Skip to main content

Economic Cyber Crime and Security

Study Course Description

Course Description Statuss:Approved
Course Description Version:10.00
Study Course Accepted:28.05.2024 16:32:14
Study Course Information
Course Code:JF_420LQF level:Level 7
Credit Points:2.00ECTS:3.00
Branch of Science:LawTarget Audience:Juridical Science; Civil and Military Defense; Management Science
Study Course Supervisor
Course Supervisor:Uldis Ķinis
Study Course Implementer
Structural Unit:Faculty of Social Sciences
The Head of Structural Unit:
Contacts:Dzirciema street 16, Rīga, szfatrsu[pnkts]lv
Study Course Planning
Full-Time - Semester No.1
Lectures (count)6Lecture Length (academic hours)2Total Contact Hours of Lectures12
Classes (count)6Class Length (academic hours)2Total Contact Hours of Classes12
Total Contact Hours24
Part-Time - Semester No.1
Lectures (count)4Lecture Length (academic hours)2Total Contact Hours of Lectures8
Classes (count)1Class Length (academic hours)2Total Contact Hours of Classes2
Total Contact Hours10
Study course description
Preliminary Knowledge:
In management science, economics, finance and law at basic level.
Objective:
To offer students an opportunity to gain understanding and skills: on economic and financial cyber crime in the field of criminal law and criminal proceedings, on information system security incident management and information security risks analysis in resolution of organisational and legal matters, to promote in-depth understanding of drafting and management of regulatory enactments related to information security systems.
Topic Layout (Full-Time)
No.TopicType of ImplementationNumberVenue
1Concept, classification of cyber crimesLectures1.00E-Studies platform
2Description and classification of financial and economic crimesLectures1.00E-Studies platform
3Cybercrimes in the field of financeLectures1.00E-Studies platform
4Material and procedural aspects of economic cyber crimesLectures1.00E-Studies platform
5Cyber security, cyber security incident and its managementLectures2.00E-Studies platform
6Solution to a problem on the topic of the first lecture. Teamwork, verbal presentation of results, peer evaluation.Classes1.00auditorium
7Casus on cyber crimes in the field of finance. Teamwork, verbal presentations, peer evaluationClasses1.00auditorium
8Casus on economic cyber crimes, teamwork, verbal presentation of results, peer evaluationClasses1.00auditorium
9Casus on economic cyber crimes, procedural aspects. Teamwork, verbal presentation of results, peer evaluationClasses1.00auditorium
10Problem situation on cyber security, teamwork, verbal presentation of results, peer evaluationClasses1.00auditorium
11Casus on management of a security incident. Teamwork, verbal presentation of results, peer assessmentClasses1.00auditorium
Topic Layout (Part-Time)
No.TopicType of ImplementationNumberVenue
1Concept, classification of cyber crimesLectures0.75E-Studies platform
2Description and classification of financial and economic crimesLectures0.75E-Studies platform
3Cybercrimes in the field of financeLectures0.75E-Studies platform
4Material and procedural aspects of economic cyber crimesLectures0.75E-Studies platform
5Cyber security, cyber security incident and its managementLectures1.00E-Studies platform
6Solution to a problem on the topic of the first lecture. Teamwork, verbal presentation of results, peer evaluation.Classes0.10auditorium
7Casus on cyber crimes in the field of finance. Teamwork, verbal presentations, peer evaluationClasses0.20auditorium
8Casus on economic cyber crimes, teamwork, verbal presentation of results, peer evaluationClasses0.20auditorium
9Casus on economic cyber crimes, procedural aspects. Teamwork, verbal presentation of results, peer evaluationClasses0.20auditorium
10Problem situation on cyber security, teamwork, verbal presentation of results, peer evaluationClasses0.10auditorium
11Casus on management of a security incident. Teamwork, verbal presentation of results, peer assessmentClasses0.20auditorium
Assessment
Unaided Work:
Report on matters related to course topics. Topics should be coordinated with the lecturer. Amount of text 13-15 pages. On the topic described in the theoretical and practical part of the course. In order to evaluate the quality of the study course as a whole, the student must fill out the study course evaluation questionnaire on the Student Portal.
Assessment Criteria:
Participation in seminars 30%. Independent learning – 30%. Examination – 40%. Assessment 1-100%, according to Academic Regulations.
Final Examination (Full-Time):Exam (Written)
Final Examination (Part-Time):Exam (Written)
Learning Outcomes
Knowledge:Students will be guided by laws and regulations and will be able to independently select legal provisions governing the level of national and international law related to criminal and cyber-security relations and understand the nature of their application. Students will be able to apply these norms in practice by identifying the elements of the specific offenses and their separation from others. Students will also acquire skills in organizing information technology security incident processing and security risk analysis and developing necessary documents in the field of cyber security.
Skills:Students are able to analyze and evaluate socio-economic legal processes creatively and constructively, debate and experiment on the results achieved, in support of their views, to create creative solutions for the detection, prevention, and investigation of economic crimes at the national and international levels. Students are able to identify and formulate problems, find causation, and offer concrete solutions in the organization and implementation of cybersecurity policies.
Competencies:The ability to identify cybercrimes in the economic and financial fields, the ability to use the knowledge and skills acquired in the course for professional and personal development. The ability to offer not only formal solutions to the challenges of economic cybercrime and cyber security, but the ability to find creative solutions that would serve the values of a rule of law and public interest in detecting, preventing, and investigating economic cybercrimes and organizing cyber-security policy, both nationally and internationally.
Bibliography
No.Reference
Required Reading
1Ķinis, U. Kibernoziedzība, kibernoziegumi un jurisdikcija. Rīga: Jumava, 2015
2Krastiņš, U., Liholaja, V. un Hamkova, D. Krimināllikuma komentāri. Rīga Tiesu nama aģentūra, 2021
3Kriminālprocesa likuma komentāri. A. daļa Prof. Stradas-Rozenbergas red. Rīga, Latvijas Vēstnesis, 2019
4Ārvalstu studentiem/For international students
5Corporate and white collar crime Cases and materials. (Ed) K. Brickley. 7th ed. Aspen publishers, 2021
Additional Reading
1Raksti par kursa tematiku izdevumos RSU JF e- žurnālā Socrates, Jurista vārdā, Administratīvajā un kriminālajā justīcijā u.c.
2Informācijas Sabiedrības tiesību pamati U. Ķiņa zinātniskā redakcijā. Rīga, RSU, 2022
3 U. Kinis From Responsible Disclosure Policy (RDP) towards State Regulated Responsible Vulnerability Disclosure Procedure (hereinafter – RVDP): The Latvian approach
4U. Ķinis Algoritms kā būtiska kaitējuma noteikšanas metode noziedzīgos nodarījumos, kas saistīti ar automatizētu datu apstrādes sistēmu (ADAS)
5U. Ķinis, Ņ. Sinkevičs Automatizētās datu apstrādes sistēmā esošo datu kontrole (Kriminālprocesa likuma 219. pants): nacionālie un starptautiskie piemērošanas aspekti
Other Information Sources
1Eiropas Parlamenta un Komisijas Regulas, Direktīvas, Politikas dokumenti.
2Normatīvo aktu sagatavošanas materiāli, anotācijas.
3Normatīvo aktu projekti.
4Ārvalstu studentiem/For international students
5Draft normative acts.