DIGITAL IDENTITY - PRIVACY - CYBERSECURITY

Course objectives

The course aims to provide the theoretical and methodological tools to analyze the transformation of social behavior on the net through the evolution of the concept of digital identity, online communication and the phenomena derived from a hyper-connected society; A) Knowledge and understanding - the course will provide the student with basic knowledge of the technical, philosophical and psychological themes and concepts on which the evolution of the digital self is based thanks to the support of reference texts, exercises and debates that will be held in class in order to develop an understanding and analysis of the network company and of the problems relating to the management of online security, data privacy and personal safety; B) Ability to apply knowledge and understanding - the course will offer the student the opportunity to apply the acquired knowledge in a reflective way through exercises and practical tests of secure “online identity management”. During these learning opportunities, the argumentative and narrative skills of the technical and social innovations typical of the teaching sector will be developed; C) Autonomy of judgment - students will be able to orient themselves among the reference theories to analyze and interpret the data useful for developing autonomous knowledge paths aimed at acquiring independence of analysis and critical Thinking with respect to the changing legal and technological scenario; D) Communication skills - the exercises and debates that will be held during the lessons will give students the opportunity to acquire technical and communication skills aimed at creating illustrative media products; E) Learning skills - students will have the opportunity to develop the knowledge and skills necessary to undertake advanced study paths.

Channel 1
ANDREA MONTI Lecturers' profile

Program - Frequency - Exams

Course program
INTRODUCTION – COMMUNICATION, TECHNOLOGY, STANDARDISATION I – Metaphors, technoscientific analogies and communication 1 – The role of metaphors in science and technology communication. The problem of loss of meaning linked to the abandonment of technical rigour. Rem tene and Occam's razor as essential tools 2 – Metaphors, analogies and cultural syncretism in technoscientific communication: cyberspace, borderless Internet, Information Superhighway, cybernetics, Cyberwarfare, metaverse, avatars, AI, digital natives II – The impact of geo-industrial strategies on information technologies, social behaviour and standardisation 3 – Techno-neo-medievalism and multipolarity of powers: the role of industry in determining social behaviour and in the appropriation/commodification of rights 4 – From techno-libertarian utopias to techno-regulation. The transition from the socio-psychological to the regulatory dimension. Technological anarchism, politics and standardisation 5 – The ethics of technology as a tool of government: nudging, überrights, and technocratic paternalism PART ONE – Identity, identification and information technologies 6 – Identity and identification between law and social demands. Pseudonymity and anonymity as social necessities and tools for breaking gender identity, identification as a tool for ensuring state security and transaction certainty 7 – The misunderstanding of the “subjectivity” of artificial intelligence and the removal of individual responsibility 8 – The role of correspondence in the dematerialisation of individual interaction 9 – The impact of information technologies on identity and identification. The construction of the right to anonymity between the need for social control, industrial models and respect for rights. The role of identification in the development of the access and platform market. The de facto repeal of the limit for acquiring the capacity to act 10 - Identification as a battleground where opposing visions of the relationship between the state and the citizen clash. Technologically mediated identification and the loss of the state's role. Technological lock-in and discriminatory consequences on public and private interaction. PART TWO – Privacy and personal data protection 11 – Secrecy, power and the individual. The role of secrecy in individual relationships, with the state and between states 12 – From confidentiality to the right to privacy 13 – Secrecy, confidentiality and privacy 14 – The evolution of the concept of privacy: from the right to be alone to the right to be forgotten and control over personal information 15 – The confusion between privacy and personal data protection. Cultural, economic and political impact 16 – Privacy as a fetish and the compression of fundamental rights to freedom of thought, research, press and information 17 – The impact of standardisation on the development of cryptography: SSL, VPN, DoH, Oblivious DoH, differential privacy 18 – The multifaceted and contradictory role of cryptography: a tool for social antagonism (“defence” against the state), protection of economic rights (DRM), transaction security (certificates and digital signatures), police investigations (computer forensics), commission of crimes (ransomware, confidentiality of communications, secrecy of information), economic destabilisation (cryptocurrencies and blockchain). Case studies: Zodiac Killer, Fritz Chip, Crypto AG, Wikileaks, ReVIL, Cloud/Client Side Scanning PART THREE – CYBERSECURITY 19 – The many faces of cybersecurity: national security, infrastructure protection, state defence, protection of the information assets of institutions, companies and individuals, guaranteeing the functioning of products and services that are potentially dangerous to individuals. System security or personal safety? 20 – The Colossus of Rhodes. The role of underground culture and the technology industry in building a vulnerable society. The evolution of the security industry and the role of techno-anarchism. Technological complexity and the instrumental management of planned obsolescence and its impact on security/safety. 21 – Approaches to security: security through obscurity vs full disclosure. 22 – From cybersecurity to cyberwarfare. Offensive exploitation of technological vulnerabilities and social models built by the digital economy. Blurring of the line between judicial investigations and military actions. Case studies: US Executive Order 13884/19 on the remote blocking of Adobe services in Venezuela, Encrochat and the secret défense nationale, 23– Profiling and disinformation: the dematerialisation of the “self”, the noumenisation of reality and the construction of consensus based on the construction of the phenomenon. Deep fakes and fake news. 24– The weaponisation of knowledge. Control over technological knowledge as a geopolitical lever.
Prerequisites
None. However it helps having a general knowledge of how technology of information works.
Books
Presentations will be used during the lessons and will then be made available to students. All the course materials are available on the course's classroom. This is the code: vln6ktnn
Frequency
Classroom attendance. Tuesday 18,00-20,00 - Wednesday 8,00-10,00.
Exam mode
The final exam consists of a multiple-choice test.
Bibliography
The following non-compulsory readings are also recommended: Wacks, Raymond Privacy. A Very Short Introduction Oxford University Press (ed. it. Privacy. Una sintetica introduzione Monti&Ambrosini) Monti, Andrea Cybercrime e responsabilità penale degli enti Giuffré-Francis Lefevbre Chiccarelli, Stefano – Monti, Andrea Spaghetti Hacker I ed. Apogeo, II ed. Monti&Ambrosini editori Monti, Andrea - Wacks, Raymond National Security in the New World Order, Routledge Monti, Andrea The Digital Rights Delusion Routledge Monti, Andrea Lost in the Shell, Routledge
Lesson mode
In-class lectures
  • Lesson code10600344
  • Academic year2025/2026
  • CourseMedia studies, digital communication and journalism
  • CurriculumMedia studies
  • Year2nd year
  • Semester1st semester
  • SSDSPS/08
  • CFU6