Search result: Catalogue data in Spring Semester 2019

Public Policy Bachelor Information
Bachelor Studies (Programme Regulations 2011)
4. Semester
Languages
Second Foreign Language
NumberTitleTypeECTSHoursLecturers
853-0403-00LFrench, Part I Restricted registration - show details
Only for Public Policy BA
W3 credits2GS. Schweizer
AbstractDuring the first semester the future professional officers acquire those second language skills which enable them to successfully perform their military activities. The focus is especially on instruction and leadership terminology as well as on the ability to describe their professional environment. Moreover, the students learn to exploit media information for further professional use.
ObjectiveThis two-semester French course should enable the German speaking participants to fulfil their function as professional officers also in the French language.
Content•Read, analyse and write military and civilian documents
•Listening comprehension using current radio or TV reports
•Practise speaking with group discussions and short presentations
•Systematic revision and extension of key grammar points
•Systematic acquisition of general and military vocabulary
6. Semester
Bachelor's Colloquium and Bachelor's Thesis
NumberTitleTypeECTSHoursLecturers
853-0654-00LBachelor's Thesis Restricted registration - show details O10 credits8DLecturers
AbstractThe Bachleor Thesis completes the Bachelor program and consists of a scientific project carried out independently under the tutorship of an ETH or MILAK lecturer in Public Policy.
ObjectiveThe elaboration of the Bachelor Thesis should further students' capacities to work independently, structured and scientifically.
Practical Training MILAK
NumberTitleTypeECTSHoursLecturers
853-0602-00LPractical Modules MILAK Restricted registration - show details
Only for Public Policy BA
O18 credits26Pexternal organisers
AbstractThe practical modules cover 9 weeks and are attended in the third study year. The contents are closely related to military sciences and complement the lectures.The practical modules are conducted by MILAK at the ETH Zürich.
ObjectiveThe practical modules provide to broaden and assimilate the knowledge in a practical way.
Elective Courses
NumberTitleTypeECTSHoursLecturers
651-3078-00LGeology of SwitzerlandW2 credits2VP. Brack
Abstract- Landscape Switzerland and its geological history
- Alps and Jura mountains: archives of an ocean history
- From plate-tectonics to mountain building
- Present-day landscape forming processes
Objective- Verständnis wichtiger erdwissenschaftlicher Informationsquellen sowie geologischer Prozesse mit Relevanz für die Interpretation des geologischen Untergrunds der Schweiz.
- Geschichte der in der Schweiz sichtbaren Gesteinsabfolgen von deren Bildung bis zum Anschnitt an der Erdoberfläche.
- Überblick zur geologisch-tektonischen Entwicklung der Alpen und des weiteren Umfelds der Schweiz.
- oberflächenbildende Prozesse und Landschaftsgeschichte.
ContentErdplatten - Alpine Gebirge; Geologie der Schweiz im Überblick; tektonische Grosseinheiten und deren Charakteristika; geologische Geschichte von Gesteinen in der Schweiz (Grundgebirge, Karbon/Perm, Trias, Jura, Kreide); Alpenbildung: Subduktion - Kollision - Deckenbildung;das nordalpine Vorlandbecken; Grabenbildungen im alpinen Umfeld; Hebung der Alpen und Jurafaltung; Eiszeiten und Landschaftsentwicklung
Lecture notesBeilagen (Moodle) zur Geologie der Schweiz
Prerequisites / NoticeVoraussetzung: 651-3001-00 Dynamische Erde I
851-0734-00LInformation Security Law
Particularly suitable for students of D-INFK, D-ITET
W2 credits2VU. Widmer
AbstractIntroduction to Information Security Law for non-legal students respectively prospective decision-makers in companies and public authorities who will have to deal with information security issues (CIOs, COOs, CEOs). The lectures will focus on the legal aspects of the security of ICT infrastructures, including networks (Internet), and of the transported and processed information.
ObjectiveThe objective is to understand the meaning and aims of information security and the legal framework, to become acquainted with legal instruments available to provide effective protection for infrastructures and sensitive legal assets and to present an analysis of possible legal loopholes and potential measures. No prior legal knowledge is required for those wishing to attend these lectures.
ContentThe lectures will deal with industry-specific as well as cross-sector specific themes involving both technology and law from the areas of data protection law, computer crimes, statutory duties of confidentiality, telecommunication surveillance (Internet), electronic signatures, liability etc.
Lecture notesThe lectures will be accompanied by powerpoint slide presentations, downloadable before the lectures begin, or available as hard copy at the lectures themselves.
LiteratureReferences to further literature sources will be given in the lectures.
851-0232-00LSocial Psychology of Effective TeamworkW2 credits2VR. Mutz
AbstractThe lecture covers the main topics of social interactions in groups as a basis for effective teamwork in organisations: group; group structure; group dynamics and performance; group analysis; examples of applications.
ObjectiveTeamwork is of growing importance in business and administration. The aim of this lecture / exercise is to provide a scientific understanding of social interactions in groups as a basis for effective teamwork in organisations.
ContentInhalte der Lehrveranstaltung sind:
- Gruppe: Definition und Typen
- Gruppenstruktur: Rollen und Führung
- Gruppenprozesse: Konformität und Konflikte in Gruppen
- Gruppenleistung: Leistungsvorteile von Gruppen
- Gruppenanalyse: Interaktionsprozessanalyse und Soziometrie
- Anwendungsbeispiele: Assessment-Center, teilautonome Gruppen
Lecture notesEs können Folien, die in der Vorlesung verwendet werden, im Anschluss an die Veranstaltung von einer Austauchplattform heruntergeladen werden.
LiteratureDie Literatur wird in Form eines Readers mit für die Themen der Vorlesung relevanten Textauszügen aus Fachbüchern angeboten.
Prerequisites / NoticeDie Übungen dienen dazu, einzelne Themenbereiche der Vorlesung an praktischen Beispielen exemplarisch zu vertiefen.
851-0588-00LIntroduction to Game Theory Information Restricted registration - show details
Does not take place this semester.
Number of participants limited to 400

