Courses

Education plays a central role in the security of systems beyond simply making users aware of risks and good practices. IPRI is working to build a pipeline of students with training in both the technical underpinnings of Internet technology and experience in the public policy environment. With this background, these students can enter academic, commercial, government, and civil society leadership positions involving Internet policy.

Current Course: Foundations of Information Policy
MIT Course Number: 6.805

Current Course: Foundations of Information Policy

Students in this class will discuss the intersection between law, policy, and technology and their relationship to the changing controversies over the control of the Internet.

More info

Summer 2017

Foundations of Internet Policy: a comparative perspective (one week course in China)

This course was jointly taught with Shanghai Jiao Tong University in Shanghai, China – including students from both the School of Electronic Information and Electrical Engineering and KoGuan School of Law. ┬áThe course covered legal approaches in U.S./China, privacy policy compliance, IoT security policy, intellectual property, Economic development, innovation and inclusion, and a Moot court on data leakage case in China.

Spring 2017

6.S978 – Privacy Legislation in Practice: Law and Technology

This course will be taught jointly by faculty from MIT and Georgetown University Law School and classes will meet via videoconference. The aim of the course is to have law students and engineering students jointly explore in-depth current issues in privacy policy and to propose policy solutions in the form of legislation that could be adopted by state governments. The course will pair law students at Georgetown Law with engineering students at MIT to form interdisciplinary teams, each consisting of two law students and two MIT students. Each team will be assigned a specific question of public policy, and over the course of the semester the team will be responsible for preparing a detailed legal assessment of the policy question, the technological frameworks and challenges associated with the policy question, and formulating policy and technological recommendations to address the question in the form of draft state legislation.

Fall 2016

6.805/STS085 – Foundations of Information Policy

Consider the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. Our goal is for participants to develop the technical, legal and rhetorical skills to analyze and participate in the evolution of the global public policy environments that govern human behavior on the Internet.

17.310/17.309/ESD103/STS82 – Science Technology & Public Policy

This unit provides a survey of justifications for and critiques of public policies. The justifications include classic microeconomic defenses of the role of government in mitigating economic market failure (listed below) and philosophical arguments on equity, justice and individual rights. These justifications are contrasted with critiques of government, including work on representational bias, influence costs and regulatory capture, organizational and bureaucratic politics, and regulatory rigidity.

Spring 2016

6.S898 – Cybersecurity Policy

Introduces concepts and issues in cybersecurity policy and how to design and analyze potential solutions. Covers factors affecting cybersecurity policy, including but not limited to technology design, government policy and regulation, global Internet governance, private sector actors, and non-governmental organizations, and their interaction. Topics include cybersecurity in national security, risk management, intellectual property theft, crime, Internet governance, and censorship and control from US and international perspectives.

6.S978 – Privacy Legislation in Practice: Law and Technology

This course will be taught jointly by faculty from MIT and Georgetown University Law School and classes will meet via videoconference. The aim of the course is to have law students and engineering students jointly explore in-depth current issues in privacy policy and to propose policy solutions in the form of legislation that could be adopted by state governments. The course will pair law students at Georgetown Law with engineering students at MIT to form interdisciplinary teams, each consisting of two law students and two MIT students. Each team will be assigned a specific question of public policy, and over the course of the semester the team will be responsible for preparing a detailed legal assessment of the policy question, the technological frameworks and challenges associated with the policy question, and formulating policy and technological recommendations to address the question in the form of draft state legislation.

Fall 2015

6.805/STS085 – Foundations of Information Policy

Consider the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. Our goal is for participants to develop the technical, legal and rhetorical skills to analyze and participate in the evolution of the global public policy environments that govern human behavior on the Internet.

17.310/17.309/ESD103/STS82 – Science Technology & Public Policy

This unit provides a survey of justifications for and critiques of public policies. The justifications include classic microeconomic defenses of the role of government in mitigating economic market failure (listed below) and philosophical arguments on equity, justice and individual rights. These justifications are contrasted with critiques of government, including work on representational bias, influence costs and regulatory capture, organizational and bureaucratic politics, and regulatory rigidity.

17.446/17.445 – International Relations Theory in the Cyber Age

Examines cyber dynamics and processes in international relations from different theoretical perspectives. Considers alternative theoretical and empirical frameworks consistent with characteristic features of cyberspace and emergent transformations at all levels of international interaction. Theories examined include realism and neorealism, institutionalism and liberalism, constructivism, and systems theory and lateral pressure. Highlights relevant features and proposes customized international relations theory for the cyber age. Students taking the graduate version are expected to pursue the subject in greater depth through reading and individual research.

 

Spring 2015

6.S978 – Privacy Legislation in Practice: Law and Technology

 

2013

6.962 – Privacy: Modern and post-modern privacy models for the Information Age: Graduate Directed Reading Seminar

Privacy: Modern and post-modern privacy models for the Information Age: This seminar will explore the sociological, technical and legal background of modern information privacy. Through leading primary sources in modern privacy theory, we will examine how those privacy models have worked to date. With this understanding of modern privacy, we will ask whether current ideas about privacy provide the necessary guidance to address privacy questions posed by rapidly expanding information age technologies. The seminar will read roughly one book-length work per week (or equivalent) and students will write several seminar papers.