Skip to main content

Prevention and Solving of Cybercrime

Study Course Description

Course Description Statuss:Approved
Course Description Version:3.00
Study Course Accepted:02.02.2024 12:29:24
Study Course Information
Course Code:JF_481LQF level:Level 7
Credit Points:4.00ECTS:6.00
Branch of Science:LawTarget Audience:Civil and Military Defense; Juridical Science
Study Course Supervisor
Course Supervisor:Vitālijs Rakstiņš
Study Course Implementer
Structural Unit:Faculty of Social Sciences
The Head of Structural Unit:
Contacts:Dzirciema street 16, Rīga, szfatrsu[pnkts]lv
Study Course Planning
Full-Time - Semester No.1
Lectures (count)16Lecture Length (academic hours)2Total Contact Hours of Lectures32
Classes (count)8Class Length (academic hours)2Total Contact Hours of Classes16
Total Contact Hours48
Part-Time - Semester No.1
Lectures (count)8Lecture Length (academic hours)2Total Contact Hours of Lectures16
Classes (count)2Class Length (academic hours)2Total Contact Hours of Classes4
Total Contact Hours20
Study course description
Preliminary Knowledge:
Fundamentals of Information and Communication Technologies, Criminal Law, Criminal Procedure Law.
Objective:
To provide students with the opportunity to acquire the understanding and skills: about economic and financial cybercrimes in the field of criminal law and criminal procedure, identification and solving of crime in the field of economics and information and communication technologies, to promote a deeper understanding of ensuring cybersecurity and effective management thereof.
Topic Layout (Full-Time)
No.TopicType of ImplementationNumberVenue
1Introduction to the study course. The nature and understanding of cyberspaceLectures1.00auditorium
2The concept and nature of cybersecurity. Cybersecurity management models.Lectures2.00auditorium
3Types, composition and characteristics of cybercrime. Cybercriminality.Lectures1.00auditorium
Classes1.00auditorium
4Cybercrimes in the field of economics and financeLectures1.00auditorium
5Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixationLectures1.00auditorium
6Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixationLectures1.00auditorium
Classes1.00auditorium
7Investigation planning and initial investigative actions to solve cybercrime.Lectures1.00auditorium
8Cybersecurity and cybercrime prevention policies, strategies and programmesLectures1.00auditorium
9Intellectual property crime using cybertechnologiesLectures1.00auditorium
10Cybercrime against individuals. Privacy and data protectionLectures1.00auditorium
11Organised cybercrime. Human trafficking and drug trafficking and migrant smuggling in cyberspaceLectures1.00auditorium
Classes1.00auditorium
12Open-source intelligence in the cyberspace.Lectures1.00auditorium
Classes2.00auditorium
13International cooperation in solving cybercrime.Lectures1.00auditorium
Classes1.00auditorium
14Cybersecurity threats – characteristics and trends.Lectures1.00auditorium
Classes1.00auditorium
15Cybercrime prevention measures and cybersecurityLectures1.00auditorium
Classes1.00auditorium
Topic Layout (Part-Time)
No.TopicType of ImplementationNumberVenue
1Introduction to the study course. The nature and understanding of cyberspaceLectures0.50auditorium
2The concept and nature of cybersecurity. Cybersecurity management models.Lectures0.50auditorium
3Types, composition and characteristics of cybercrime. Cybercriminality.Lectures0.50auditorium
4Cybercrimes in the field of economics and financeLectures0.50auditorium
5Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixationLectures0.50auditorium
6Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixationLectures0.75
Classes0.50
7Investigation planning and initial investigative actions to solve cybercrime.Lectures0.50
8Cybersecurity and cybercrime prevention policies, strategies and programmesLectures0.50auditorium
9Intellectual property crime using cybertechnologiesLectures0.50auditorium
10Cybercrime against individuals. Privacy and data protectionLectures0.50auditorium
11Organised cybercrime. Human trafficking and drug trafficking and migrant smuggling in cyberspaceLectures0.50auditorium
Classes0.25auditorium
12Open-source intelligence in the cyberspace.Lectures0.50
Classes0.25
13International cooperation in solving cybercrime.Lectures0.50auditorium
Classes0.25auditorium
14Cybersecurity threats – characteristics and trends.Lectures0.50auditorium
Classes0.25auditorium
15Cybercrime prevention measures and cybersecurityLectures0.75auditorium
