Overview

To view overview information, please select an offering from the drop-down menu above.

Academic contacts

To view unit coordinator information, please select an offering from the drop-down menu above.

Offerings

MURDOCH-S2-FACE2FACE-2025-ONGOING
MURDOCH-S2-ONLINEFLEX-2025-ONGOING

Other learning activities

To view other learning activity information, please select an offering from the drop-down menu above.

Learning activities

To view learning activity information, please select an offering from the drop-down menu above.

Learning outcomes

1.

Understand and explain technology use in different national, regional and international security contexts.  

2.

Identify key concepts in security studies and their relevance to tech applications in different security contexts.  

3.

Evaluate the strengths and shortcomings of policy and governance of technology in security. 

4.

Synthesise evidence to communicate arguments in relation to technology’s role in security across different formats. 

Assessments

To view assessment information, please select an offering from the drop-down menu above.

Additional information

Unit content:

Part I: Sovereignty and technology  

  • Introduction 
  • Technical solutions to intelligence and certainty 
  • Sovereignty, automation and responsibility 
  • Cybersecurity and sovereignty  

Part II: Dilemmas for dual use technology 

  • Hackers, leakers and policymakers: Politics of surveillance technology 
  • Artificial intelligence  
  • Nuclear energy and technology  
  • Autonomous technology: drones and robots  
  • Augmented reality: Games and simulations  

Part III: Global norms and governance  

  • Governing surveillance 
  • Governing AI   
  • Reflections: Why should we think about the past, present and future of technology in security?