Skip down to main content

Subversive Technologies

Key Information

Course details
MSc Option course, Hilary Term
Assessment
Coursework submission
Reading list
View now
Tutor
Professor Joss Wright

About

The internet has created a new landscape for the communication and collaborative creation of information, and has caused a broad centralization of the global communications infrastructure. As a result, the technologies comprising the network have come to represent a significant means for control over the creation, access, and dissemination of large volumes of information.

Information and the means by which it is communicated and controlled, are now key concerns. Computer networks and the technologies on which they are built have evolved beyond their original scope and purpose. Issues such as privacy and information security have arisen that were often not considered in the original design of core protocols, resulting in an ongoing struggle to ensure that the fundamentally flawed infrastructure can meet the requirements placed on it in its role as a global information network.

Through both its flaws and its intended functionality the internet has produced an ecosystem of cultures, institutions, and technologies that aim to exert, resist, and circumvent control over information. This course aims to provide students with an understanding of technologies that provide control over information flows and action on the internet, and those that resist or subvert that control. To fully understand these technologies the course considers the cultures that created and surround them, how various new technologies interact with traditional institutions and structures, and how these are exploited by both states and individuals.

Outcomes

On completion of this course students will have an understanding of the technologies that underpin secured communications on the internet, and the development, aims, applications, and limitations of these technologies. Students will learn the advantages of new forms of communication technologies and the ongoing threats that they raise with respect to existing structures and institutions. Crucially, students will gain insight into the feasibility of technologies for controlling information and online action, and the effectiveness and consequences of social, technical, legal, and political means to influence their use.

 

Privacy Overview
Oxford Internet Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies
  • moove_gdrp_popup -  a cookie that saves your preferences for cookie settings. Without this cookie, the screen offering you cookie options will appear on every page you visit.

This cookie remains on your computer for 365 days, but you can adjust your preferences at any time by clicking on the "Cookie settings" link in the website footer.

Please note that if you visit the Oxford University website, any cookies you accept there will appear on our site here too, this being a subdomain. To control them, you must change your cookie preferences on the main University website.

Google Analytics

This website uses Google Tags and Google Analytics to collect anonymised information such as the number of visitors to the site, and the most popular pages. Keeping these cookies enabled helps the OII improve our website.

Enabling this option will allow cookies from:

  • Google Analytics - tracking visits to the ox.ac.uk and oii.ox.ac.uk domains

These cookies will remain on your website for 365 days, but you can edit your cookie preferences at any time via the "Cookie Settings" button in the website footer.