Particularly suitable for students of D-INFK, D-MATH
W3 credits2VH. Nax, D. Helbing
AbstractThis course introduces the foundations of game theory with a focus on its basic mathematical principles. It treats models of social interaction, conflict and cooperation, the origin of cooperation, and concepts of strategic decision making behavior. Examples, applications, theory, and the contrast between theory and empirical results are particularly emphasized.
ObjectiveLearn the fundamentals, models, and logic of thinking about game theory. Learn basic mathematical principles. Apply formal game theory models to strategic interaction situations and critically assess game theory's capabilities through a wide array of applications and experimental results.
ContentGame theory provides a unified mathematical language to study interactions amongst different types of individuals (e.g. humans, firms, nations, animals, etc.). It is often used to analyze situations involving conflict and/or cooperation. The course introduces the basic concepts of both non-cooperative and cooperative game theory (players, strategies, coalitions, rules of games, utilities, etc.) and explains the most prominent game-theoretic solution concepts (Nash equilibrium, sub-game perfection, Core, Shapley Value, etc.). We will also discuss standard extensions (repeated games, incomplete information, evolutionary game theory, signal games, etc.).

In each part of the course, we focus on examples and on selected applications of the theory in different areas. These include analyses of cooperation, social interaction, of institutions and norms, social dilemmas and reciprocity as well as applications on strategic behavior in politics and between countries and companies, the impact of reciprocity, in the labor market, and some applications from biology. Game theory is also applied to control-theoretic problems of transport planning and computer science.

As we present theory and applications, we will also discuss how experimental and other empirical studies have shown that human behavior in the real world often does not meet the strict requirements of rationality from "standard theory", leading us to models of "behavioural" and "experimental" game theory.

By the end of the course, students should be able to apply game-theoretic in diverse areas of analysis including > controlling turbines in a wind park, > nations negotiating international agreements, > firms competing in markets, > humans sharing a common resource, etc.
Lecture notesSee literature below. In addition we will provide additional literature readings and publish the lecture slides directly after each lecture.
LiteratureK Binmore, Fun and games, a text on game theory, 1994, Great Source Education

SR Chakravarty, M Mitra and P Sarkar, A Course on Cooperative Game Theory, 2015, Cambridge University Press

A Diekmann, Spieltheorie: Einführung, Beispiele, Experimente, 2009, Rowolth

MJ Osborne, An Introduction to Game Theory, 2004, Oxford University Press New York

J Nash, Non-Cooperative Games, 1951, Annals of Mathematics

JW Weibull, Evolutionary game theory, 1997, MIT Press

HP Young, Strategic Learning and Its Limits, 2004, Oxford University Press
376-1666-00LTraining and Coaching II Restricted registration - show details
Number of participants limited to 30.

