Overview
To view overview information, please select an offering from the drop-down menu above.
Academic contacts
To view unit coordinator information, please select an offering from the drop-down menu above.
Offerings
MURDOCH-S2-FACE2FACE-2025-ONGOING
MURDOCH-S2-ONLINEFLEX-2025-ONGOING
Other learning activities
To view other learning activity information, please select an offering from the drop-down menu above.
Learning activities
To view learning activity information, please select an offering from the drop-down menu above.
Learning outcomes
1.
Understand and explain technology use in different national, regional and international security contexts.
2.
Identify key concepts in security studies and their relevance to tech applications in different security contexts.
3.
Evaluate the strengths and shortcomings of policy and governance of technology in security.
4.
Synthesise evidence to communicate arguments in relation to technology’s role in security across different formats.
Assessments
To view assessment information, please select an offering from the drop-down menu above.
Additional information
Unit content:
Part I: Sovereignty and technology
- Introduction
- Technical solutions to intelligence and certainty
- Sovereignty, automation and responsibility
- Cybersecurity and sovereignty
Part II: Dilemmas for dual use technology
- Hackers, leakers and policymakers: Politics of surveillance technology
- Artificial intelligence
- Nuclear energy and technology
- Autonomous technology: drones and robots
- Augmented reality: Games and simulations
Part III: Global norms and governance
- Governing surveillance
- Governing AI
- Reflections: Why should we think about the past, present and future of technology in security?