Search Protocol: The role of digital sovereignty in the development of national digital identity systems

Rapid Evidence Assessment: The role of digital sovereignty in the development of national digital identity systems

Week one: What's Wicked? Digital Technologies as Policy Problems

Lecture notes: What's Wicked: Digital Technologies as Policy Problems

Daviter, F. Coping, taming or solving: alternative approaches to the governance of wicked problems. (2017).

Langdon, W. Do Artefacts Have Politics? Winter, 1980.

Rules-based versus principles-based regulation – is there a clear front-runner? (ofcom)

Week two: The Internet of Everything: Security in Cyber-Physical-Social Systems

Lecture notes:

Adaptive governance for the Internet of Things: Coping with emerging security risks. Irina Bass & Jesse Sowell (2020)

Click Here to Kill Everyone. Bruce Schneier. 2017. With the Internet of Things, we’re building a world-size robot. How are we going to control it?

(US) IoT Cybersecurity Improvement Act of 2020

(UK) Product Security and Telecommunications Infrastructure Act 2022

Week three: The Right to Privacy in the Digital Age

Lecture notes:

Privacy and social interaction (2013)