Cyber Norm Emergence at the United Nations,” September 2011, pp. 15-45, http://belfercenter.ksg.harvard.edu/files/maurer-cyber-norm-dp-2011-11-final.pdf

(22 pages) “Towards a Collaborative, Decentralized Internet Governance Ecosystem,” Report by the Panel on Global Internet Cooperation and Governance Mechanisms, May 2014, pp. 2-23, http://internetgovernancepanel.org/sites/default/files/ipdf/XPL_ICAN1403_Internet%20Governance%20iPDF_06.pdf

Optional:

Martha Finnemore, “Cultivating International Cyber Norms,” in America’s Cyber Future: Security and Prosperity in the Information Age, June 2011, pp. 89-100, http://citizenlab.org/cybernorms2011/cultivating.pdf

Page 3: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

3

Week 3: Tuesday, September 15 – Internet Governance (68 pages)

(9 pages) Jovan Kurbalija, An Introduction to Internet Governance, 6th edition, 2014, pp. 5-13, http://www.diplomacy.edu/sites/default/files/An%20Introduction%20to%20IG_6th%20edition.pdf

(22 pages) Jack Goldsmith and Tim Wu, Who Controls The Internet: Illusions of a Borderless World, 2006, pp. 29-46, 168-171.

(17 pages) Laura DeNardis and Mark Raymond, “Thinking Clearly about Multistakeholder Internet Governance,” presented at Eighth Annual GigaNet Symposium in Bali, Indonesia, pp. 1-17, http://www.phibetaiota.net/wp-content/uploads/2013/11/Multistakeholder-Internet-Governance.pdf

(4 pages) Camino Cavanagh, “The UN GGE on Cybersecurity: The Important Drudgery of Capacity Building”, Council on Foreign Relations' Net Politics blog, April 13, 2015, http://blogs.cfr.org/cyber/2015/04/13/the-un-gge-on-cybersecurity-the-important-drudgery-of-capacity-building/

IANA Transition

(4 pages) L. Gordon Crovitz, “America’s Internet Surrender,” The Wall Street Journal, March 18, 2014, http://www.wsj.com/articles/SB10001424052702303563304579447362610955656

(7 pages) Jonathan Zittrain, “No Barack Obama Isn’t Handing Control of the Internet Over to China,” New Republic, March 24, 2014, http://www.newrepublic.com/article/117093/us-withdraws-icann-why-its-no-big-deal

(5 pages) Jack Goldsmith, “The Tricky Issue of Severing United States “Control” Over ICANN,” Hoover Institution, February 24, 2015, http://www.hoover.org/research/tricky-issue-severing-us-control-over-icann

Optional:

Lu Wei, “Cyber Sovereignty Must Rule Global Internet,” The World Post, December 15, 2014, http://www.huffingtonpost.com/lu-wei/china-cyber-sovereignty_b_6324060.html

Hugh Carnegy, “France lashes out at internet naming body ICANN,” Financial Times, June 22, 2014, http://www.ft.com/intl/cms/s/0/828ad97c-f94a-11e3-bb9d-00144feab7de.html

James Lewis, “Harnessing Leviathan: Internet Governance and Cybersecurity,” in Nicholas Burns and Jonathan Price, eds., Securing Cyberspace, pp. 113-126.

Page 4: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

4

Akash Kapur, “Internet Governance – a primer,” pp. 1-30, http://en.wikibooks.org/wiki/Internet_Governance

Rebecca MacKinnon, Consent of the Networked, 2012, pp. 203-219.

Bruce Schneier, “The Battle for Power on the Internet,” The Atlantic, October 24, 2013, pp. 1-7, http://www.theatlantic.com/technology/archive/2013/10/the-battle-for-power-on-the-internet/280824/

Alexander Klimburg, “Watering the Grass Roots,” Internet & Society <Co:llaboratory>, http://en.collaboratory.de/w/Watering_the_Grass_Roots

