B0141 - CYBERSECURITY AND INTERNATIONAL BUSINESS

Academic Year 2025/2026

  • Docente: Luigi Martino
  • Credits: 8
  • SSD: SPS/04
  • Language: English
  • Teaching Mode: Traditional lectures
  • Campus: Bologna
  • Corso: Second cycle degree programme (LM) in International Relations (cod. 9084)

Learning outcomes

The course will allow students to enhance their knowledge on the current dynamics of the intersection between cyberspace and international business. In particular, students will be able to: 1) Understand the fundamentals of cyberspace, cyber security and their dynamics in the field of international business; 2) Apply a multidisciplinary approach combining social science with computer science topics; 3) Achieve a specific confidence with the ability to use methods to conduct researches and analysis in the field of Cybersecurity and International Business; 4) Understand the main cyber related threats and risks against the business continuity 5) Analyze the implications for State, non-state and private actors in the cyber arena; 6) Study how cyberspace could jeopardize the international security and stability; 7) Apply the concept of public-private partnership in the field of cyber security and international business.

Course contents

The classes for this course will be held in a hybrid mode: at the Bologna campus and online.

Understanding the dynamics produced by the cyber domain in the international politics is essential in today's interdependent and interconnected global world. Considering the impacts on different levels of cyberspace in geopolitical, social or economic contexts, the course combines theoretical and practical analysis of the complex interplay between political power and economic forces on a global scale. Emphasizing the role of political power in shaping military or economic outcomes, looking at the influence of different actors—states, multinational corporations, international organizations, and civil society—in governing the global economy, the course aims to provide students with the knowledge, skills and abilities to understand cyberspace from a political, economic and strategic point of view.

In light of that, this course is based on a seminar approach, where students are required to read essays (research papers, policies, book chapters, etc.) in advance to ensure active participation. In this way students will critically assess oligopoly or monopoly market conglomerates, policy frameworks, and technological standards, while evaluating not only the technicalities of cyber security, but particularly the political roles played by private actors, and the actions implemented by states in supporting national technological champions.

Students will apply a theoretical framework of International Relations (IR) theories to assess their validity and relevance (why and how) cyberspace. They will also explore, with the lens of this theoretical frameworl how both state and non-state actors are influencing the global governance mechanism and shape cyber dynamics to their advantage.

In this context, relevant importance will be given to International Political Economy (IPE) with discussions on topics such as the “weaponization of interdependence” and the potential emergence of a “new global economic order” driven by technological competition. Empirical case studies of cyber attacks and cyber securitity normative and political initiatives will be assessed, as well as comparative analysis on hybrid form of technological power – including those involving major, emerging and small powers – will be evaluated.

Lectures’ Structure:

§ Lecture 1: Introduction to the Course and “How to write a scientific research paper?”

§ Lectures 2 and 3: Conceptualizations: Basics and fundamentals of cyberspace and relevant glossary.

§ Lecture 4: Core theories in IR and their validity in the cyber age: Major Theories of Power.

§ Lecture 5: Key institutions and key players at a national and international level. Major initiatives to reduce the negative effects of cyber(in)security (International Fora, Standards and regulations).

§ Lectures 6: Cyber threats against international business; asymmetry and hybrid warfare; case studies of attacks and analysis of risks and opportunities.

§ Lectures 7 and 8: National Tecno-Champions, Concept of public-private partnerships in cyberspace, the evolution of private institutions to international actors, notion of a “technopolar world” in the lens of IPE.

§ Lecture 9: “emerging, disruptive” technologies (AI, quantum computing), effects on the framework established during the lessons.

§ Lectures 10 and 11: given by Guest Lecturers from institutions relevant to the course, giving practical experience (e.g. Italian National Cybersecurity Agency, and other private sector representatives).

§ Lecture 12: in-class presentations from the students.

§ Lecture 13: course wrap-up and future scenarios of a “Codified” world.

Learning Outcomes

Upon successful completion of this course, students will be able to:

- Comprehend and apply key concepts and terminology from the cyber domain in the context of international politics, international political economy.

- Recognize and analyze the influence of cyberspace across political, economic, strategic, and social dimensions in international affairs.

- Evaluate impacts and implications of emerging and disruptive technologies on international business using a multidisciplinary approach.

- Apply IR theories to assess national cyber security policies, technological standards and regulatory frameworks applied in the technology field.

These outcomes equip students with practical knowledge and skills directly applicable to real-world scenarios, including policy development, corporate resilience building, and navigating multilateral and multistakeholder initiatives in an increasingly interconnected and digitalized society.

 

Readings/Bibliography

Mandatory readings:

Please note that only few chapters will be selected from the books. Other additional readings will be distributed during the course.