Can be attended independently of Training and Coaching I (376-1665-00).
W3 credits2GO. Buholzer
AbstractTrainer/Coach as personality and Advisor/ Tutor:
Strengths and weaknesses are judged/ graded on the basis of the personality analysis (Integro model) and are done so by outside as well as self- analysis.
Tools/ skills which can be utilised in Training and/ or Coaching are developed.
ObjectiveTo obtain a personal competency in training and coaching
To reflect and work on a personal profile of competency and elaborate on the formulation of aims
To reflect on your own personality as a trainer and to recognise your strengths and weaknesses
To widen the self-competency in relation to your trainer personality and self-guidance
To experience practical examples
To elaborate on your competencies in relation to subjects such as communication, motivation and guidance
To discuss a chosen subject area
ContentTheorie: Persönlichkeitsprofil - Modelle
Selbst- und Fremdeinschätzung
Typologie und Flexibilität
Kompetenzfelder
Praxis:
Führungsphilosophie, Führen und Coachen im Training (Einzelathlet und Team)
Der Trainer und Coach im Wettkampf
Fallbeispiele erarbeiten und planen
Umsetzung an ausgewählten Beispielen
Konkrete Umsetzung an ausgewählten Beispielen
Lecture notesDie Unterlagen werden auf der Homepage zugänglich gemacht. Im Unterricht wird ein Skript abgegeben.
Prerequisites / NoticeSemesterstart
Die Informationsveranstaltung findet zu Beginn des Semesters statt. Die genauen Daten (Zeit/Ort) werden per Mail zugestellt. Diese Veranstaltung ist obligatorisch.

Zeit/Ort
Der Unterricht findet im Normalunterricht und in Blockveranstaltungen statt.

Planung
Die Planungsunterlagen werden zu Semesterbeginn abgegebenen, sind provisorisch und können vom Dozenten geändert werden.

Kosten
Für die abgebene Literatur, die Unterlagen und die Analyse wird ein Kostenbeitrag verrechnet.

Anwesenheit
Es wird während des Semesters vollständige Präsenz erwünscht. Einzelne Veranstaltungen sind obligatorsich.
363-0764-00LProject ManagementW2 credits2VC. G. C. Marxt
AbstractThe course gives a detailed introduction on various aspects of professional project management out of theory and practice. Established concepts and methods for project organization, planning, execution and evaluation are introduced and major challenges discussed. The course includes an introduction on specialized project management software as well as agile project management concepts.
ObjectiveProjects are not only the base of work in modern enterprises but also the primary type of cooperation with customers. Students of ETH will often work in or manage projects in the course of their career. Good project management knowledge is not only a guarantee for individual, but also for company wide success.

The goal of this course is to give a detailed introduction into project management. The students should learn to plan and execute a project.
ContentProject planning (aims, appointments, capacities, efforts and costs), project organization, scheduling and risk analysis, project execution, supervision and control, project evaluation, termination and documentation, conflict management, multinational project management, IT support
Lecture notesNo
The lecture slides and other additional material will be available for download from Moodle a week before each class.
363-0532-00LEconomics of Sustainable DevelopmentW3 credits2VL. Bretschger
AbstractConcepts and indicators of sustainable development, paradigms of weak and strong sustainability;
neoclassical and endogenous growth models;
pollution, environmental policy and growth;
role of substitution possibilities and technological progress;
Environmental Kuznets Curve: concept, theory and empirical results;
economic growth in the presence of exhaustible and renewable resources.
ObjectiveThe aim is to develop an understanding of the implications of sustainable development for the long-run development of economies. It is to be shown to which extent the potential for growth to be sustainable depends on substitution possibilities, technological change and environmental policy.
ContentThe lecture introduces different concepts and paradigms of sustainable development. Building on this foundation and following a general introduction to the modelling of economic growth, conditions for growth to be sustainable in the presence of pollution and scarce natural resources are derived. Special attention is devoted to the scope for substitution and role of technological progress in overcoming resource scarcities. Implications of environmental externalities are regarded with respect to the design of environmental policies.
Concepts and indicators of sustainable development, paradigms of weak and strong sustainability, sustainability optimism vs. pessimism;
introduction to neoclassical and endogenous growth models;
pollution, environmental policy and growth;
role of substitution possibilities and technological progress;
Environmental Kuznets Curve: concept, theory and empirical results;
economic growth in the presence of exhaustible and renewable resources, Hartwick rule, resource saving technological change.
Lecture notesWill be provided successively in the course of the semester.
LiteratureBretschger, F. (1999), Growth Theory and Sustainable Development, Cheltenham: Edward Elgar.

Bretschger, L. (2004), Wachstumstheorie, Oldenbourg, 3. Auflage, München.

Perman, R., Y. Ma, J. McGilvray and M. Common (2003), Natural Resource and Environmental Economics, Longman , 3d ed., Essex.