Milton Mueller, “Threat Analysis of ITU’s WCIT,” Internet Governance Project,

o Part 1: HISTORICAL CONTEXT (May 24, 2012) http://www.internetgovernance.org/2012/05/24/threat-analysis-of-itus-wcit-part-1-historical-context/

o Part 2: TELECOMMUNICATIONS VS. INTERNET (June 7, 2012) http://www.internetgovernance.org/2012/06/07/threat-analysis-of-wcit-part-2-telecommunications-vs-internet/

o Part 3: CHARGING YOU, CHARGING ME (June 9, 2012) http://www.internetgovernance.org/2012/06/09/threat-analysis-of-wcit-part-3-charging-you-charging-me/

o Part 4: THE ITU AND CYBERSECURITY (June 21, 2012) http://www.internetgovernance.org/2012/06/21/threat-analysis-of-the-wcit-4-cybersecurity/

Samantha Dickinson, “How will internet governance change after the ITU conference?”, The Guardian, November 7, 2014, http://www.theguardian.com/technology/2014/nov/07/how-will-internet-governance-change-after-the-itu-conference

Alexander Klimburg, “Building a Pluralist Future for the Internet”, Atlantic Council, September 2, 2014 http://www.atlanticcouncil.org/publications/articles/building-a-pluralist-future-for-the-internet

Thursday, September 17 – Cyberspace and Security (61 pages)

(29 pages) Richard Danzig, “Surviving on a Diet of Poisoned Fruit,” Center for New American Security, July 2014, pp. 8-36, http://www.cnas.org/sites/default/files/publications-pdf/CNAS_PoisonedFruit_Danzig_0.pdf

(32 pages) P.W. Singer and Alan Friedman, Cyber Security and Cyberwar, 2014, pp. 34-66.

Optional:

Page 5: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

5

Melissa E. Hathaway and Alexander Klimburg, “Preliminary Considerations: On National Cyber Security,” in Klimburg, ed. National Cyber Security, pp. 20-43, http://belfercenter.hks.harvard.edu/files/hathaway-klimburg-nato-manual-ch-1.pdf

Eneken Tikk, “Ten Rules for Cyber Security,” Survival, June/July 2011, http://www.aofs.org/wp-content/uploads/2010/12/CCDCOE-Ten-Rules-for-Cyber-Security.pdf

Joseph Nye, “Nuclear Lessons for Cyber Security, Strategic Studies Quarterly, pp. 18-36, http://www.au.af.mil/au/ssq/2011/winter/nye.pdf

Deirdre K. Mulligan and Fred B. Schneider, “Doctrine for Cybersecurity,” Daedalus, May 15, 2011, pp. 9-30, http://www.cs.cornell.edu/fbs/publications/publicCYbersecDaed.pdf

Chris Demchak and Peter Dombrowski, “Rise of a Cybered Westphalian Age,” Strategic Studies Quarterly, Spring 2011, pp. 32-57, http://www.au.af.mil/au/ssq/2011/spring/demchak-dombrowski.pdf

Harold Koh, “International Law in Cyberspace,” remarks as prepared for delivery at the U.S. CYBERCOM Inter-Agency Legal Conference in Ft. Meade, MD, September 18, 2012, http://www.state.gov/s/l/releases/remarks/197924.htm

“Cybersecurity,” Digital Agenda for Europe: A Europe 2020 Initiative, https://ec.europa.eu/digital-agenda/en/cybersecurity#Article

“Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace,” European Commission, 2013, http://eeas.europa.eu/policies/eu-cyber-security/cybsec_comm_en.pdf

Olga Razumovskaya, “Russia and China Pledge Not to Hack Each Other,” May 8, 2015, http://blogs.wsj.com/digits/2015/05/08/russia-china-pledge-to-not-hack-each-other/

Shanghai Cooperation Organization, “International Code of Conduct for Information Security”, version proposed on January 9, 2015 to the UN, https://ccdcoe.org/updated-draft-code-conduct-distributed-united-nations-whats-new.html

Week 4: Student Presentations Tuesday, September 22 – Team 1: Cyber Crime (53 pages)

(17 pages) Michael A. Vatis, “The Council of Europe Convention on Cybercrime,” Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for U.S. Policy, National Academy of Sciences, pp. 207-223, http://cs.brown.edu/courses/csci1950-p/sources/lec16/Vatis.pdf

(18 pages) Tyler Moore, Richard Clayton, and Ross Anderson, “The Economics of Online Crime,” Journal of Economic Perspectives, pp. 3-20, http://pubs.aeaweb.org/doi/pdfplus/10.1257/jep.23.3.3

(18 pages) Marc Goodman, Future Crimes, 2015, pp. 193-220.