  • Van Puyvelde, D., & Brantly, A. F. (2019). Cybersecurity: Politics, Governance and Conflict in Cyberspace. Polity Press.
  • Taylor, M. Z. (2016). The politics of innovation: Why some countries are better than others at science and technology. Oxford University Press.
  • Martino, L. (2025). Il mondo codificato. Il Mulino.
  •                  (2018). La quinta dimensione della conflittualità. L’ascesa del cyberspazio e i suoi effetti sulla politica internazionale. Politica & Società, 1, 61–76. https://doi.org/10.4476/89790
  • Bjola, C., & Kornprobst, M. (2023). Digital International Relations: Technology, Agency and Order (1st edn). Routledge. https://doi.org/10.4324/9781003437963
  • Bremmer I., “The Technopolar Moment: How Digital Powers Will Reshape the Global Order” Foreign Affairs, Volume 100 • Number 6 November/December 2021
  • Andrea Gilli and Mauro Gilli, “Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage,” International Security, Vol. 43, No. 3 (Winter 2018/19), pp. 141–189, https://doi.org/10.1162/ISEC_a_00337.
  • The World Economic Forum's Global Cybersecurity Outlook 2025 URL: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/

 

Recommended:

  • Raj M. S. and Kiran S., “How to Cyberproof the Private Sector: The U.S. Can Harness the Market to Tackle the Cybersecurity Challenge” Foreign Affairs, January 13 2022https://www.foreignaffairs.com/articles/north-america/2022-01-13/how-cyberproof-private-sector
  • Bremmer I., “The Technopolar Moment: How Digital Powers Will Reshape the Global Order” Foreign Affairs, Volume 100 • Number 6 November/December 2021 https://www.foreignaffairs.com/articles/world/2021-10-19/ian-bremmer-big-tech-global-order
  • Kleinwächter W. "Cybersecurity, Internet Governance, and the Multistakeholder Approach. The Role of Non-State Actors in Internet Policy Making" Cyberstability Paper Series December 2021, https://hcss.nl/wp-content/uploads/2021/12/Kleinwaechter.pdf
 

Teaching methods

'Seminars and lectures will be held in presence or online for students of the Bologna campus and on line (on MS Teams). For students of the Forlì campus the course will be held totally online.'

 

The course combines lecture-based instruction with seminar-style discussions, requiring an active student engagement. Students are expected to complete the assigned readings prior to each class and be prepared to contribute thoughtfully to class discussions.

 In-class group presentations will be also required toward the end of the course.

Attendance is mandatory, as active participation is an integral component of the final grade. A limited number of absences may be permitted for justified and documented reasons.

Assessment methods

Assessment Methods and Grading Criteria

The final grade for attending student will be based on the following criteria:

· 30% – In-class participation and discussion

· 20% – Group presentation

· 30% – Research paper (2,500–3,500 words)

· 20% – Final oral examination

Assessment Methods:

In-Class Participation (30%)

As this is a seminar-based course, active participation is both required and evaluated. Students are expected to read the assigned materials in advance and come to class ready to engage in thoughtful, critical discussion. Regular contributions to seminar discussions will form the basis of this component of the grade.

Group Presentation (20%)

The final part of the course is dedicated to group presentations, where each group will select a topic distinct from their individual research paper. Presentations must combine theoretical frameworks with empirical analysis. Each group will also be assessed by two discussants from another group, rotating roles throughout the session.

The requirements for the presentation are as follows:

A brief written summary (200–300 words) and the presentation slides (e.g., PowerPoint, or similar) must be submitted at least two days before the presentation date to both the professor and the assigned discussant group.

The presentation must take a critical perspective, clearly articulating arguments and avoiding descriptive overviews.

Each presentation should include a maximum of 5 slides and last no longer than 10 minutes. The content will be assessed based on clarity, analytical depth, engagement with theoretical and empirical material, and the ability to present ideas concisely and critically.

Research Paper (30%)

The research paper is the most substantial component of the course and represents the culmination of students' analytical and theoretical engagement. Students are free to choose a topic of interest, provided it receives prior approval from the professor. The topic should relate to the themes of the course, and demonstrate critical thinking rather than descriptive summary.

Key Requirements for the research paper:

Length: 2,500–3,500 words (excluding bibliography)

Submission: At least one week before the oral exam

Style: Academic and analytical — policy recommendations and descriptive approaches are not appropriate. The paper must reflect critical engagement, not just a summary of existing knowledge.

Formatting:

-Introduction: Present the topic, main argument, and structure of the paper

-Body: Develop the argument, analysis, and evidence-based discussion

-Conclusion: Summarize findings and reflect critically on the implications

-Citation: Harvard referencing style is recommended

-No abstract is required

Papers that are purely descriptive or lacking a critical perspective will be considered insufficient and receive a failing grade.

Oral Examination (20%)

All students are required to pass a final oral examination. The exam will include:

a) A discussion of the student's research paper

b) Questions related to key course themes and assigned readings

The oral exam will assess students' ability to articulate and defend their arguments, demonstrate conceptual understanding, and engage with course material at a high level.

 

Non-Attending Students

Students who are unable to attend class sessions must contact the Professor by email to arrange an alternative coursework plan and assessment format.

 

Ethical behavior

Students are obliged to follow the Alma Mather University of Bologna ethics code. Plagiarism will be assesed with dedicated software, and if founded it invalidates the exam as “unethical”. This behaviour will be shared with university authorities.

 Grading policy

The range of grading is between 18-30

Insufficient: knowledge of the topic is not even approximate or not correct.

18-21: elementary knowledge of the topic, and/or not always correct, partial ability to argue and elaborate

22-25: satisfactory knowledge of the subject, ability to argue and elaborate fairly solid

26-29: good or very good knowledge of the subject, good or very good ability to argue and elaborate

30: precise knowledge of the subject, ability to argue and elaborate very good

30 cum laude: precise knowledge of subject matter, very good argumentation and elaboration skills, relevant personal review of knowledge.

Teaching tools

Open Source Labs of Cyber Threat Intelligence

Office hours

See the website of Luigi Martino

SDGs

Quality education Decent work and economic growth Industry, innovation and infrastructure Partnerships for the goals

This teaching activity contributes to the achievement of the Sustainable Development Goals of the UN 2030 Agenda.