Cybercrime Law and Public Policy – CJUS 540
CG • Section 8WK • 07/01/2018 to 12/31/2199 • Modified 07/28/2020
This course provides an overview of the emerging challenges related to cybercrime, and their related major legal and public policy impacts. Relevant court cases and public policy initiatives will be discussed, as well as major trends in the cybercrime field.
This course will explore the policy and legal aspects of computer crimes and consider how cybercrime is different from or similar to transgressive behavior in physical space. Topics will include the Fourth Amendment, forensics, electronic surveillance, cyberbullying, identity theft, computer hacking and cracking, espionage, cyberterrorism, privacy, the era of compulsory disclosure, and the challenge of cross-jurisdiction enforcement.This aligns with the mission of Liberty University: “To develop Christ-centered men and women with the values, knowledge, and skills essential to impact tomorrow’s world.”
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Examine various legal questions and procedures for law enforcement officers related to the identification, seizure, and collection of digital evidence through study and practical exercises.
- Apply Constitutional concepts to digital evidence, e.g. computers, mobile phones, and other data storage devices, that require specialized techniques to maintain the integrity of the evidence for use in litigation and prosecution.
- Concisely draft legal discussions through scholarly writing assignments relating to search warrants and other interceptions for electronic data and the Constitutional arguments supporting policy support or change of policy.
- Distinguish between warrant-less or warranted searches of static storage drives, mobile devices, and network arrays.
- Discuss specific landmark cases involving the definition of possession, criminal behavior, and obscenity.
- Identify specific elements of criminal behavior relating to electronic possession, manufacturing, production, and commerce of child exploitation and human trafficking.
Textbook readings and lecture presentations
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.
Discussion Board Forums (4)
Students will participate in 4 Discussion Board Forums. Discussion boards are collaborative learning experiences. Therefore, the student will post an original thread of 500 words or more. Three additional sources beyond the course material (i.e., textbook, readings, and presentations) are required for the original thread. Then, the student must reply to at least 2 peers’ threads in 250 words or more. Two additional sources beyond the course material are required for each reply.
Thesis Statement and Annotated Bibliography
In preparation for the Research Paper, each student will select a topic and develop a hypothesis for approval along with an annotated bibliography. The bibliography must cite at least 8 scholarly resources that are significant to the topic (current, relevant, credible, and each carries its weight) with a clear and meaningful connection between all the resources. Annotations must be 100-words each.
Biblical Worldview Paper
For the Biblical Worldview Assignment, the student will write a short essay that critically examines the Thesis Statement and Annotated Bibliography he/she submitted that constructively identifies the gaps and omissions in the literature where a biblical worldview should be internalized and expressed as it relates specifically to the thesis the student identified having to do with Cyber Crime Law and Public Policy. The research paper must be at least 6 pages in current APA format and utilize as many scholarly citations necessary to support all assertions.
The student will write a 15–20-page Research Paper on specific problem in cyber crime. The hypothesis will be based upon one of the topics that was provided in the directions for this assignment. It should not be a descriptive paper but one that critically examines current problems and contemporary solutions. The student should make an argument or prove a point. It should be modeled after the form of what appears in most legal journals. The paper must utilize at least 12 significant, scholarly, peer reviewed resources that are relevant to the topic (current, credible, and each carries its weight) with a clear and meaningful connection between all the resources. The paper must properly follow current APA style. Detailed instructions can be found in Blackboard. If a student is struggling with current APA format, he/she may refer to the Additional Information folder for help.
The student will have 3 tests during this course. Each open-book/open-notes test will be composed of 4 essay questions and will have a 2-hour time limit. This is an exercise to test the student's ability to critically assess a situation or define a problem, outline a solution, and respond in an articulating manor.