2023/2024 KAN-CDIBO1203U Cyber Security, Regulation, and Policy in Digital Business
English Title | |
Cyber Security, Regulation, and Policy in Digital Business |
Course information |
|
Language | English |
Course ECTS | 7.5 ECTS |
Type | Mandatory |
Level | Full Degree Master |
Duration | One Semester |
Start time of the course | Autumn, Spring |
Timetable | Course schedule will be posted at calendar.cbs.dk |
Study board |
Master of Science (MSc) in Business Administration and Digital
Business
|
Course coordinator | |
|
|
Main academic disciplines | |
|
|
Teaching methods | |
|
|
Last updated on 18-01-2024 |
Relevant links |
Learning objectives | ||||||||||||||||||||||||
At the end of the semester, students should be
able to:
|
||||||||||||||||||||||||
Examination | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
Course content, structure and pedagogical approach | ||||||||||||||||||||||||
The time when startups could disrupt existing structures with any technological vision they managed to obtain funding for, and when Big Tech companies could develop their global platforms as they pleased, is well and truly over.
Today’s business leaders need to understand the emergent security, regulatory and policy environments to guide their companies to prosperity in the middle of rapid change.This course will equip students with the knowledge and tools to analyze and confront the most pertinent questions in information- and cyber security and the most important political debates about the regulation of tech companies, from gatekeeper rules for the largest platforms to software security requirements affecting the smallest producers.
These range from questions about the management of data privacy, access to communications platforms, to the monitoring of content spreading there to the outright intrusion of these platforms to shape election campaigns; from the wholesale transfer of data into the cloud and how it can be kept secure and private there, to the regulation of cryptocurrencies. We will take a broad view to understand the ways in which the challenge of regulating complex innovations such as AI and reining in the power of huge global tech companies is pushing the existing political system to its limits.
The second part of the course will introduce students to the concepts and tools necessary to understand and assess the cybersecurity risks faced by companies, as well as to the security controls and procedures available to manage this risk. Students will learn how to craft and write company cybersecurity policies, incident response plans and other forms of documentation related to business cyber security and risk management.
In this way, the course provides the students with
practice-oriented insights while offering reflections on current
and future developments in the context of digital business cyber
security, regulation, and policy, and the ways in which they will
affect tech companies from the smallest to the largest.
|
||||||||||||||||||||||||
Description of the teaching methods | ||||||||||||||||||||||||
The course will use pre-recorded online lectures
to introduce the subject matter and classroom discussions to
explore it in more depth.
The seminars will rely on active learning methods such as simulations and role-play to facilitate a good discussion. |
||||||||||||||||||||||||
Feedback during the teaching period | ||||||||||||||||||||||||
After the written assignment, the teacher will provide collective feedback on issues students should bear in mind or work on until the exam. | ||||||||||||||||||||||||
Student workload | ||||||||||||||||||||||||
|
||||||||||||||||||||||||
Expected literature | ||||||||||||||||||||||||
The literature will be shared via Canvas before the semester starts. Due to the fast-changing nature of the field, additions and changes may be made throughout the course – these will always be communicated via Canvas. Students are advised to check the syllabus on Canvas before they buy any material.
Sample literature: Martin Moore, Damian Tambini (eds): Regulating Big Tech: Policy Responses to Digital Dominance (OUP 2021)
Rothrock, Kaplan et al, 'The Board's Role in Managing Cybersecurity Risks', MIT Sloan Management Review, Vol. 59 Issue 2 (Winter 2018), p. 12-15. |