Veidlapa Nr. M-3 (8)
Study Course Description

Prevention and Solving of Cybercrime

Main Study Course Information

Course Code
JF_481
Branch of Science
Law
ECTS
6.00
Target Audience
Civil and Military Defense; Juridical Science
LQF
Level 7
Study Type And Form
Full-Time; Part-Time

Study Course Implementer

Course Supervisor
Structure Unit Manager
Structural Unit
Faculty of Social Sciences
Contacts

Dzirciema street 16, Rīga, szf@rsu.lv

About Study Course

Objective

To provide students with the opportunity to acquire the understanding and skills: about economic and financial cybercrimes in the field of criminal law and criminal procedure, identification and solving of crime in the field of economics and information and communication technologies, to promote a deeper understanding of ensuring cybersecurity and effective management thereof.

Preliminary Knowledge

Fundamentals of Information and Communication Technologies, Criminal Law, Criminal Procedure Law.

Learning Outcomes

Knowledge

1.Upon successful completion of the study course, students: - are familiar with international and national laws and regulations in the field of cybersecurity and combating cybercrime; - analyse legal norms that regulate economic and financial cybercrimes and security of information systems and are able to apply them practically; - integrate the obtained knowledge and contribute to the creation of new knowledge.

Skills

1.Upon successful completion of the study course, students: - critically analyse specific situations in case of cyberthreats and propose solutions by applying the provisions of the Criminal Law and the Criminal Procedure Law, ensuring the security of information systems; - identify cyberthreats, cyberincidents and crimes in the digital environment; - obtain and use digital evidence.

Competences

1.Upon successful completion of the study course, students: - identify economic and financial cybercrime, are able to use them practically, managing the investigation process; - independently analyse the state of economic-financial crime in the cyberspace, identify its trends and determining factors and develop the most optimal methods to prevent economic-financial crime in the digital environment; - conduct research in the field of studying cybercrime; - are competent in investigating economic crime, working with evidence gathered in the digital environment, and advising investigators who use other methods of gathering evidence; - creatively and constructively justify their opinion.

Assessment

Individual work

Title
% from total grade
Grade
1.

Individual work

-
-
1) Case solving. During the classes, students are divided into groups, each group analysing a case, analysing and studying the elements of offence and cases. Students present a cybercrime case study, discuss colleagues’ presentations and answer colleagues’ questions about their group’s presentation. 2) A paper or project. The student prepares a paper (up to 25,000 characters) on a crime in the field of economics and information and communication technologies, critically analysing a specific situation and related legal provisions, as well as proposing possible tactics and methods for the prevention and solving of the crime. 3) Examination. At the end of the course, the student completes an electronic test in the e-learning environment on the topics covered in the study course. In order to evaluate the quality of the study course as a whole, the student must fill out the study course evaluation questionnaire on the Student Portal.

Examination

Title
% from total grade
Grade
1.

Examination

-
-
Activity during class - 20%; Paper/project - 30%; Exam (test) - 50%.

Study Course Theme Plan

FULL-TIME
Part 1
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cybercrime prevention measures and cybersecurity
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cybercrimes in the field of economics and finance
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Open-source intelligence in the cyberspace.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

The concept and nature of cybersecurity. Cybersecurity management models.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Organised cybercrime. Human trafficking and drug trafficking and migrant smuggling in cyberspace
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Investigation planning and initial investigative actions to solve cybercrime.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Open-source intelligence in the cyberspace.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

International cooperation in solving cybercrime.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cybersecurity threats – characteristics and trends.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Types, composition and characteristics of cybercrime. Cybercriminality.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Organised cybercrime. Human trafficking and drug trafficking and migrant smuggling in cyberspace
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

The concept and nature of cybersecurity. Cybersecurity management models.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cybersecurity and cybercrime prevention policies, strategies and programmes
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cybersecurity threats – characteristics and trends.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

International cooperation in solving cybercrime.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Open-source intelligence in the cyberspace.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Intellectual property crime using cybertechnologies
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Types, composition and characteristics of cybercrime. Cybercriminality.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cybercrime against individuals. Privacy and data protection
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Introduction to the study course. The nature and understanding of cyberspace
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cybercrime prevention measures and cybersecurity
Total ECTS (Creditpoints):
6.00
Contact hours:
48 Academic Hours
Final Examination:
Exam (Written)
PART-TIME
Part 1
Total ECTS (Creditpoints):
6.00
Contact hours:
20 Academic Hours
Final Examination:
Exam (Written)

Bibliography

Required Reading

1.

Ķinis, U. 2015. Kibernoziedzība, kibernoziegumi un jurisdikcija. Rīga: Jumava

2.

Informācijas sabiedrības tiesību pamati. 2022. U.Ķiņa zinātniskajā redakcijā. Rīga: Rīgas Stradiņa universitāte

3.

Konvencija par kibernoziegumiem. Starptautisks dokuments. Latvijas Vēstnesis, 171, 26.10.2006. (akceptējams izdevums)

4.

Rethinking Privacy in the Council of Europe`s Convention on Cybercrime. Pieejams tiešsaistē.

5.

Ķinis, U. 2013. Jurisdikcija un kibernoziegumi. Rīga: Jumava

6.

The Palgrave Handbook of International Cybercrime and Cyberdeviance. 2020. edit. Thomas J. Holt, Adam M. Bossler, Palgrave Macmillan Cham

7.

High tech crime. Europol. Pieejams tiešsaistē.

8.

Šmits, E., Koens, D. 2017. Jaunais digitālais laikmets. Kā nākotnē mainīsies mūsu dzīve, valsts un bizness. Rīga; Zvaigzne ABC

9.

Berezins, A. 2014. Svešu un viltotu maksājumu karšu izmantošanas izmeklēšana: teorētiskie un metodiskie aspekti. Promocijas darbs. Rīga: LU

10.

Miķelsons, U. 2003. Informācijas tehnoloģiju noziegumu izmeklēšanas īpatnības. Rīga: Biznesa augstskola "Turība" (akceptējams izdevums)

11.

Kiberdrošība. Pieejams tiešsaistē

Additional Reading

1.

Latvijas Republikas Satversme. Latvijas Republikas likums. Latvijas Vēstnesis, 43, 01.07.1993.

2.

Elektronisko sakaru likums. Latvijas Republikas likums. Latvijas Vēstnesis, 144, 28.07.2022.

3.

Fizisko personu datu apstrādes likums. Latvijas Republikas likums. Latvijas Vēstnesis, 132, 04.07.2018.

4.

Krimināllikums. Latvijas Republikas likums. Latvijas Vēstnesis, 199/200, 08.07.1998.

5.

Kriminālprocesa likums. Latvijas Republikas likums. Latvijas Vēstnesis, 74, 11.05.2005.

Other Information Sources

1.

ENISA (European Union Agency for Cybersecurity) - Eiropas Savenības Kiberdrošības aģentūra