Prevention and Solving of Cybercrime
Study Course Implementer
Dzirciema street 16, Rīga, szf@rsu.lv
About Study Course
Objective
Preliminary Knowledge
Learning Outcomes
Knowledge
1.Upon successful completion of the study course, students: - are familiar with international and national laws and regulations in the field of cybersecurity and combating cybercrime; - analyse legal norms that regulate economic and financial cybercrimes and security of information systems and are able to apply them practically; - integrate the obtained knowledge and contribute to the creation of new knowledge.
Skills
1.Upon successful completion of the study course, students: - critically analyse specific situations in case of cyberthreats and propose solutions by applying the provisions of the Criminal Law and the Criminal Procedure Law, ensuring the security of information systems; - identify cyberthreats, cyberincidents and crimes in the digital environment; - obtain and use digital evidence.
Competences
1.Upon successful completion of the study course, students: - identify economic and financial cybercrime, are able to use them practically, managing the investigation process; - independently analyse the state of economic-financial crime in the cyberspace, identify its trends and determining factors and develop the most optimal methods to prevent economic-financial crime in the digital environment; - conduct research in the field of studying cybercrime; - are competent in investigating economic crime, working with evidence gathered in the digital environment, and advising investigators who use other methods of gathering evidence; - creatively and constructively justify their opinion.
Assessment
Individual work
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Individual work |
-
|
-
|
|
1) Case solving.
During the classes, students are divided into groups, each group analysing a case, analysing and studying the elements of offence and cases. Students present a cybercrime case study, discuss colleagues’ presentations and answer colleagues’ questions about their group’s presentation.
2) A paper or project.
The student prepares a paper (up to 25,000 characters) on a crime in the field of economics and information and communication technologies, critically analysing a specific situation and related legal provisions, as well as proposing possible tactics and methods for the prevention and solving of the crime.
3) Examination.
At the end of the course, the student completes an electronic test in the e-learning environment on the topics covered in the study course.
In order to evaluate the quality of the study course as a whole, the student must fill out the study course evaluation questionnaire on the Student Portal.
|
||
Examination
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Examination |
-
|
-
|
|
Activity during class - 20%;
Paper/project - 30%;
Exam (test) - 50%.
|
||
Study Course Theme Plan
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cybercrime prevention measures and cybersecurity
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cybercrimes in the field of economics and finance
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Open-source intelligence in the cyberspace.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
The concept and nature of cybersecurity. Cybersecurity management models.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Organised cybercrime. Human trafficking and drug trafficking and migrant smuggling in cyberspace
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Investigation planning and initial investigative actions to solve cybercrime.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Open-source intelligence in the cyberspace.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
International cooperation in solving cybercrime.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cybersecurity threats – characteristics and trends.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Types, composition and characteristics of cybercrime. Cybercriminality.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Organised cybercrime. Human trafficking and drug trafficking and migrant smuggling in cyberspace
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
The concept and nature of cybersecurity. Cybersecurity management models.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cybersecurity and cybercrime prevention policies, strategies and programmes
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cybersecurity threats – characteristics and trends.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
International cooperation in solving cybercrime.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Open-source intelligence in the cyberspace.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Intellectual property crime using cybertechnologies
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Types, composition and characteristics of cybercrime. Cybercriminality.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cybercrime against individuals. Privacy and data protection
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Identification (detection) of cybercrime. Aspects of digital forensics. Digital evidence: concept, understanding, types, acquisition and procedural fixation
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Introduction to the study course. The nature and understanding of cyberspace
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cybercrime prevention measures and cybersecurity
|
Bibliography
Required Reading
Ķinis, U. 2015. Kibernoziedzība, kibernoziegumi un jurisdikcija. Rīga: Jumava
Informācijas sabiedrības tiesību pamati. 2022. U.Ķiņa zinātniskajā redakcijā. Rīga: Rīgas Stradiņa universitāte
Konvencija par kibernoziegumiem. Starptautisks dokuments. Latvijas Vēstnesis, 171, 26.10.2006. (akceptējams izdevums)
Ķinis, U. 2013. Jurisdikcija un kibernoziegumi. Rīga: Jumava
The Palgrave Handbook of International Cybercrime and Cyberdeviance. 2020. edit. Thomas J. Holt, Adam M. Bossler, Palgrave Macmillan Cham
Šmits, E., Koens, D. 2017. Jaunais digitālais laikmets. Kā nākotnē mainīsies mūsu dzīve, valsts un bizness. Rīga; Zvaigzne ABC
Berezins, A. 2014. Svešu un viltotu maksājumu karšu izmantošanas izmeklēšana: teorētiskie un metodiskie aspekti. Promocijas darbs. Rīga: LU
Miķelsons, U. 2003. Informācijas tehnoloģiju noziegumu izmeklēšanas īpatnības. Rīga: Biznesa augstskola "Turība" (akceptējams izdevums)
Additional Reading
Latvijas Republikas Satversme. Latvijas Republikas likums. Latvijas Vēstnesis, 43, 01.07.1993.
Fizisko personu datu apstrādes likums. Latvijas Republikas likums. Latvijas Vēstnesis, 132, 04.07.2018.
Krimināllikums. Latvijas Republikas likums. Latvijas Vēstnesis, 199/200, 08.07.1998.
Kriminālprocesa likums. Latvijas Republikas likums. Latvijas Vēstnesis, 74, 11.05.2005.
Other Information Sources
ENISA (European Union Agency for Cybersecurity) - Eiropas Savenības Kiberdrošības aģentūra