This is a Public Health Course. Public Health classes are offered on the Health Services Campus at 168th Street. For more detailed course information, please go to Mailman School of Public Health Courses website at http://www.mailman.hs.columbia.edu/academics/courses
.
This is a seven-week course that introduces students to design principles and techniques for effective data visualization. Visualizations graphically depict data to foster communication, improve comprehension and enhance decision-making. This course aims to help students: understand how visual representations can improve data comprehension, master techniques to facilitate the creation of visualizations as well as begin using widely available software and web-based, open-source frameworks.
In this course, students will enhance and deepen their understanding of how the human voice and articulators partner together to create language. They will explore their own individual Idiolects and gain the skills to recalibrate their instruments in order to enhance the expressiveness and dynamic contrast of their speech. The phonemes of the International Alphabet (IPA) will be employed to specify the sounds of Detailed North American English (DNAE).
In this course, students will continue their individual development of
greater ownership
, expression and embodiment of heightened (mostly Shakespeare’s) text. The objective of this course is for students to practice landing heightened text with honesty and clarity, uniting the Givens and the Imaginatives. “It’s not about making it right, it’s about making it ALIVE.” Students will:
(Continue to) refine their articulation skills via a strong working knowledge of the IPA and corresponding Lexical Sets
Dance along the fine line between control and freedom of their muscles of articulation in order to share complicated thoughts and speak heightened language with invisible technique
Unpack and investigate texts in order to marry structure with meaning
Interpret texts with Musiclarity – the musicality of the language supporting the clarity of the thought
Play with passion, curiosity, specificity and
humanity.
This course will bring together professors and select students from across technology, policy, and law to discuss how different disciplines solve cybersecurity issues. Classes will cover the technical underpinnings of the Internet and computer security; the novel legal aspects from technology, crime and national security; and the various policy problems and solutions involved in this new field. Class discussion will range freely between the technologies and implications of cyber security, crime, and conflict. To keep the students focused on topical issues, the assignments and guest lecturers for the Fall 2021 session of this course will be organized around four of the “great hacks” – SolarWinds (and supply chain), NotPetya (and state-based disruptions), Colonial Pipeline (and ransomware), and 2016 election-related hacks (and cyber-related disinformation).
In the 1890s, Frederick Mathias (F.M.) Alexander, a Shakespearian actor and spoken recitalist from Australia, began experiencing severe voice loss after he performed. The medical profession of his day prescribed vocal rest which worked well enough until Alexander’s next performance when he would leave the stage as hoarse as before. Frustrated that his vocal issues were not resolving, Alexander intuited that it must be something that he was doing to himself while he performed that was contributing to the loss of his voice. Doctors agreed with Alexander but they were at a loss to say what he was doing that was causing his problems.Thus began F. M.’s journey. The discoveries he made are what we now know as the Alexander Technique, and in the past 100 plus years, AT has become a valuable part of the curriculum in music conservatories and drama schools throughout the world. Many extraordinary actors have been lifelong students of the Alexander Technique for the many ways it helps their body, voice and breath in performance. Our work together is experiential and sensory, and it involves a way of thinking which is highly creative and improvisational. It is an art, and it takes time to evolve in us. At the beginning things are bound to be confusing. You are learning a new language—a language of body and breath—and you cannot understand it through your old ways of feeling or visualizing. Confusion is absolutely normal, but it shifts as you develop a new awareness of yourself. Our work is a process of discovery and the only requirement for you as a student is to stay open and to try not to worry about getting something “right.” This is easier said than done, but I will be reminding you of it all the time. It helps if you can keep a “beginner’s mind” so that every lesson becomes a source of wonder. For an actor, your body is your instrument and how you use your body determines how well you move on stage, produce your voice, and perform. The Alexander Technique is a mind-body discipline that helps students improve their psycho-physical coordination while helping them become aware of physical habits that may be inhibiting their breathing and the expressiveness, energy and strength of their voice and body. In our work together, you will begin to gain an awareness of improved physical coordination and ease leading to a freer and more expressive voice and body. Vocal production relies on psychological and physical coordination—an alignment and coordination of th
.
This course is designed to help MA-level students improve their researching and writing skills, and become adept at distilling acquired knowledge into straightforward prose. The aim is to assist students in being more effective communicators regardless of whether they pursue careers in academia, journalism, government service, private enterprise or the non-governmental sector. The course will also promote better understanding of how to get work published by mass media outlets. The course places particular emphasis on practical work, including the preparation of commentaries and book reviews concerning current affairs in Eurasia. Lectures examine the basic elements of editing, interviewing and concise writing. Other lectures focus on how to maintain personal and digital security while living and researching/working in Eurasia, and discuss best practices on harnessing social media for career advancement. Guest speakers will provide additional perspectives on ways to make writing on academic topics more accessible to the general reading public, and how to leverage expertise in Eurasian-area affairs in ways that can jump-start careers.
