.
Prevention and Solving of Cybercrime
Study Course Description
Course Description Statuss:Approved
Course Description Version:3.00
Study Course Accepted:02.02.2024 12:29:24
Study Course Information | |||||||||
Course Code: | JF_481 | LQF level: | Level 7 | ||||||
Credit Points: | 4.00 | ECTS: | 6.00 | ||||||
Branch of Science: | Law | Target Audience: | Civil and Military Defense; Juridical Science | ||||||
Study Course Supervisor | |||||||||
Course Supervisor: | Vitālijs Rakstiņš | ||||||||
Study Course Implementer | |||||||||
Structural Unit: | Faculty of Social Sciences | ||||||||
The Head of Structural Unit: | |||||||||
Contacts: | Dzirciema street 16, Rīga, szfrsu[pnkts]lv | ||||||||
Study Course Planning | |||||||||
Full-Time - Semester No.1 | |||||||||
Lectures (count) | 16 | Lecture Length (academic hours) | 2 | Total Contact Hours of Lectures | 32 | ||||
Classes (count) | 8 | Class Length (academic hours) | 2 | Total Contact Hours of Classes | 16 | ||||
Total Contact Hours | 48 | ||||||||
Part-Time - Semester No.1 | |||||||||
Lectures (count) | 8 | Lecture Length (academic hours) | 2 | Total Contact Hours of Lectures | 16 | ||||
Classes (count) | 2 | Class Length (academic hours) | 2 | Total Contact Hours of Classes | 4 | ||||
Total Contact Hours | 20 | ||||||||
Study course description | |||||||||
Preliminary Knowledge: | Fundamentals of Information and Communication Technologies, Criminal Law, Criminal Procedure Law. | ||||||||
Objective: | To provide students with the opportunity to acquire the understanding and skills: about economic and financial cybercrimes in the field of criminal law and criminal procedure, identification and solving of crime in the field of economics and information and communication technologies, to promote a deeper understanding of ensuring cybersecurity and effective management thereof. | ||||||||
Topic Layout (Full-Time) | |||||||||
No. | Topic | Type of Implementation | Number | Venue | |||||
1 | Introduction to the study course. The nature and understanding of cyberspace | Lectures | 1.00 | auditorium | |||||
2 | The concept and nature of cybersecurity. Cybersecurity management models. | Lectures | 2.00 | auditorium | |||||
3 | Types, composition and characteristics of cybercrime. Cybercriminality. | Lectures | 1.00 | auditorium | |||||
Classes | 1.00 | auditorium | |||||||
4 | Cybercrimes in the field of economics and finance | Lectures | 1.00 | auditorium | |||||
5 | Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation | Lectures | 1.00 | auditorium | |||||
6 | Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation | Lectures | 1.00 | auditorium | |||||
Classes | 1.00 | auditorium | |||||||
7 | Investigation planning and initial investigative actions to solve cybercrime. | Lectures | 1.00 | auditorium | |||||
8 | Cybersecurity and cybercrime prevention policies, strategies and programmes | Lectures | 1.00 | auditorium | |||||
9 | Intellectual property crime using cybertechnologies | Lectures | 1.00 | auditorium | |||||
10 | Cybercrime against individuals. Privacy and data protection | Lectures | 1.00 | auditorium | |||||
11 | Organised cybercrime. Human trafficking and drug trafficking and migrant smuggling in cyberspace | Lectures | 1.00 | auditorium | |||||
Classes | 1.00 | auditorium | |||||||
12 | Open-source intelligence in the cyberspace. | Lectures | 1.00 | auditorium | |||||
Classes | 2.00 | auditorium | |||||||
13 | International cooperation in solving cybercrime. | Lectures | 1.00 | auditorium | |||||
Classes | 1.00 | auditorium | |||||||
14 | Cybersecurity threats – characteristics and trends. | Lectures | 1.00 | auditorium | |||||
Classes | 1.00 | auditorium | |||||||
15 | Cybercrime prevention measures and cybersecurity | Lectures | 1.00 | auditorium | |||||
Classes | 1.00 | auditorium | |||||||
Topic Layout (Part-Time) | |||||||||
No. | Topic | Type of Implementation | Number | Venue | |||||
1 | Introduction to the study course. The nature and understanding of cyberspace | Lectures | 0.50 | auditorium | |||||
2 | The concept and nature of cybersecurity. Cybersecurity management models. | Lectures | 0.50 | auditorium | |||||
3 | Types, composition and characteristics of cybercrime. Cybercriminality. | Lectures | 0.50 | auditorium | |||||
4 | Cybercrimes in the field of economics and finance | Lectures | 0.50 | auditorium | |||||
5 | Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation | Lectures | 0.50 | auditorium | |||||
6 | Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation | Lectures | 0.75 | ||||||
Classes | 0.50 | ||||||||
7 | Investigation planning and initial investigative actions to solve cybercrime. | Lectures | 0.50 | ||||||
8 | Cybersecurity and cybercrime prevention policies, strategies and programmes | Lectures | 0.50 | auditorium | |||||
9 | Intellectual property crime using cybertechnologies | Lectures | 0.50 | auditorium | |||||
10 | Cybercrime against individuals. Privacy and data protection | Lectures | 0.50 | auditorium | |||||
11 | Organised cybercrime. Human trafficking and drug trafficking and migrant smuggling in cyberspace | Lectures | 0.50 | auditorium | |||||
Classes | 0.25 | auditorium | |||||||
12 | Open-source intelligence in the cyberspace. | Lectures | 0.50 | ||||||
