5 Structured visits to the heart of Israel cyber eco-system (such as INCD, Beersheba Cyberpark, TAU Cyberweek, Haifa's cyber research centers, etc.).
The seminar will focus on this interesting Israeli cyber security eco-system case study. It will start with the theoretical explanation of eco-systems in general and the Israeli strategy to form 3 eco-systems that together have been transformed into a one leading eco-system. It will then continue with 4 full days visits to the places where the Israeli cyber security ecosystems could be viewed and understood.
Examining whether and how the introduction of new forms of technologies change the links between citizens and governments, mediated via the media and elections, through challenging existing theories.
The course discusses what the international system is and how this system is affected by the emergence of the cyber domain. From this perspective, the course attempts to explore both how cyber technologies affect international relations, and whether and to what extent IR theories and paradigms are able to provide an account to these interactions. Toward these goals, in each class we consider a key theoretical research illuminating the international system or a specific aspect of it, as well as a research that implements that approach in the study of international relations in the cyber domain.
Human history witnessed technological revolutions in the past: Starting with the technology of Agricultural Revolution some 30,000 years ago, continuing with the Industrial Revolution some 200 years ago and up to the current Information Revolution. Like the former revolutions, the current one has a wide implication on almost every field of our life: Economy, fabric of Society, Security, Political systems etc. The course will describe those implications, and their relation to the dominant technology of our time: the digital computer.
In this course we will consider the different elements of Big Data and its political implications. Concepts such as big data, algorithms and AI have become popular during the past decade but the politics that surrounds them is still not clear enough. We will therefore examine various elements of big data and understand their political motives and implications. Throughout the course we will combine between theoretical works which explain the architecture of big data and algorithms and policy papers which show how governments use them.
The goals of this course are to provide the students understanding of Definitions and meanings of the cyber threat evolution. In addition, a broad understanding of the threat development from the 1990s to present, including a description and analysis of the implications of the threat to the future in the global economic sectors, social, commercial and commercial aspects, national aspects and critical infrastructures, including actual experience with analysis of ‘War Game’ events.
The course is divided to four parts: 1. Two sessions devoted to identifying the main characteristics of strategic thinking on national security; 2. Four sessions demonstrating the evolution of national security considerations in the second half of the 20th century before the new reality profoundly changed the strategic environment. This part will start with a detailed discussion of the revolutionary changes that make the new age; 3.It will focus on the technological instruments and the almost universal accessibility that have often profoundly changed important parts of the social, political, economic and military landscape; 4. Discussing the revolutionary impact of the computing and all-encompassing connectivity, its ever-escalating effects on the cultural, social, political, economic and military environment and the implications of this revolution to national security strategic thinking.
Basics of cyber technologies for non-technologists. The course main topics are: Overview of Cyber Security, Foundations of Cryptology, Hash functions, Basic crypto-techniques, Introduction to Communication Networks, Network Security, Architecture and protocols of the WWW.
The aim of the course is to introduce participants to "Cyberlaw" from a theoretical and practical perspective. "Cyberlaw", the law and policy in the field of information and communication technologies, is in constant development, it shapes and effects the way government, and private organizations innovate and deal with risks. In this course we will survey and analyze "Cyberlaw" from a domestic and international perspective.
The goal of this course is to revisit fundamental ideas in political science and examine how new forms of technology challenge them. By comparing classical texts in political science and contemporary discussions about the same subjects, we aim to understand how questions, which were raised by political scientists throughout history, are understood differently today. What is still deemed relevant and what has fundamentally changed? By paying close attention to actual case studies we will reflect on how real politics challenge political science literature. By the end of the course we shall try to chart a clearer trajectory for politics and society in the 21st century, leaning on the past but looking into the future.
The rapid development of sensors, huge databases, and artificial intelligence is transforming the global economy. New business models are created, balance of power is changing, opportunities & threats are created, and even money itself is changing. In this course, we will analyze the impact of big data on our economic future. Concepts such as creative destruction, knowledge versus data, network effect, dominant design, competence block, and information asymmetry will be reviewed.
The purposes of this course are to provide students with useful tools for engaging in empirical research in political science and to help students understand literature that uses a range of research methods. Students will learn how to think about theoretical problems in terms of empirical models – theory, hypothesis testing, data collection, presentation of research, writing research papers and a thesis. Finally, this class is intended to give students an opportunity to develop their thesis.