The purpose of this course is to familiarize SIPA students with the protocols and devices used in the function of the internet while focusing on the flaws and vulnerabilities. This course will approach each session in the following manner: discussion of the topic to include what the topic is and how it is used, vulnerabilities and specifically, and example, and will follow up with a video or other demonstration of a common hacker technique or tool to illustrate the problem so the students can better understand the impact. This course is intended to complement Basics of Cybersecurity with a tighter focus on specific vulnerabilities and how these can be exploited by hackers, criminals, spies, or militaries. This course is intended to be an introduction to cybersecurity and is thus suitable for complete newcomers to the area. It is a big field, with a lot to cover; however this should get students familiar with all of the basics. The class is divided into seven topics; the first five iteratively build on each other. Session six will look to future technologies. Session seven will challenge students to understand the authorities encountered and the friction between the authorities and agencies in responding to a cyber incident. Many cyber jobs are opening up with companies that need international affairs analysts who, while not cybersecurity experts, understand the topic well enough to write policy recommendations or intelligence briefs. Even if you don’t intend your career to focus on cyber issues, having some exposure will deepen your understanding of the dynamics of many other international and public policy issues.
This is a Public Health Course. Public Health classes are offered on the Health Services Campus at 168th Street. For more detailed course information, please go to Mailman School of Public Health Courses website at http://www.mailman.hs.columbia.edu/academics/courses
.
This class will study the dynamics of cyber conflict and cybersecurity in the Indo-Pacific. Students will examine cybersecurity threats across the region; compare policies, actors, and institutions across countries; and analyze competition within the region and with other major cyber actors such as the United States, Russia, and the European Union. Topics will include: development of cyber strategies; regional approaches to cyber norms, confidence building measures, and capacity building; information operations; and crime and non-state actors. Prior knowledge of cybersecurity and/or Indo-Pacific security is not necessary, but is useful.
In Russia and certain other countries of the Post-Soviet Union, corruption is systemic. Corruption, defined as the abuse of public trust and power for private gain, is institutionalized in government at the national, regional and local level. Formal government decision-making processes have been captured by informal networks of political and business elites who exert significant control over allocation of public resources. They utilize this control to make illegal financial gains with the support of government authorities and protection of the law. This course will analyze the political economy, power relationships, historical forces and cultural factors that have engendered systemic corruption in post-Soviet countries, including Russia, Ukraine, Kazakhstan, Turkmenistan, Uzbekistan, Azerbaijan, Moldova, and others. We will identify characteristics that are common to systems in this region based on the legacy of Soviet one-party rule, state control of the economy and central planning. We will also distinguish the different types of corrupt systems that have emerged in the regions and identify what has helped certain countries in the region move beyond obstacles of the Soviet legacy more effectively. To achieve a deep understanding of post-Soviet corruption, we will examine the problem from an inter-disciplinary perspective. The course will include a data-based evidentiary approach to examining the causes of corruption and developing innovative policy solutions.
This Human Rights practicum course focuses on the Western Balkans of the Former Yugoslavia in a contemporary context. The course focuses on war crimes and their respective consequences that have occurred during the most recent Balkan Wars 1991-1999 in the Former Yugoslav states and will include a detailed review and examination of human rights policies and practices carried out by international, regional and national bodies, laws, organizations, frameworks of transitional justice and evaluative tools employed in an effort to stabilize a post-war, post-Communist, post-conflict scenario. The course will present and examine in detail policies and practices deployed by international and national state structures to address the legacies of war crimes and the emergence of new human rights issues that are currently present in the Former Yugoslav space. The course will require students to prepare a 10-page paper on a human rights issue in the region, analyze the issues, review implementation to date and recommend policy initiatives that will address the problem (75 percent of the grade). Students are expected read weekly assignments and regularly participate and attend the class, which will constitute 25 percent of their final grade. Failure to attend class without a justifiable explanation will be penalized by a reduction of one grade letter.
This course deepens the actor’s working understanding of their body as “instrument” and teaches practical application of learned skill sets for professional practice and complex use.The course achieves this objective by examining current practice and providing solutions for real time obstacles and challenges actors are encountering in their daily practice in classes and rehearsals. Challenges faced are explored specifically in context of class vocabulary as well as by providing increasingly complex tasks that require use of multiple skills sets at once.The course continues the work of developing physical ease and awareness and expands each actor also to prepare body and being for work in ensemble.