Neumayer, E. (2003), Weak and Strong Sustainability, 2nd ed., Cheltenham: Edward Elgar.
851-0609-04LThe Energy Challenge - The Role of Technology, Business and Society Information
Prerequisites: Basic knowledge in economics.
W2 credits2VR. Schubert, T. Schmidt, J. Schmitz, B. Steffen
AbstractIn recent years, energy security, risks, access and availability are important issues. Strongly redirecting and accelerating technological change on a sustainable low-carbon path is essential. The transformation of current energy systems into sustainable ones is not only a question of technology but also of the goals and influences of important actors like business, politics and society.
ObjectiveIn this course different options of sustainable energy systems like fossile energies, nuclear energy or all sorts of renewable energies are explained and discussed. The students should be able to understand and identify advantages and disadvantages of the different technological options and discuss their relevance in the business as well as in the societal context.
Lecture notesMaterials will be made available on the electronic learning platform: Link
LiteratureMaterials will be made available on the electronic learning platform: Link
Prerequisites / NoticeVarious lectures from different disciplines.
851-0585-43LExperimental Game Theory Restricted registration - show details
Number of participants limited to 70
W2 credits2VA. Diekmann
AbstractThe course addresses principles and methods of experimental game theory. It focuses on experiments about social interaction, conflict and cooperation, emergence of cooperation and experimental validity of concepts for strategic behaviour in decision-making situations.
ObjectiveLearn the fundamentals and logic of thinking about experimental methods and experimental game theory. Apply experimental game theory methods to strategic interaction situations.
ContentDie Spieltheorie stellt Modelle zur Beschreibung und Analyse sozialer und strategischer Interaktionen zur Verfügung.
Schwerpunkt der Vorlesung sind experimentelle Studien und empirische Anwendungen der Theorie in verschiedenen Bereichen. Dazu zählen sozialtheoretische Analysen von Kooperation, des sozialen Austauschs, von Institutionen und Normen, sozialen Dilemmata und Reziprozität ebenso wie Anwendungen auf strategisches Verhalten in Politik und zwischen Staaten und Firmen, den Auswirkungen von Reziprozitätsnormen auf dem Arbeitsmarkt und einige Anwendungen in der Biologie. Experimentelle Studien zeigen allerdings, dass häufig die strikten Rationalitätsanforderungen der "Standardtheorie" nicht erfüllt sind. Unter dem Stichwort "Behavioural Game Theory" werden in der Vorlesung auch Theorievarianten vorgestellt, die mit den experimentellen Beobachtungen von Entscheidungen "begrenzt rationaler" Akteure besser im Einklang stehen.
Lecture notesFolien der Spieltheorie-Vorlesung und Literatur (Fachartikel, Kapitel aus Lehrbüchern) können auf der Webseite der Vorlesung eingesehen und heruntergeladen werden.
LiteratureKurzer Überblick in Kapitel 10 von Diekmann, Andreas, 2016. Spieltheorie. Einführung, Beispiele, Experimente. 4. Aufl. Reinbek: Rowohlt.
Ausführlich: John H. Kagel und Alvin E. Roth, Hg., 1995, Handbook of Experimental Economics. Princeton, N.J.: Princeton University Press.
(Ein Handapparat dieser und weiterer Literatur wird in der D-GESS-Bibliothek bereitgestellt.)
Literatur zum Download befindet sich auch auf der Webseite:
Link
Prerequisites / NoticeInteresse am Thema und Motivation zur Mitarbeit.
363-1070-00LCyber SecurityW3 credits2GS. Frei
AbstractThis course provides a solid understanding of the fundamental mechanics and limitations of cyber security to provide guidance for future leaders as well as individuals constituting our society.
Introdution to the concepts, developments, and the current state of affairs in the cyber security domain. We look at the topic from the attackers, defenders and societies perspective.
ObjectiveUpon completion of this course students understand the essential developments, principles, challenges as well as the the limitations and the state of practice in cyber security from the technological, economic, legal, and social perspective.
The course provides an interdisciplinary overview, guidance, and understanding of the dynamics in cyber security to guide decision making in business and society. Students understand the topics from the attackers, defenders, and societies perspective.
ContentIntroduction
- Brief history of the rise of the Internet from the attackers, defenders, commercial and society perspective
- Learning points from past and current assumptions, approaches, successes, failures, and surprises

