0% found this document useful (0 votes)
31 views2 pages

Cyber Securityc Ourse Outline

The course 'Cybersecurity Issues in Diplomacy' at Nkumba University examines the relationship between cybersecurity and international diplomacy, focusing on how digital technologies impact global security and state interactions. It includes theoretical foundations and empirical case studies, covering topics such as cyber strategies, legal frameworks, and international incidents. Students will engage with core texts and complete coursework that involves critical assessments and analytical summaries of key literature in the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views2 pages

Cyber Securityc Ourse Outline

The course 'Cybersecurity Issues in Diplomacy' at Nkumba University examines the relationship between cybersecurity and international diplomacy, focusing on how digital technologies impact global security and state interactions. It includes theoretical foundations and empirical case studies, covering topics such as cyber strategies, legal frameworks, and international incidents. Students will engage with core texts and complete coursework that involves critical assessments and analytical summaries of key literature in the field.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Nkumba University

School of Social Sciences


Department of International Political Science
Course Title: Cybersecurity Issues in Diplomacy
Programs: MA in International Relations and Diplomacy / MA in Security Studies
Instructor: Mirembe Sarah |Mob: +256700584120 |Email: [email protected]
Course Description: This course explores the intersection of diplomacy, cybersecurity, and global
security in the 21st century. It analyzes how digital technologies have reshaped global conflict,
espionage, state power, and diplomatic interactions. Through a combination of theoretical
foundations and empirical case studies, students examine cyber strategies, international legal
frameworks, and real-world cyber incidents involving state and non-state actors. The course draws
on three main texts to balance strategic, legal, and operational perspectives.
Core Textbooks:
1. Reveron, Derek S. (2012). Cyberspace and National Security: Threats, Opportunities, and
Power in a Virtual World. Georgetown University Press.
2. Tikk, Eneken; Kaska, Kadri; & Vihul, Liis (2010). International Cyber Incidents: Legal
Considerations. NATO CCDCOE.
3. Valeriano, Brandon; Jensen, Benjamin; & Maness, Ryan (2018). Cyber Strategy: The
Evolving Character of Power and Coercion. Oxford University Press.
Course Objectives:
 Understand key cybersecurity concepts and their relevance to international diplomacy.
 Analyze state cyber strategies including coercion, espionage, and disruption.
 Evaluate real-world case studies of international cyber incidents.
 Interpret international legal and diplomatic responses to cyber threats.
 Design policy briefs and strategic responses to cyber conflicts.
Course Schedule
Introduction to Cybersecurity and Diplomacy
 Topics: Defining cyberspace, threats, sovereignty, diplomatic challenges
 Readings: Reveron, Ch. 1 (pp. 3–20); Valeriano et al., Intro (pp. 1–6)
Cyber Threats and State Behavior
 Topics: State-centric cyber threats, coercion, cyber political warfare
 Readings: Valeriano et al., Ch. 1 (pp. 11–21), Reveron Ch. 4 (pp. 57–70)
Disruption, Espionage, and Degradation as Strategy
 Topics: Typology of cyber strategies; strategic signaling
 Readings: Valeriano et al., Ch. 2 (pp. 11–45), Reveron Ch. 3 (pp. 37–56)
Legal Frameworks and Norms in Cyberspace
 Topics: Sovereignty, legal attribution, norms, UNGGE
 Readings: Tikk et al., pp. 9–12, 25–30; 79-05, Reveron Ch. 5 (pp. 71–88)
International Cyber Incidents: Estonia, Georgia, Lithuania
 Topics: Case-based legal and political analysis; hybrid warfare
 Readings: Tikk et al., pp. 14–89 (case studies)
Cyber Deterrence and Restraint
 Topics: Deterrence theory, challenges of cyber deterrence
 Readings: Reveron Ch. 6–7 (pp. 89–120); Valeriano et al., Ch. 4 (pp. 65–84)
Attribution and Escalation Dynamics
 Topics: Credibility, escalation management, misattribution risks
 Readings: Valeriano et al., Ch. 3 (pp. 47–63); Tikk et al., pp. 101–104
National Approaches: U.S., Russia, China
 Topics: Offensive and defensive strategies; cyber capabilities
 Readings: Reveron Ch. 11–12 (pp. 173–206); Valeriano et al., Ch. 5–6 (pp. 85–115)
Strategic Cyber Competition and Rivalries
 Topics: US-China rivalry, Russia's hybrid warfare, cyber arms races
 Readings: Valeriano et al., Ch. 7 (pp. 117–136); Reveron Ch. 9 (pp. 139–158)
The Role of International Institutions
 Topics: UN, NATO, EU, OSCE, and confidence-building measures
 Readings: Reveron Ch. 10 (pp. 159–172); Ch 13 (pp.207-224); Tikk et al., pp. 91–102
Cyber Norms, Sovereignty, and Global Governance
 Topics: Norm development, sovereignty in cyberspace, global cooperation
 Readings: Reveron Ch. 13 (pp. 207–224); Valeriano et al., Conclusion (pp. 137–145)
Diplomacy in the Age of Cyber Conflict
 Topics: Cyber diplomacy, negotiations, sanctions, and cyber norms
 Readings: Tikk et al., pp. 101–104; Reveron Conclusion (pp. 225–230)

COURSEWORK QUESTIONS
1. Prepare a scholarly book review of Cyber Strategy: The Evolving Character of Power and
Coercion by Brandon Valeriano, Benjamin Jensen, and Ryan C. Maness. Your review
should critically assess the main arguments, theoretical framework and empirical findings
presented by the authors. Discuss how the book contributes to our understanding of
cyber power and state behavior in international politics. Reflect on its significance for
security studies. (Max 6 pages Deadline 27th/09/25)
2. Write a comprehensive analytical summary of Cyberspace and Natonal Security:
Threats, Opportunities and Power in a Virtual World, edited by Derek S. Reveron. Your
summary should highlight key themes across the chapters, including cyber threats,
governance, and military doctrine. The summary should also prompt further reading by
identifying chapters particularly relevant to national security and diplomatic strategy in
the cyber domain. (Max 4 pages Deadline 30th/10/25)
NOTE: Write your book Number on the front page of your coursework before submission

You might also like