Governance and War in Cyberspace - POLI6910

Looking for a different module?

Module delivery information

Location Term Level1 Credits (ECTS)2 Current Convenor3 2021 to 2022
Autumn Term 6 15 (7.5) Gareth Mott checkmark-circle


This module provides an overview of the degree to which cyberspace continues to revolutionise the operations of both state and non-state actors, and the challenges of governing this 'fifth sphere' of power projection. Whilst this module is not entrenched in International Relations or Security Studies theory, students will have the opportunity to apply both traditional and non-traditional approaches to the politics of cyberspace. Key themes include: 21st century technology, cyber warfare, espionage, surveillance, deterrence theory, cyberterrorism, and representation of threatening cyber-entities. Students will develop a toolkit to critique the existing state and NGO-based governance regime for cyberspace, and will convey arguments both for and against a ‘Geneva Convention’ for cyberspace.


Contact hours

Total contact hours: 22
Private study hours: 128
Total study hours: 150


This optional module contributes to all programmes offered by, and with, the School of Politics and International Relations.

Method of assessment

Briefing papers (x 2) of 500 words each (2 x 15% = 30%)
Essay, 3,000 words (70%)

13.2 Reassessment methods: 100% coursework

Indicative reading

Thomas Chen, Lee Jarvis and Stuart Macdonald, (2014) Cyberterrorism: Understanding, Assessment, and Response, New York: Springer
Nazli Choucri et al., (2019) Cyberspace and International Relations: The Co-Evolution Dilemma, Cambridge MA: MIT Press
Lucas Kello, (2018) The Virtual Weapon and International Order, New Haven CT: Yale University Press
Jan-Frederick Kremer and Benedikt Muller, (2014) Cyberspace and International Relations: Theory, Prospects and Challenges, New York: Springer
David Sanger, (2018) The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age, London: Scribe
Damien Van Puyvelde and Aaron Brantly, (2019) Cybersecurity: Politics, Governance and Conflict in Cyberspace, Cambridge: Polity Press

See the library reading list for this module (Canterbury)

Learning outcomes

The intended subject specific learning outcomes. On successfully completing the Level 6 module students will be able to:

1. Understand and critically assess various definitions of cyberspace

2. Demonstrate a critical understanding of the existing structures for the governance of cyberspace, and the challenges of progressing this governance regime further 3. Critique the manner in which cyberspace can be used as a means of power projection by both state and non-state actors 4. Demonstrate a critical understanding of cyber weaponry and its potential effects 5. Critically analyse the role of identity and representation in the formation of a 'Politics of Cybersecurity'. 6. Apply knowledge gained in the module to assess cases of both 'online' and 'offline' conflagration.

The intended generic learning outcomes. On successfully completing the Level 6 module students will be able to:

1. Gather, organise and deploy evidence, data and information from a variety of secondary and some primary sources

2. Identify, investigate, analyse, formulate and advocate solutions to problems

3. Develop reasoned arguments, synthesise relevant information and exercise critical judgement

4. Be self-reflective and critical of their own work

5. Effectively use online bibliographic search engines, online resources, and conduct research

6. Engage in academic and professional communication with others.


  1. Credit level 6. Higher level module usually taken in Stage 3 of an undergraduate degree.
  2. ECTS credits are recognised throughout the EU and allow you to transfer credit easily from one university to another.
  3. The named convenor is the convenor for the current academic session.
Back to top

University of Kent makes every effort to ensure that module information is accurate for the relevant academic session and to provide educational services as described. However, courses, services and other matters may be subject to change. Please read our full disclaimer.