Page 6: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

6

Optional:

Milton Mueller, Networks and States, 2013, pp. 161-176.

James Lewis, “The economic impact of cybercrime and cyberespionage,” Center for Strategic and International Studies, July 2013, pp. 3-19, http://csis.org/files/publication/60396rpt_cybercrime-cost_0713_ph4_0.pdf

The UNODC Comprehensive Study on Cybercrime (Draft), February 2013, pp. 1-39, http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

Thursday, September 24 – Team 2: War, Sabotage, and Arms Control (52 pages)

(4 pages) John Arquilla, “Cyberwar is Already Upon Us: But can it be controlled?” Foreign policy, February 27, 2012, http://foreignpolicy.com/2012/02/27/cyberwar-is-already-upon-us/

(10 pages) Thomas Rid, “Think Again: Cyberwar,” Foreign Policy, February 27, 2012, http://foreignpolicy.com/2012/02/27/think-again-cyberwar/

(24 pages) Herbert S. Lin, “Offensive Cyber Operations and the Use of Force,” Journal of National Security Law & Policy, pp. 63-86, http://jnslp.com/wp-content/uploads/2010/08/06_Lin.pdf

(12 pages) Jack Goldsmith, “Cybersecurity Treaties: A Skeptical View,” Hoover Institution, March 9, 2011, pp.1-12, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf

(2 pages) Bruce Schneier, “Cyberwar Treaties”, Schneier on Security, June 14, 2012 https://www.schneier.com/blog/archives/2012/06/cyberwar_treati.html

Optional:

Stewart Baker, Orin Kerr, and Eugene Volokh, “The Hackback Debate,” Steptoe Cyber Blog, November 2, 2012, http://www.steptoecyberblog.com/2012/11/02/the-hackback-debate/

Irving Lachow, “Cyber Terrorism: Menace or Myth?” in F. Kramer, S. Starr, and L. Wentz, eds., Cyberpower and National Security, pp. 437-464, http://ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap-19.pdf

Milton Mueller, “Are We in a Digital Cold War?” Presentation at Giganet Workshop, Geneva, May 17, 2013, pp. 1-13, http://www.internetgovernance.org/wordpress/wp- content/uploads/DigitalColdWar31.pdf

Alex Grigsby, “The Futile Effort to Determine When a Cyber Incident Becomes an Armed Attack,” Council on Foreign Relations, January 14, 2015, http://blogs.cfr.org/cyber/2015/01/14/the-futile-effort-to-determine-when-a-cyber-incident-becomes-an-armed-attack/

Page 7: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

7

Gary D. Brown and Andrew O. Metcalf, “Easier Said Than Done: Legal Reviews of Cyber Weapons,” Journal of National Security Law & Policy, pp. 115-120 & 127-138, http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf

Page 8: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

8

Week 5: Student Presentations Tuesday, September 29 – No class – Office Hours Thursday, October 1 – Privacy, Surveillance & Espionage (84 pages)

(69 pages) Bruce Schneier, David and Goliath, 2015, pp. 14-45, 155-189.

(15 pages) “Toward a Social Compact for Digital Privacy and Security,” Statement by the Global Commission on Internet Governance, May 2015, pp. 1-15, https://ourinternet-files.s3.amazonaws.com/publications/GCIG_Social_Compact.pdf

David Omand, to be determined

Optional: Privacy and Surveillance

Paul Schwartz, “Differing Privacy Regimes: A Mini-Poll on Mutual EU-U.S. Distrust,” July 22, 2014, https://privacyassociation.org/news/a/differing-privacy-regimes-a-mini-poll-on-mutual-eu-u-s-distrust/

Nick D’Ambrosio, “Tips for Coping with Global Data Privacy Regimes,” SCCE Utilities & Energy Conference, 2013, http://www.corporatecompliance.org/Portals/1/PDF/Resources/past_handouts/Utilities-Energy-Compliance-Ethics/2013/Tuesday/402handout.pdf

