This module provides an overview of the degree to which cyberspace continues to revolutionise the operations of both state and non-state actors, and the challenges of governing this 'fifth sphere' of power projection. Whilst this module is not entrenched in International Relations or Security Studies theory, students will have the opportunity to apply both traditional and non-traditional approaches to the politics of cyberspace. Key themes include: 21st century technology, cyber warfare, espionage, surveillance, deterrence theory, cyberterrorism, and representation of threatening cyber-entities. Students will develop a toolkit to critique the existing state and NGO-based governance regime for cyberspace, and will convey arguments both for and against a ‘Geneva Convention’ for cyberspace.
This module appears in the following module collections.
Total contact hours: 22
Private study hours: 128
Total study hours: 150
Method of assessment
Briefing papers (x 2) of 500 words each (2 x 15% = 30%)
Essay, 3,000 words (70%)
Thomas Chen, Lee Jarvis and Stuart Macdonald, (2014) Cyberterrorism: Understanding, Assessment, and Response, New York: Springer
Nazli Choucri et al., (2019) Cyberspace and International Relations: The Co-Evolution Dilemma, Cambridge MA: MIT Press
Lucas Kello, (2018) The Virtual Weapon and International Order, New Haven CT: Yale University Press
Jan-Frederick Kremer and Benedikt Muller, (2014) Cyberspace and International Relations: Theory, Prospects and Challenges, New York: Springer
David Sanger, (2018) The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age, London: Scribe
Damien Van Puyvelde and Aaron Brantly, (2019) Cybersecurity: Politics, Governance and Conflict in Cyberspace, Cambridge: Polity Press
See the library reading list for this module (Canterbury)
On successfully completing the Level 6 module students will be able to:
Understand and critically assess various definitions of cyberspace
Demonstrate a critical understanding of the existing structures for the governance of cyberspace, and the challenges of progressing this governance regime further
Critique the manner in which cyberspace can be used as a means of power projection by both state and non-state actors
Demonstrate a critical understanding of cyber weaponry and its potential effects
Critically analyse the role of identity and representation in the formation of a 'Politics of Cybersecurity'.
Apply knowledge gained in the module to assess cases of both 'online' and 'offline' conflagration.
Back to top
Credit level 6. Higher level module usually taken in Stage 3 of an undergraduate degree.
- ECTS credits are recognised throughout the EU and allow you to transfer credit easily from one university to another.
- The named convenor is the convenor for the current academic session.
University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.