Veidlapa Nr. M-3 (8)
Study Course Description

Cybersecurity and International Cooperation

Main Study Course Information

Course Code
SZF_158
Branch of Science
Law
ECTS
4.00
Target Audience
Civil and Military Defense; Juridical Science
LQF
Level 7
Study Type And Form
Full-Time

Study Course Implementer

Course Supervisor
Structure Unit Manager
Structural Unit
Faculty of Social Sciences
Contacts

Dzirciema street 16, Rīga, szf@rsu.lv

About Study Course

Objective

Study course aims to develop skills to manage tools for prevention of cyber crimes and cooperation in countering cyber threats. It provides look inside of the specifics of modern crimes of cyber nature, relevant criminal procedure concepts and their connection with the principles of fundamental rights and fosters critical thinking and problem-solving skills essential for elimination of the crims of the cyber nature.

Preliminary Knowledge

Study Course "Crimes of a Hybrid Nature and Prevention of Hybrid Threats".

Learning Outcomes

Knowledge

1.Students will have a deep understanding of crimes connected with cyber attacks. They will possess a practical skills in evaluating and solving problems relating to the cyber – threats. Finally they will have experience working collaboratively with others in order to develop methods of protection against cyber threats.

Skills

1.Students develop a range of essential skills, including critical thinking, problem-solving, gathering of information, interpersonal skills and technological proficiency. By developing these skills, students will be ready to solve problems in connection with crimes of cyber nature.

Competences

1.This course aims to develop a range of competencies essential for elaborating methods again crimes of cyber nature. Students will be well-prepared to take on leadership in order to prevent crimes of the cyber nature.

Assessment

Individual work

Title
% from total grade
Grade
1.

Individual work

-
-
1. Attendance of seminars and lectures – mandatory, 20% (the lecturer evaluates the student's participation and activity in lectures and seminars). 2. Permanent work (group work/synopsis/analysis) and presentation – mandatory, 30% (the lecturer evaluates the student's skills: to keep the audience's attention, the ability to find and select viable innovative ideas, to discuss the latest trends in the context of the study course topics). 3. Development of summaries – mandatory, 20% (the lecturer assesses the student's ability to independently obtain, select and analyse information in the context of the study course). 4. Examination – mandatory, 30% (the lecturer assesses the student's knowledge and understanding in the context of the study course topics).

Examination

Title
% from total grade
Grade
1.

Examination

-
-
This course requires active participation in lectures, workshops, completion of assigned readings and presentation of the final project by group of students (Case study about cybersecurity and recommendations to ensure security from cyberattacks). The final grade will be calculated on the basis of activity during the lectures and workshops and the final project presentation.

Study Course Theme Plan

FULL-TIME
Part 1
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Introduction to the Cyberspace.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

The essence of the cybersecurity.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Types of the cybercrimes. Case studies during the workshop.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Types of the cybercrimes. Case studies during the workshop.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Digital proves. Case studies during the workshop.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Digital proves. Case studies during the workshop.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Digital proves. Case studies during the workshop.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Digital proves. Case studies during the workshop.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cybersecurity policies and the fundamental rights.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Cybersecurity policies and the fundamental rights.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Usage of open sources in the cyberspace. Case studies during the workshop.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Usage of open sources in the cyberspace. Case studies during the workshop.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

International cooperation to combat cybercrimes.
  1. Lecture

Modality
Location
Contact hours
On site
Auditorium
2

Topics

International cooperation to combat cybercrimes.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Presentation of the final project by groups of students.
  1. Class/Seminar

Modality
Location
Contact hours
On site
Auditorium
2

Topics

Presentation of the final project by groups of students.
Total ECTS (Creditpoints):
4.00
Contact hours:
32 Academic Hours
Final Examination:
Exam

Bibliography

Required Reading

1.

Brewer Russell, De Vel-Palumbo Melissa, Hutchings Alice, Holt Thomas. (2019). Cybercrime Prevention: Theory and Applications (Crime Prevention and Security Management). 1st ed.

2.

Convention on Cybercrime. Explanatory Reports and Guidance Notes. (2023). Council of Europe.

3.

Cruz-Cunha Maria Manuaela, Mateus-Coelho Nuno. (2022). Handbook of Research on Cyber Crime and Information Privacy. 2 Volumes. IGI Global.

4.

Foresight Cybersecurity Threats For 2030 - Update 2024: Executive Summary. (2024). European Union Agency for Cybersecurity.

5.

High tech crime. (2024). Europol.

6.

Tosoni Luca. (2018). Rethinking Privacy in the Council of Europe`s Convention on Cybercrime. Computer law & Security law 34 (6). Elsevier ScienceDirect

7.

Stoddart Kristian. (2022). Cyberwarfare. Threats to Critical Infrastructure. Palgrave Macmillian.

8.

Thomas J. Holt, Adam M. Bossler, Palgrave Macmillan Cham (Eds). (2020). The Palgrave Handbook of International Cybercrime and Cyberdeviance. E-grāmata.

Additional Reading

1.

Stohl, M. (2019) The Politics of Cybersecurity: How states and security experts understand, perform and discuss security in the digital age. Routledge, Oxfordshire.

2.

Weimann, G. (2015). Terrorism in cyberspace: the next generation. Woodrow Wilson Center Press.

Other Information Sources

1.

EUROPOL. Cybercrime

2.

ENISA - an agency of the European Union.