Privacy and Civil Liberties Oversight Board, “Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act,” July 2, 2014, pp. 5-15, https://www.pclob.gov/library/702-Report.pdf

Samuel D. Warren and Louis D. Brandeis, The Right to Privacy, Harvard Law Review, Vol. 4, No. 5, 1890, http://www.english.illinois.edu/-people-/faculty/debaron/582/582%20readings/right%20to%20privacy.pdf

Ed Felten, PCLOB Testimony on Defining Privacy, Freedom to Tinker, Nov. 12, 2014, https://freedom-to-tinker.com/blog/felten/pclob-testimony-on-defining-privacy/

Report and Recommendations of The President’s Review Group on Intelligence and Communications Technology,” Liberty and Security in a Changing World,” December 12, 2013, https://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf

Jeffrey Toobin, “The Solace of Oblivion,” The New Yorker, September 29, 2014, http://www.newyorker.com/magazine/2014/09/29/solace-oblivion

President’s Council of Advisors on Science and Technology, “Big Data and Privacy: A Technological Perspective,” executive summary, pp. ix-xiv, https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf

Page 9: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

9

Jeffrey Rosen, “The Web Means the End of Forgetting”, The New York Times, July 21 , 2010 http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?_r=0&pagewanted=print

Espionage

Paul Giura and Wei Wang, “Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats,” (includes excellent explanation of an APT), pp. 1-13, http://www.research.att.com/techdocs/TD_101075.pdf

Shannon Tiezzi, “China’s Response to the US Cyber Espionage Charges,” The Diplomat, May 21, 2014, http://thediplomat.com/2014/05/chinas-response-to-the-us-cyber-espionage-charges/

Adam Segal, “The Code Not Taken: China, the US and the Future of Cyber Espionage,” Bulletin of the Atomic Scientists. 69(5), pp. 38-44.

Shane Harris, “Exclusive: Inside the FBI’s Fight Against Chinese Cyber-Espionage,” Foreign Policy, May 27, 2014, http://foreignpolicy.com/2014/05/27/exclusive-inside-the-fbis-fight-against-chinese-cyber-espionage/

Mandiant, APT1: Exposing One of China’s Cyber Espionage Units, 2013. http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

FireEye, “APT28 - A Window Into Russia's Cyber Espionage Operations?”, October 27, 2014, https://www2.fireeye.com/apt28.html

Nicolas Falliere, Liam O Murchu, and Eric Chien. W32.Stuxnet Dossier, Version 1.4., February 2011 http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf

Adam Segal, “Chinese Cyber Espionage: We Still Don't Know What To Do About It,” Forbes, June 11, 2014, http://www.forbes.com/sites/adamsegal/2014/06/11/weve-got-the-who-how-why-and-why-it-matters-of-chinese-cyber-espionage-still-missing-the-what-to-do/

Page 10: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

10

Week 6: Student Presentations Tuesday, October 6 – Data Localization/Sovereignty (55 pages)

(10 pages) Jack Goldsmith and Tim Wu, Who Controls The Internet: Illusions of a Borderless World, 2006, pp. 1-10

(33 pges) Jonah Force Hill, “The Growth of Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Industry Leaders,” Lawfare Research Paper Series, Vol. 2, No. 3, July 21, 2014, pp. 2-34, http://www.lawfareblog.com/wp-content/uploads/2014/07/Lawfare-Research-Paper-Series-Vol2No3.pdf

(8 pages) Orin Kerr, “What legal protections apply to e-mail stored outside the U.S.?,” The Washington Post, July 7, 2014, http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/07/07/what-legal-protections-apply-to-e-mail-stored-outside-the-u-s/

(4 pages) Steve Lohr, “Microsoft Protests Order to Disclose Email Stored Abroad,” The New York Times, June 10, 2014, http://www.nytimes.com/2014/06/11/technology/microsoft-protests-order-for-email-stored-abroad.html?_r=0

Optional:

Anupam Chander and Uyen P. Le, “Breaking the Web: Data Localization vs. the Global Internet,” UC Davis Legal Studies Research Paper Series, April 2014, pp. 3-26, http://ssrn.com/abstract=2407858

Matthias Bauer, Hosuk Lee-Makiyama, Erik van der Marel, Bert Verschelde, “The Costs of Data Localisation: Friendly Fire on Economic Recovery,” ECIPE Occasional Paper • No. 3/2014, pp. 2-15, http://www.ecipe.org/app/uploads/2014/12/OCC32014__1.pdf

Thursday, October 8 – Human Rights, Free Speech, and Content Control (67 pages)

(16 pages) Rebecca MacKinnon, Consent of the Networked, 2012, pp. 187-202.

