.
Economic Cyber Crime and Security
Study Course Description
Course Description Statuss:Approved
Course Description Version:10.00
Study Course Accepted:28.05.2024 16:32:14
Study Course Information | |||||||||
Course Code: | JF_420 | LQF level: | Level 7 | ||||||
Credit Points: | 2.00 | ECTS: | 3.00 | ||||||
Branch of Science: | Law | Target Audience: | Juridical Science; Civil and Military Defense; Management Science | ||||||
Study Course Supervisor | |||||||||
Course Supervisor: | Uldis Ķinis | ||||||||
Study Course Implementer | |||||||||
Structural Unit: | Faculty of Social Sciences | ||||||||
The Head of Structural Unit: | |||||||||
Contacts: | Dzirciema street 16, Rīga, szf![]() | ||||||||
Study Course Planning | |||||||||
Full-Time - Semester No.1 | |||||||||
Lectures (count) | 6 | Lecture Length (academic hours) | 2 | Total Contact Hours of Lectures | 12 | ||||
Classes (count) | 6 | Class Length (academic hours) | 2 | Total Contact Hours of Classes | 12 | ||||
Total Contact Hours | 24 | ||||||||
Part-Time - Semester No.1 | |||||||||
Lectures (count) | 4 | Lecture Length (academic hours) | 2 | Total Contact Hours of Lectures | 8 | ||||
Classes (count) | 1 | Class Length (academic hours) | 2 | Total Contact Hours of Classes | 2 | ||||
Total Contact Hours | 10 | ||||||||
Study course description | |||||||||
Preliminary Knowledge: | In management science, economics, finance and law at basic level. | ||||||||
Objective: | To offer students an opportunity to gain understanding and skills: on economic and financial cyber crime in the field of criminal law and criminal proceedings, on information system security incident management and information security risks analysis in resolution of organisational and legal matters, to promote in-depth understanding of drafting and management of regulatory enactments related to information security systems. | ||||||||
Topic Layout (Full-Time) | |||||||||
No. | Topic | Type of Implementation | Number | Venue | |||||
1 | Concept, classification of cyber crimes | Lectures | 1.00 | E-Studies platform | |||||
2 | Description and classification of financial and economic crimes | Lectures | 1.00 | E-Studies platform | |||||
3 | Cybercrimes in the field of finance | Lectures | 1.00 | E-Studies platform | |||||
4 | Material and procedural aspects of economic cyber crimes | Lectures | 1.00 | E-Studies platform | |||||
5 | Cyber security, cyber security incident and its management | Lectures | 2.00 | E-Studies platform | |||||
6 | Solution to a problem on the topic of the first lecture. Teamwork, verbal presentation of results, peer evaluation. | Classes | 1.00 | auditorium | |||||
7 | Casus on cyber crimes in the field of finance. Teamwork, verbal presentations, peer evaluation | Classes | 1.00 | auditorium | |||||
8 | Casus on economic cyber crimes, teamwork, verbal presentation of results, peer evaluation | Classes | 1.00 | auditorium | |||||
9 | Casus on economic cyber crimes, procedural aspects. Teamwork, verbal presentation of results, peer evaluation | Classes | 1.00 | auditorium | |||||
10 | Problem situation on cyber security, teamwork, verbal presentation of results, peer evaluation | Classes | 1.00 | auditorium | |||||
11 | Casus on management of a security incident. Teamwork, verbal presentation of results, peer assessment | Classes | 1.00 | auditorium | |||||
Topic Layout (Part-Time) | |||||||||
No. | Topic | Type of Implementation | Number | Venue | |||||
1 | Concept, classification of cyber crimes | Lectures | 0.75 | E-Studies platform | |||||
2 | Description and classification of financial and economic crimes | Lectures | 0.75 | E-Studies platform | |||||
3 | Cybercrimes in the field of finance | Lectures | 0.75 | E-Studies platform | |||||
4 | Material and procedural aspects of economic cyber crimes | Lectures | 0.75 | E-Studies platform | |||||
5 | Cyber security, cyber security incident and its management | Lectures | 1.00 | E-Studies platform | |||||
6 | Solution to a problem on the topic of the first lecture. Teamwork, verbal presentation of results, peer evaluation. | Classes | 0.10 | auditorium | |||||
7 | Casus on cyber crimes in the field of finance. Teamwork, verbal presentations, peer evaluation | Classes | 0.20 | auditorium | |||||
8 | Casus on economic cyber crimes, teamwork, verbal presentation of results, peer evaluation | Classes | 0.20 | auditorium | |||||
