In order to better understand the content of the course, the lecturers have drawn up a list of recommended readings. We ask you to go through the materials before the start of the course.
DAY 1: FRIDAY, September 8
Lecture 1: Computing and Networks: The Basics
- Harold Abelson et al., "Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications", Computer Science and Artificial Intelligence Laboratory Technical Report, CSAIL, Massachusetts Institute of Technology (July 2015)
Lecture 2: Computer Security: Authentication and Biometrics
- Mario Frank et al., "Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication", IEEE Transactions on Information Forensics and Security, Vol. 8, No. 1 (January 2013),
- Andrew Martin and Ivan Martinovic, "Security and Privacy Impacts of a Unique Personal Identifier", Cyber Studies Working Paper Series No .4
Lecture 3: Blockchains: Design Principles, Applications, and Case Studies
- Juri Mattila, BERKELEY ROUNDTABLE ON THE INTERNATIONAL ECONOMY (BRIE) UNIVERSITY OF CALIFORNIA, BERKELEY, BRIE Working Paper 2016-1
- Martinovic, Ivan. Blockchains: Design Principles, Applications, and Case Studies (working paper)
Lecture 4: National and International Security in the Cyber Age
- Joseph S. Nye, Jr., "Nuclear Lessons for Cyber Security", Strategic Studies Quarterly (Winter 2011),
- Thomas Rid, "Cyber War Will Not Take Place", Journal of Strategic Studies, 35.1 (2012), pp. 5-32,
- Lucas Kello, "The Meaning of the Cyber Revolution: Perils to Theory and Statecraft", International Security 38.2 (Fall 2013), pp. 7-40
DAY 2: SATURDAY, September 9
Lecture 5: National Digital Infrastructures for Healthcare
- Ribes, D., & Lee, C. P. (2010). Sociotechnical Studies of Cyberinfrastructure and e-Research: Current Themes and Future Trajectories. Computer Supported Cooperative Work (CSCW), 19(3–4), 231–244.
- Bowker, Geoffrey C, Karen Baker, Florence Millerand, and David Ribes. (2010). Toward Information Infrastructure Studies: Ways of Knowing in a Networked Environment. In J. Hunsinger, L. Klastrup, & M. Allen (Eds.), International Handbook of Internet Research (pp. 97–117). Springer Netherlands.
- Kaltenbrunner, Wolfgang. (2017). Digital Infrastructure for the Humanities in Europe and the US: Governing Scholarship through Coordinated Tool Development. Computer Supported Cooperative Work (CSCW), vol. 26, no. 3, pp. 275–308.
- Plantin, Jean-Christophe, Carl Lagoze, Paul N Edwards, and Christian Sandvig. (2016). Infrastructure studies meet platform studies in the age of Google and Facebook. New Media & Society, pp. 146144481666155. doi:10.1177/1461444816661553
- Kaltenbrunner, Wolfgang. Digital Infrastructure for the Humanities in Europe and the US: Governing Scholarship through Coordinated Tool Development
- Willis, Matt. National Digital Infrastructures for Healthcare: A Comparative Case of Estonia’s and the United Kingdom’s Healthcare Infrastructure (working paper)
Lecture 6: The Role of the Once-Only Principle in Cross-border Data sharing in and outside Europe
- Krimmer, R., Kalvet, T., Toots, M., Cepilovs, A. The Once-Only Principle Project. Position Paper on Definition of OOP and Situation in Europe. (2017)
Lecture 7: Cyber Security Assemblages: Public-Private Interaction in Contemporary Security Challenges
- Rita Abrahamsen and Michael C. Williams, Security Beyond the State: Global Security Assemblages in International Politics International Political Sociology (2009) 3, 1–17
- Madeline Carr, Public–Private Partnerships in National Cyber-Security Strategies, International Affairs (2016) 92:1 43–62