Internet Infrastructure
- Establish a high level understanding of the fundamental design principals and functional blocks of the Internet infrastructure
- Understand strengths and weaknesses of present design choices from security perspective
- High level understanding of relevant networking concepts, protocols, software applications, policies, processes & organizations in order to assess these topics
- Establish a functional, high level understanding of relevant aspects of cryptography

Cyber Security & Risk
- Recognize cyber security as an interdisciplinary, highly dynamic, complex and adaptive system where increased interaction and dependencies between physical, communication, and social layers brings fundamentally different (and unpredictable) threats
- Core security assets such as: confidentiality, integrity, availability, authenticity, accountability, non repudiation, privacy
- Dominant players, protocols, and technologies
- Different threat actors along the dimensions attacker goals, resources, approach, and threat

Economics of Cyber Security
Understand security challenges and limitations from an economic, rather than technological perspective
- From security perspective: incentives of industry vs. users, security as a negative externality, zero marginal cost of software, network effect, time to market, lock-in, switching cost, economics of usability, security as a trade-off
- Social and psychological aspects of security

Attacker Capabilities
- Attacker capabilities and the offensive use from technical, economic, organizational, and operational perspective
- Understand common and novel attack and evasion techniques, proliferation of expertise and tools, optimal timing to use zero-day attacks
- Attack types and malware development lifecycle and detection evasion techniques
- Botnets, exploit markets, plausible deniability, distributed denial of service (DDoS)
- Processes and dynamics in the (in)security community, cyber-underground

Defense Options and Limitations
- Functional principles, capabilities, and limitations of diverse protection and detection technologies
- Security effectiveness and evaluation/testing of security technologies
- Trade-off between efficiency and resilience against structurally novel attacks
- Effectiveness baseline security measures
- Know cyber information sources and frameworks

Cyber Security Challenges
- Increasing software complexity and vulnerabilities, the illusion of secure software
- Full disclosure debate, economics of bug bounty programs
- Internet of things, Industry control systems (SCADA/ICS)
- Security and integrity of the supply chain (IoT, Smart-X)
- Social media and mass protests
- Erosion of privacy

Legal Aspects
- Legal aspects of cyber security, compliance, and policies
- Know the fundamental national and international legal and regulatory requirements in connection with cyber security on a cross-sector and sector-specific level
- Understanding of legal risks and measures for risk mitigation

Guest Talks:
- Pascal Gujer - Digital Forensics Expert Kapo Zurich (Cantonal Police Departement Zurich)
- Maxim Salomon - Program Lead Cyber Security Program Roche Diagnostics, "The safety vs. security of cyber physical systems"
- Marc Ruef - Security Expert, "Navigating the Cyber Underground"
- Roger Halbheer - Executive Security Advisor for Microsoft in EMEA
Lecture notesLecture slides will be available on the site of the lecture:

Link

Collaboradom: Cyber Security Course 2019
To get access ask Link for the registration code once the course has begun
LiteraturePaper reading provided during the lectures
Prerequisites / Noticenone
860-0022-00LComplexity and Global Systems Science Information Restricted registration - show details
Number of participants limited to 64.

Prerequisites: solid mathematical skills.

Particularly suitable for students of D-ITET, D-MAVT and ISTP
W3 credits2VD. Helbing, N. Antulov-Fantulin
AbstractThis course discusses complex techno-socio-economic systems, their counter-intuitive behaviors, and how their theoretical understanding empowers us to solve some long-standing problems that are currently bothering the world.
ObjectiveParticipants should learn to get an overview of the state of the art in the field, to present it in a well understandable way to an interdisciplinary scientific audience, to develop models for open problems, to analyze them, and to defend their results in response to critical questions. In essence, participants should improve their scientific skills and learn to think scientifically about complex dynamical systems.
ContentThis course starts with a discussion of the typical and often counter-intuitive features of complex dynamical systems such as self-organization, emergence, (sudden) phase transitions at "tipping points", multi-stability, systemic instability, deterministic chaos, and turbulence. It then discusses phenomena in networked systems such as feedback, side and cascade effects, and the problem of radical uncertainty. The course progresses by demonstrating the relevance of these properties for understanding societal and, at times, global-scale problems such as traffic jams, crowd disasters, breakdowns of cooperation, crime, conflict, social unrests, political revolutions, bubbles and crashes in financial markets, epidemic spreading, and/or "tragedies of the commons" such as environmental exploitation, overfishing, or climate change. Based on this understanding, the course points to possible ways of mitigating techno-socio-economic-environmental problems, and what data science may contribute to their solution.
Prerequisites / NoticeMathematical skills can be helpful
  • First page Previous page Page  2  of  2     All