9 | Casus on economic cyber crimes, procedural aspects. Teamwork, verbal presentation of results, peer evaluation | Classes | 0.20 | auditorium | |||||
10 | Problem situation on cyber security, teamwork, verbal presentation of results, peer evaluation | Classes | 0.10 | auditorium | |||||
11 | Casus on management of a security incident. Teamwork, verbal presentation of results, peer assessment | Classes | 0.20 | auditorium | |||||
Assessment | |||||||||
Unaided Work: | Report on matters related to course topics. Topics should be coordinated with the lecturer. Amount of text 13-15 pages. On the topic described in the theoretical and practical part of the course. In order to evaluate the quality of the study course as a whole, the student must fill out the study course evaluation questionnaire on the Student Portal. | ||||||||
Assessment Criteria: | Participation in seminars 30%. Independent learning – 30%. Examination – 40%. Assessment 1-100%, according to Academic Regulations. | ||||||||
Final Examination (Full-Time): | Exam (Written) | ||||||||
Final Examination (Part-Time): | Exam (Written) | ||||||||
Learning Outcomes | |||||||||
Knowledge: | Students will be guided by laws and regulations and will be able to independently select legal provisions governing the level of national and international law related to criminal and cyber-security relations and understand the nature of their application. Students will be able to apply these norms in practice by identifying the elements of the specific offenses and their separation from others. Students will also acquire skills in organizing information technology security incident processing and security risk analysis and developing necessary documents in the field of cyber security. | ||||||||
Skills: | Students are able to analyze and evaluate socio-economic legal processes creatively and constructively, debate and experiment on the results achieved, in support of their views, to create creative solutions for the detection, prevention, and investigation of economic crimes at the national and international levels. Students are able to identify and formulate problems, find causation, and offer concrete solutions in the organization and implementation of cybersecurity policies. | ||||||||
Competencies: | The ability to identify cybercrimes in the economic and financial fields, the ability to use the knowledge and skills acquired in the course for professional and personal development. The ability to offer not only formal solutions to the challenges of economic cybercrime and cyber security, but the ability to find creative solutions that would serve the values of a rule of law and public interest in detecting, preventing, and investigating economic cybercrimes and organizing cyber-security policy, both nationally and internationally. | ||||||||
Bibliography | |||||||||
No. | Reference | ||||||||
Required Reading | |||||||||
1 | Ķinis, U. Kibernoziedzība, kibernoziegumi un jurisdikcija. Rīga: Jumava, 2015 | ||||||||
2 | Krastiņš, U., Liholaja, V. un Hamkova, D. Krimināllikuma komentāri. Rīga Tiesu nama aģentūra, 2021 | ||||||||
3 | Kriminālprocesa likuma komentāri. A. daļa Prof. Stradas-Rozenbergas red. Rīga, Latvijas Vēstnesis, 2019 | ||||||||
4 | Ārvalstu studentiem/For international students | ||||||||
5 | Corporate and white collar crime Cases and materials. (Ed) K. Brickley. 7th ed. Aspen publishers, 2021 | ||||||||
Additional Reading | |||||||||
1 | Raksti par kursa tematiku izdevumos RSU JF e- žurnālā Socrates, Jurista vārdā, Administratīvajā un kriminālajā justīcijā u.c. | ||||||||
2 | Informācijas Sabiedrības tiesību pamati U. Ķiņa zinātniskā redakcijā. Rīga, RSU, 2022 | ||||||||
3 | U. Kinis From Responsible Disclosure Policy (RDP) towards State Regulated Responsible Vulnerability Disclosure Procedure (hereinafter – RVDP): The Latvian approach | ||||||||
4 | U. Ķinis Algoritms kā būtiska kaitējuma noteikšanas metode noziedzīgos nodarījumos, kas saistīti ar automatizētu datu apstrādes sistēmu (ADAS) | ||||||||
5 | U. Ķinis, Ņ. Sinkevičs Automatizētās datu apstrādes sistēmā esošo datu kontrole (Kriminālprocesa likuma 219. pants): nacionālie un starptautiskie piemērošanas aspekti | ||||||||
Other Information Sources | |||||||||
1 | Eiropas Parlamenta un Komisijas Regulas, Direktīvas, Politikas dokumenti. | ||||||||
2 | Normatīvo aktu sagatavošanas materiāli, anotācijas. | ||||||||
3 | Normatīvo aktu projekti. | ||||||||
4 | Ārvalstu studentiem/For international students | ||||||||
5 | Draft normative acts. |