Cyberdiplomacy Course

Open
Furthering the peaceful use of ICTs

Few technologies have been as powerful as information and communications technologies in reshaping economies, societies and international relations. Cyberspace touches every aspect of our lives. The benefits are enormous, but they do not come without risk. The global ICT environment is facing a dramatic increase in the malicious use of ICTs by State and non-State actors. The misuse of ICTs poses a risk for all States and may harm international peace and security.

The issue of information security has been on the agenda of the United Nations since 1998, when a draft resolution on the subject was introduced at the First Committee of the UN General Assembly. Since 2004, five Groups of Governmental Experts (GGE) have continued to study the threats posed by the use of ICTs in the context of international security and how these threats should be addressed. Three of these Groups have agreed on substantive reports with conclusions and recommendations that have been welcomed by all UN Member States.

This course aims enhance the understanding, particularly of the 2013 and 2015 GGE reports by addressing the five pillars of the GGE reports: existing and emerging threats; how international law applies to the use of ICTs; norms, rules and principles for the responsible behaviour of States; confidence-building measures; and international cooperation and assistance in ICT security and capacity-building.

Together, these pillars form an important framework to further the peaceful use of ICTs. The course therefore unpacks these pillars by explaining the key concepts, providing examples and interviews with relevant experts and offering interactive exercises to apply what has been learned. After having completed the course, the participant will be familiar with the assessments and recommendations at the United Nations to promote an open, secure, stable, accessible and peaceful ICT environment.

Audience:

The Cyberdiplomacy course features animated audio-visual learning methods. These are complemented by regular interactive elements, including quiz questions, exercises and other elements that encourage the participant to apply their newly acquired knowledge. Interviews by experts provide different perspectives. Every module ends with a recap. Additional resources offered throughout the course are compiled for the user’s reference and further studying.

Components and Methodology:

Length of a session: 0.5 – 1 hour
Number of sessions: 7
Total length of the computer-based individual learning course: 3.5

The course content:
  1. Introduction
  2. Existing and emerging threats
  3. International law and ICTs
  4. Norms, rules and principles
  5. Confidence building-measures
  6. International cooperation and assistance
  7. Finale

The course is available in English and is held in the Disarmament Education Dashboard, thus participants need a computer or mobile device, with audio and reliable internet connection. No special software is required.

Certificate:

The participant will pass by completing the online training course. Upon completion the participant will be awarded a certificate of completion.