Sovereign risk is the risk that a national government will default on its debt obligations. For most of the post-World War II era, sovereign risk was mainly a concern facing investors in emerging market governments. However, in the wake of the global financial crisis in 2008, some governments formerly judged to be of the lowest or low risk have experienced significant deterioration in their credit quality, and Greece experienced back-to-back defaults in 2012. In the emerging markets sovereign credit quality deteriorated from the collapse of the commodity price super cycle, prolonged, weak advanced country economic growth and the downturn in global trade growth. Now, vulnerabilities are being exposed by Fed interest rate normalization. And, how is the return of geopolitics affecting sovereign risk?
Pick up any news article today, and you’ll see references to culture, identity, and globalization. The growth of white nationalism in the United States. The prolonged politics of Brexit in Europe. The rise and fall of the Islamic State across the Middle East. Constructions of culture, identity, and globalization appear all around us. In fact, all of you invoked these terms in your essays to join our Master’s program in Global Thought. So join me for a deep dive this semester to investigate what we mean by these terms. How do people define culture, identity, and globalization? What kinds of work do these loaded words do? Are their definitions the same or different across societies? How have various academic disciplines defined these terms? How can analyzing debates over their use in psychiatry, psychology, and anthropology help us understand contemporary events? The goal of this seminar is to explore a wide range of sources on culture, identity, and globalization.
We start with big thematic ideas like culture and identity at the beginning of the course and then focus on particular issues such as nationalism and immigration.
The point is not to side with any single author, but to make our assumptions explicit when we use these terms and to better analyze the arguments of others.
In this workshop, students will create original writing that is in conversation with American theatrical traditions beyond the proscenium. We will investigate and engage theatrical forms, such as the side show, courtroom drama, violence as spectacle and performance art. The aim is to encourage students to think more expansively and non-traditionally in their approach to writing and making theatre.
This course teaches students data analytical tools to test, evaluate, and predict public policy outcomes. Students learn to critically review policymaking models, derive testable hypotheses, and evaluate these predictions using advanced data science techniques. The course emphasizes data visualization, diagnostics, model specification, and predictive robustness. Applications include U.S. trade policy, financial market regulation, democratic transitions, and electoral and congressional voting models.
Prerequisites: permission of the departmental adviser to Graduate Studies.
A graduate-level introduction to classical and modern feedback control that does not presume an undergraduate background in control. Scalar and matrix differential equation models and solutions in terms of state transition matrices. Transfer functions and transfer function matrices, block diagram manipulations, closed loop response. Proportional, rate, and integral controllers, and compensators. Design by root locus and frequency response. Controllability and observability. Luenberger observers, pole placement, and linear-quadratic cost controllers.
Prerequisites: SIPA U6501 The goal of this course is to enable students to evaluate the policy relevance of academic research. While academic research frequently considers treatments that approximate a potential public policy, such prima facie relevance alone does not inform policy. In particular, public policy is predicated on the credible estimation of causal treatment effects. For example, although researchers frequently document the strong correlation between years of schooling and better health, this tells us surprisingly little (and arguably nothing) about the health effects of public tuition assistance, compulsory school laws, or any other program that raises educational attainment. Policies guided by statistical correlations - even the regression-adjusted estimates that dominate the academic literature - will frequently have unintended and even perverse real-world effects. Policymakers must distinguish between causal estimates that should inform policy design and statistical correlations that should not. The catch is that distinguishing correlation from causation in empirical studies is surprisingly difficult. Econometric technique alone does not provide a reliable path to causal inference. Applications of instrumental variables (IV) techniques, while wildly popular, arguably obscure sources of identification more often than isolating exogenous variation. Similar concerns apply to popular panel data and fixed effects (FE) models, which can eliminate certain unobservable sources of bias. Furthermore, causal claims by a study's author should be regarded with skepticism - frequently this is merely the marketing of a non-transparent statistical correlation. Put differently, when has a researcher portrayed his empirical result as a mere correlation when in fact he/she had identified a credible causal impact? A basic theme of the course is that identification strategy - the manner in which a researcher uses observational real-world data to approximate a controlled/randomized trial (Angrist & Pischke, 2009) - is the bedrock of causal inference. Econometric technique cannot rescue a fundamentally flawed identification strategy. In other words, econometrics and identifications strategies are complements in the production of causal estimates, not substitutes. Examples of appropriate econometric technique applied to compelling identification strategies will be described to illustrate this approach (most often from health economics), along with their implications for public policy.