This course provides an overview of the emerging challenges related to cybercrime, and their related major legal and public policy impacts. Relevant court cases and public policy initiatives will be discussed, as well as major trends in the cybercrime field.
For information regarding prerequisites for this course, please refer to the Academic Course Catalog.
This course will explore the policy and legal aspects of computer crimes and consider how cybercrime is different from or similar to transgressive behavior in physical space. Topics will include the Fourth Amendment, forensics, electronic surveillance, cyberbullying, identity theft, computer hacking and cracking, espionage, cyberterrorism, privacy, the era of compulsory disclosure, and the challenge of cross-jurisdiction enforcement.This aligns with the mission of Liberty University: “To develop Christ-centered men and women with the values, knowledge, and skills essential to impact tomorrow’s world.”
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Examine various legal questions and procedures for law enforcement officers related to the identification, seizure, and collection of digital evidence through study and practical exercises.
- Apply Constitutional concepts to digital evidence, e.g. computers, mobile phones, and other data storage devices, that require specialized techniques to maintain the integrity of the evidence for use in litigation and prosecution.
- Concisely draft legal discussions through scholarly writing assignments relating to search warrants and other interceptions for electronic data and the Constitutional arguments supporting policy support or change of policy.
- Distinguish between warrant-less or warranted searches of static storage drives, mobile devices, and network arrays.
- Discuss specific landmark cases involving the definition of possession, criminal behavior, and obscenity.
- Identify specific elements of criminal behavior relating to electronic possession, manufacturing, production, and commerce of child exploitation and human trafficking.
Textbook readings and lecture presentations
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.
Students will participate in four (4) Discussions. Discussions are collaborative learning experiences. Therefore, the student will post an original thread of 500 words or more. Three additional sources beyond the course material (i.e., textbook, readings, and presentations) are required for the original thread. Then, the student must reply to at least 2 peers’ threads in 250 words or more. Two additional sources beyond the course material are required for each reply.
Research Paper: Thesis Statement and Annotated Bibliography Assignment
In preparation for the Research Paper: Final Assignment, each student will select a topic and develop a hypothesis for approval along with an annotated bibliography. The bibliography must cite at least eight (8) scholarly resources that are significant to the topic (current, relevant, credible, and each carries its weight) with a clear and meaningful connection between all the resources. Annotations must be 100-words each.
Research Paper: Biblical Worldview Assignment
For the Research Paper: Biblical Worldview Assignment, the student will write a short essay that critically examines the Research Paper: Thesis Statement and Annotated Bibliography Assignment he/she submitted that constructively identifies the gaps and omissions in the literature where a biblical worldview should be internalized and expressed as it relates specifically to the thesis the student identified having to do with Cyber Crime Law and Public Policy. The Research Paper: Biblical Worldview Assignment must be at least six (6) pages in current APA format and utilize as many scholarly citations necessary to support all assertions.
Research Paper: Final Assignment
The student will write a 15–20-page research paper on a specific problem in cyber crime. The hypothesis will be based upon one of the topics that was provided in the directions for this assignment. It should not be a descriptive paper, but one that critically examines current problems and contemporary solutions. The student should make an argument or prove a point. It should be modeled after the form of what appears in most legal journals. The paper must utilize at least 12 significant, scholarly, peer reviewed resources that are relevant to the topic (current, credible, and each carries its weight) with a clear and meaningful connection between all the resources. The paper must properly follow current APA style.
The student will take three quizzes during this course. Each open-book/open-notes quiz will be composed of four essay questions and will have a two-hour time limit. This is an exercise to test the student's ability to critically assess a situation or define a problem, outline a solution, and respond in an articulating manner.