Search Protocol: The role of digital sovereignty in the development of national digital identity systems
Rapid Evidence Assessment: The role of digital sovereignty in the development of national digital identity systems
Week one: What's Wicked? Digital Technologies as Policy Problems
Lecture notes: What's Wicked: Digital Technologies as Policy Problems
Daviter, F. Coping, taming or solving: alternative approaches to the governance of wicked problems. (2017).
Langdon, W. Do Artefacts Have Politics? Winter, 1980.
Rules-based versus principles-based regulation – is there a clear front-runner? (ofcom)
Week two: The Internet of Everything: Security in Cyber-Physical-Social Systems
Lecture notes:
Adaptive governance for the Internet of Things: Coping with emerging security risks. Irina Bass & Jesse Sowell (2020)
Click Here to Kill Everyone. Bruce Schneier. 2017. With the Internet of Things, we’re building a world-size robot. How are we going to control it?
(US) IoT Cybersecurity Improvement Act of 2020
(UK) Product Security and Telecommunications Infrastructure Act 2022
Week three: The Right to Privacy in the Digital Age
Lecture notes:
Privacy and social interaction (2013)