Classes | 0.25 | ||||||||
13 | International cooperation in solving cybercrime. | Lectures | 0.50 | auditorium | |||||
Classes | 0.25 | auditorium | |||||||
14 | Cybersecurity threats – characteristics and trends. | Lectures | 0.50 | auditorium | |||||
Classes | 0.25 | auditorium | |||||||
15 | Cybercrime prevention measures and cybersecurity | Lectures | 0.75 | auditorium | |||||
Classes | 0.50 | auditorium | |||||||
Assessment | |||||||||
Unaided Work: | 1) Case solving. During the classes, students are divided into groups, each group analysing a case, analysing and studying the elements of offence and cases. Students present a cybercrime case study, discuss colleagues’ presentations and answer colleagues’ questions about their group’s presentation. 2) A paper or project. The student prepares a paper (up to 25,000 characters) on a crime in the field of economics and information and communication technologies, critically analysing a specific situation and related legal provisions, as well as proposing possible tactics and methods for the prevention and solving of the crime. 3) Examination. At the end of the course, the student completes an electronic test in the e-learning environment on the topics covered in the study course. In order to evaluate the quality of the study course as a whole, the student must fill out the study course evaluation questionnaire on the Student Portal. | ||||||||
Assessment Criteria: | Activity during class - 20%; Paper/project - 30%; Exam (test) - 50%. | ||||||||
Final Examination (Full-Time): | Exam (Written) | ||||||||
Final Examination (Part-Time): | Exam (Written) | ||||||||
Learning Outcomes | |||||||||
Knowledge: | Upon successful completion of the study course, students: - are familiar with international and national laws and regulations in the field of cybersecurity and combating cybercrime; - analyse legal norms that regulate economic and financial cybercrimes and security of information systems and are able to apply them practically; - integrate the obtained knowledge and contribute to the creation of new knowledge. | ||||||||
Skills: | Upon successful completion of the study course, students: - critically analyse specific situations in case of cyberthreats and propose solutions by applying the provisions of the Criminal Law and the Criminal Procedure Law, ensuring the security of information systems; - identify cyberthreats, cyberincidents and crimes in the digital environment; - obtain and use digital evidence. | ||||||||
Competencies: | Upon successful completion of the study course, students: - identify economic and financial cybercrime, are able to use them practically, managing the investigation process; - independently analyse the state of economic-financial crime in the cyberspace, identify its trends and determining factors and develop the most optimal methods to prevent economic-financial crime in the digital environment; - conduct research in the field of studying cybercrime; - are competent in investigating economic crime, working with evidence gathered in the digital environment, and advising investigators who use other methods of gathering evidence; - creatively and constructively justify their opinion. | ||||||||
Bibliography | |||||||||
No. | Reference | ||||||||
Required Reading | |||||||||
1 | Ķinis, U. 2015. Kibernoziedzība, kibernoziegumi un jurisdikcija. Rīga: Jumava | ||||||||
2 | Informācijas sabiedrības tiesību pamati. 2022. U.Ķiņa zinātniskajā redakcijā. Rīga: Rīgas Stradiņa universitāte | ||||||||
3 | Konvencija par kibernoziegumiem. Starptautisks dokuments. Latvijas Vēstnesis, 171, 26.10.2006. (akceptējams izdevums) | ||||||||
4 | Rethinking Privacy in the Council of Europe`s Convention on Cybercrime. Pieejams tiešsaistē. | ||||||||
5 | Ķinis, U. 2013. Jurisdikcija un kibernoziegumi. Rīga: Jumava | ||||||||
6 | The Palgrave Handbook of International Cybercrime and Cyberdeviance. 2020. edit. Thomas J. Holt, Adam M. Bossler, Palgrave Macmillan Cham | ||||||||
7 | High tech crime. Europol. Pieejams tiešsaistē. | ||||||||
8 | Šmits, E., Koens, D. 2017. Jaunais digitālais laikmets. Kā nākotnē mainīsies mūsu dzīve, valsts un bizness. Rīga; Zvaigzne ABC | ||||||||
9 | Berezins, A. 2014. Svešu un viltotu maksājumu karšu izmantošanas izmeklēšana: teorētiskie un metodiskie aspekti. Promocijas darbs. Rīga: LU | ||||||||
10 | Miķelsons, U. 2003. Informācijas tehnoloģiju noziegumu izmeklēšanas īpatnības. Rīga: Biznesa augstskola "Turība" (akceptējams izdevums) | ||||||||
11 | Kiberdrošība. Pieejams tiešsaistē | ||||||||
Additional Reading | |||||||||
1 | Latvijas Republikas Satversme. Latvijas Republikas likums. Latvijas Vēstnesis, 43, 01.07.1993. | ||||||||
2 | Elektronisko sakaru likums. Latvijas Republikas likums. Latvijas Vēstnesis, 144, 28.07.2022. | ||||||||
3 | Fizisko personu datu apstrādes likums. Latvijas Republikas likums. Latvijas Vēstnesis, 132, 04.07.2018. | ||||||||
4 | Krimināllikums. Latvijas Republikas likums. Latvijas Vēstnesis, 199/200, 08.07.1998. | ||||||||
5 | Kriminālprocesa likums. Latvijas Republikas likums. Latvijas Vēstnesis, 74, 11.05.2005. | ||||||||
Other Information Sources | |||||||||
1 | ENISA (European Union Agency for Cybersecurity) - Eiropas Savenības Kiberdrošības aģentūra |