(14 pages) Viktor-Meyer Schönberger and Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work, and Think, 2014, pp. 150-163.

(10 pages) Richard Falkenrath, “Internet Freedoms and its Tensions with Cybersecurity,” in Burns and Price, eds, Securing Cyberspace, 2012, pp. 161-170.

(17 pages) Milton Mueller, Networks and States, 2013, pp. 185-201.

(10 pages) Jef Ausloos, “The 'Right to be Forgotten' – Worth Remembering?”, Computer Law & Security Review, 2012, pp. 143-152

Optional:

Page 11: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

11

Natalie Green and Carolina Rossini, “Cyber Security and Human Rights,” Public Knowledge, 2015, https://www.gccs2015.com/sites/default/files/documents/Introduction%20Document%20for%20GCCS2015%20Webinar%20Series%20-%20Cybersecurity%20and%20Human%20Rights%20(1).pdf

Vindu Goel and Andrew E. Draemer, “Web Freedom is Seen as a Growing Issue,” The New York Times, January 1, 2015, http://www.nytimes.com/2015/01/02/business/international/web-freedom-is-seen-to-be-growing-as-a-global-issue-in-2015.html

Andrew Jacobs, “China Clamps Down Still Harder on Internet Access,” The New York Times, January 29, 2014, http://www.nytimes.com/2015/01/30/world/asia/china-clamps-down-still-harder-on-internet-access.html

Week 7: Student Presentations Tuesday, October 13 – Confidence Building Measures (68 pages)

(19 pages) “OSCE Guide on Non-military Confidence-Building Measures (CBMs),” pp. 9-27, http://www.osce.org/cpc/91082?download=true

(26 pages) Katherine Ziolkowski “Confidence Building Measures in Cyberspace – Legal Implications,” pp. 6-31, https://ccdcoe.org/publications/CBMs.pdf

(9 pages) James Andrew Lewis, “Confidence-building and international agreement in cybersecurity,” Confronting cyberconflict, 2011, pp. 51-59, https://citizenlab.org/cybernorms2012/Lewis2011.pdf

(5 pages) Zdzislaw Lachowski, “Confidence- and Security-Building Measures in the New Europe,” SIPRI Research Report No. 18, 2004, pp. 10-14, http://books.sipri.org/files/RR/SIPRIRR18.pdf

(9 pages) Roger Hurwitz, “The Play of States: Norms and Security in Cyberspace, American Foreign Policy Interests, Vol. 36, Iss. 5, 2014

Optional:

“Decision No. 1106 Initial Set of OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming From the Use of Information And Communication Technologies,” Organization for Security and Co-operation in Europe, 975th Plenary Meeting, December 2013, http://www.osce.org/pc/109168?download=true

Co-Chairs' Summary Report of the ASEAN Regional Forum (ARF) Seminar on Confidence Building Measures in Cyberspace in Seoul, Republic of Korea, September 11-12 2012, pp. 3-5, http://www.mofa.go.jp/files/000016406.pdf

Page 12: PROFESSOR JOSEPH NYE Course Assistant: Faculty … · 5 Melissa E. Hathaway and Alexander Klimburg, “Preliminary onsiderations: On National yber Security,” in Klimburg, ed. National

12

Kim Geun-hye, Lee Kyung-bok, and Lim Jong-in, “CBMs for Cyberspace beyond the Traditional Security Environment: Focusing on Features for CBMs for Cyberspace in Northeast Asia,” The Korean Journal of Defense Analysis, Vol. 27, No. 1, March 2015, pp. 87–106.

Thursday, October 15 – Concluding Discussions


Recommended