Rouse Company Foundation Student Services Building

CRIM-108 Cyber Law Ethical Practices

This course is designed to educate students in the foundations of cyber law ethical practices and to guide them in exploring topics of current concern to law enforcement, government, and business. This course covers issues, practices, and controversies in the emerging field of cyber law ethical practices and recent court cases interpreting uses of emerging and converging technologies to fight cybercrime.

Credits

3

Hours Weekly

3 hours weekly

Course Objectives

  1. 1. Assess changes in social communications associated with the advent of technological
    change and the introduction of the Internet.
  2. 2. Identify challenges associated with the use of technology in the enforcement and
    prosecution of computer crimes.
  3. 3. Appraise the changing nature and extent of computer crime in society.
  4. 4. Analyze the pros and cons of global connectivity and its impact on the occurrence of
    crime.
  5. 5. Review the current state of computer crimes in the United States and abroad.
  6. 6. Identify emerging trends in Web-based crime.
  7. 7. Evaluate the virtual internet methods used by computer criminals to commit identity
    theft.
  8. 8. Develop knowledge of basic identity theft-type crimes and the fraudulent electronic
    processes used to carry out complex identity theft schemes.
  9. 9. Develop a working knowledge of organized crime involvement in computer crime.
  10. 10. Analyze recent federal legislation of online criminal behavior and related court cases.
  11. 11. Describe ethical practices associated with the use of electronic investigative tools by law
    enforcement, government agencies, and businesses to reduce the occurrence of
    cybercrimes.
  12. 12. Examine First Amendment free speech restrictions and ethical challenges associated with
    the investigation, enforcement, and prosecution of computer crimes.
  13. 13. Examine Fourth Amendment search and seizure restrictions and ethical challenges
    associated with the investigation, enforcement, and prosecution of computer crimes.
  14. 14. Identify and examine methods used by computer criminals to commit cyber stalking,
    harassment, and cyber bullying crimes.
  15. 15. Apply ethical cyber investigation practices, concepts, and methods to common
    computer crime investigations.
  16. 16. Review cyber security association codes of conduct and responsibility for computer
    forensic, network security, and cybercrime professionals.
  17. 17. Distinguish the ethical implications of emerging and converging technologies used in
    cybercrime investigations.

Course Objectives

  1. 1. Assess changes in social communications associated with the advent of technological
    change and the introduction of the Internet.
  2. 2. Identify challenges associated with the use of technology in the enforcement and
    prosecution of computer crimes.
  3. 3. Appraise the changing nature and extent of computer crime in society.
  4. 4. Analyze the pros and cons of global connectivity and its impact on the occurrence of
    crime.
  5. 5. Review the current state of computer crimes in the United States and abroad.
  6. 6. Identify emerging trends in Web-based crime.
  7. 7. Evaluate the virtual internet methods used by computer criminals to commit identity
    theft.
  8. 8. Develop knowledge of basic identity theft-type crimes and the fraudulent electronic
    processes used to carry out complex identity theft schemes.
  9. 9. Develop a working knowledge of organized crime involvement in computer crime.
  10. 10. Analyze recent federal legislation of online criminal behavior and related court cases.
  11. 11. Describe ethical practices associated with the use of electronic investigative tools by law
    enforcement, government agencies, and businesses to reduce the occurrence of
    cybercrimes.
  12. 12. Examine First Amendment free speech restrictions and ethical challenges associated with
    the investigation, enforcement, and prosecution of computer crimes.
  13. 13. Examine Fourth Amendment search and seizure restrictions and ethical challenges
    associated with the investigation, enforcement, and prosecution of computer crimes.
  14. 14. Identify and examine methods used by computer criminals to commit cyber stalking,
    harassment, and cyber bullying crimes.
  15. 15. Apply ethical cyber investigation practices, concepts, and methods to common
    computer crime investigations.
  16. 16. Review cyber security association codes of conduct and responsibility for computer
    forensic, network security, and cybercrime professionals.
  17. 17. Distinguish the ethical implications of emerging and converging technologies used in
    cybercrime investigations.