Lecturer(s)
|
-
Bureš Pavel, JUDr. Ph.D.
-
Gábriš Tomáš, prof. JUDr. Ph.D., LL.M.
-
Kerikmäe Tanel, prof. Ing. Ph.D., LL.M.
|
Course content
|
1. Digital sovereignty, techno-spaces, techno-lands (sharing the same technology); platforms and service providers as agents of state sovereignty. 2. E-government and e-administration - Technological control and surveillance - towards a police state?; Artificial intelligence in administrative management? 3. Digital citizenship - e-democracy, e-elections, e-campaigning, hoaxes. 4. A new generation of rights and freedoms - human dignity, the right to be forgotten; the right to online anonymity; freedom of expression on the internet, privacy and data protection, the right to information, internet censorship, the limits of freedom of expression on the internet - the problem of hate speech. 5. Cyber ethics; technological neutrality, digital discrimination; personal data as the new currency 6. Automated decision making - algorithmic judges; predicting decisions using AI, the right to a fair trial and the use of AI; Digital or AI lawyers - argumentation tools and sources of argumentation.
|
Learning activities and teaching methods
|
Monologic Lecture(Interpretation, Training)
|
Learning outcomes
|
The compulsory course Legal Theory of IT 2, taught in English, places digital technologies in the context of a theory of the state that is a generalization of the challenges posed by modern technologies to the state and society. The main headings in relation to the theoretical problems of society and the state in cyberspace are: 1. Digital sovereignty, techno-spaces, techno-lands (sharing the same technology); platforms and service providers as agents of state sovereignty. 2. E-government and e-administration - Technological control and surveillance - towards a police state?; Artificial intelligence in administrative management? 3. Digital citizenship - e-democracy, e-elections, e-campaigning, hoaxes. 4. A new generation of rights and freedoms - human dignity, the right to be forgotten; the right to online anonymity; freedom of expression on the internet, privacy and data protection, the right to information, internet censorship, the limits of freedom of expression on the internet - the problem of hate speech. 5. Cyber ethics; technological neutrality, digital discrimination; personal data as the new currency 6. Automated decision making - algorithmic judges; predicting decisions using AI, the right to a fair trial and the use of AI; Digital or AI lawyers - argumentation tools and sources of argumentation. By completing the course, students will gain an understanding of general issues in the theory of the state that are facing re-evaluation in light of developments in modern technology. By completing the course, students should gain a basic understanding of the changes that the state and society and their regulation have undergone in recent decades. This course is thus intended to establish a broad foundation for the completion of the modules of the degree. In the course of the course, students work with a selection of theoretical articles, learning to search for relevant information in relation to specific digital innovations and their relevance to state theory.
By completing the course, students will gain knowledge of general issues in the theory of the state that are facing reassessment in light of developments in modern technology. By completing the course, students should acquire a basic understanding of the changes that the state and society and their regulations have undergone in recent decades. This course is thus intended to establish a broad foundation for the completion of the modules of the degree. In the course of the course, students work with a selection of theoretical articles, learning to search for relevant information in relation to specific digital innovations and their relevance to state theory.
|
Prerequisites
|
Completion of this course is contingent upon completion of Legal Theory of Information Technology 1
MEP/TLTT1
|
Assessment methods and criteria
|
Student performance
A full-time student is required to attend 80% of the course lectures. A combined form student is required to attend at least 30% of the lectures and one tutorial with the lecturer.
|
Recommended literature
|
-
BELLIA, L. P., BERMAN, S. B.; FRISCHMANN, M. B., POST, D. G. (2018). Cyberlaw: Problems of Policy and Jurisprudence in the Information Age (American Casebook Series) (5th edition).. West Academic Publishing.
-
BLANCO DE MORAIS, C., FERREIRA MENDES, G., VESTING, T. (2022). The Rule of Law in Cyberspace.. Springer.
-
GRABOWSKI, M., ROBINSON, P., E. (2021). Cyber Law and Ethics: Regulation of the Connected World. Routledge.
-
MURRAY, A. (2016). Information Technology Law. Oxford University Press.
-
REED, C., MURRAY, A. (2018). Rethinking the Jurisprudence of Cyberspace. Edward Elgar Publishing.
-
VESTING, T. (2018). Legal Theory and the Media of Law. Edward Elgar Publishing.
-
WATT, E. (2021). State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law.. Edward Elgar Publishing.
-
WILSON, A. (2014). Jurisprudence of Cyber Law. Koros Press Ltd.
|