Classes0.50auditorium
Assessment
Unaided Work:
1) Case solving. During the classes, students are divided into groups, each group analysing a case, analysing and studying the elements of offence and cases. Students present a cybercrime case study, discuss colleagues’ presentations and answer colleagues’ questions about their group’s presentation. 2) A paper or project. The student prepares a paper (up to 25,000 characters) on a crime in the field of economics and information and communication technologies, critically analysing a specific situation and related legal provisions, as well as proposing possible tactics and methods for the prevention and solving of the crime. 3) Examination. At the end of the course, the student completes an electronic test in the e-learning environment on the topics covered in the study course. In order to evaluate the quality of the study course as a whole, the student must fill out the study course evaluation questionnaire on the Student Portal.
Assessment Criteria:
Activity during class - 20%; Paper/project - 30%; Exam (test) - 50%.
Final Examination (Full-Time):Exam (Written)
Final Examination (Part-Time):Exam (Written)
Learning Outcomes
Knowledge:Upon successful completion of the study course, students: - are familiar with international and national laws and regulations in the field of cybersecurity and combating cybercrime; - analyse legal norms that regulate economic and financial cybercrimes and security of information systems and are able to apply them practically; - integrate the obtained knowledge and contribute to the creation of new knowledge.
Skills:Upon successful completion of the study course, students: - critically analyse specific situations in case of cyberthreats and propose solutions by applying the provisions of the Criminal Law and the Criminal Procedure Law, ensuring the security of information systems; - identify cyberthreats, cyberincidents and crimes in the digital environment; - obtain and use digital evidence.
Competencies:Upon successful completion of the study course, students: - identify economic and financial cybercrime, are able to use them practically, managing the investigation process; - independently analyse the state of economic-financial crime in the cyberspace, identify its trends and determining factors and develop the most optimal methods to prevent economic-financial crime in the digital environment; - conduct research in the field of studying cybercrime; - are competent in investigating economic crime, working with evidence gathered in the digital environment, and advising investigators who use other methods of gathering evidence; - creatively and constructively justify their opinion.
Bibliography
No.Reference
Required Reading
1Ķinis, U. 2015. Kibernoziedzība, kibernoziegumi un jurisdikcija. Rīga: Jumava
2Informācijas sabiedrības tiesību pamati. 2022. U.Ķiņa zinātniskajā redakcijā. Rīga: Rīgas Stradiņa universitāte
3Konvencija par kibernoziegumiem. Starptautisks dokuments. Latvijas Vēstnesis, 171, 26.10.2006. (akceptējams izdevums)
4Rethinking Privacy in the Council of Europe`s Convention on Cybercrime. Pieejams tiešsaistē.
5Ķinis, U. 2013. Jurisdikcija un kibernoziegumi. Rīga: Jumava
6The Palgrave Handbook of International Cybercrime and Cyberdeviance. 2020. edit. Thomas J. Holt, Adam M. Bossler, Palgrave Macmillan Cham
7High tech crime. Europol. Pieejams tiešsaistē.
8Šmits, E., Koens, D. 2017. Jaunais digitālais laikmets. Kā nākotnē mainīsies mūsu dzīve, valsts un bizness. Rīga; Zvaigzne ABC
9Berezins, A. 2014. Svešu un viltotu maksājumu karšu izmantošanas izmeklēšana: teorētiskie un metodiskie aspekti. Promocijas darbs. Rīga: LU
10Miķelsons, U. 2003. Informācijas tehnoloģiju noziegumu izmeklēšanas īpatnības. Rīga: Biznesa augstskola "Turība" (akceptējams izdevums)
11Kiberdrošība. Pieejams tiešsaistē
Additional Reading
1Latvijas Republikas Satversme. Latvijas Republikas likums. Latvijas Vēstnesis, 43, 01.07.1993.
2Elektronisko sakaru likums. Latvijas Republikas likums. Latvijas Vēstnesis, 144, 28.07.2022.
3Fizisko personu datu apstrādes likums. Latvijas Republikas likums. Latvijas Vēstnesis, 132, 04.07.2018.
4Krimināllikums. Latvijas Republikas likums. Latvijas Vēstnesis, 199/200, 08.07.1998.
5Kriminālprocesa likums. Latvijas Republikas likums. Latvijas Vēstnesis, 74, 11.05.2005.
Other Information Sources
1ENISA (European Union Agency for Cybersecurity) - Eiropas Savenības Kiberdrošības aģentūra