Cybersecurity and International Cooperation
Study Course Implementer
Dzirciema street 16, Rīga, szf@rsu.lv
About Study Course
Objective
Preliminary Knowledge
Learning Outcomes
Knowledge
1.Students will have a deep understanding of crimes connected with cyber attacks. They will possess a practical skills in evaluating and solving problems relating to the cyber – threats. Finally they will have experience working collaboratively with others in order to develop methods of protection against cyber threats.
Skills
1.Students develop a range of essential skills, including critical thinking, problem-solving, gathering of information, interpersonal skills and technological proficiency. By developing these skills, students will be ready to solve problems in connection with crimes of cyber nature.
Competences
1.This course aims to develop a range of competencies essential for elaborating methods again crimes of cyber nature. Students will be well-prepared to take on leadership in order to prevent crimes of the cyber nature.
Assessment
Individual work
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Individual work |
-
|
-
|
|
1. Attendance of seminars and lectures – mandatory, 20% (the lecturer evaluates the student's participation and activity in lectures and seminars).
2. Permanent work (group work/synopsis/analysis) and presentation – mandatory, 30% (the lecturer evaluates the student's skills: to keep the audience's attention, the ability to find and select viable innovative ideas, to discuss the latest trends in the context of the study course topics).
3. Development of summaries – mandatory, 20% (the lecturer assesses the student's ability to independently obtain, select and analyse information in the context of the study course).
4. Examination – mandatory, 30% (the lecturer assesses the student's knowledge and understanding in the context of the study course topics).
|
||
Examination
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Examination |
-
|
-
|
|
This course requires active participation in lectures, workshops, completion of assigned readings and presentation of the final project by group of students (Case study about cybersecurity and recommendations to ensure security from cyberattacks). The final grade will be calculated on the basis of activity during the lectures and workshops and the final project presentation.
|
||
Study Course Theme Plan
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Introduction to the Cyberspace.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
The essence of the cybersecurity.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Types of the cybercrimes. Case studies during the workshop.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Types of the cybercrimes. Case studies during the workshop.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Digital proves. Case studies during the workshop.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Digital proves. Case studies during the workshop.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Digital proves. Case studies during the workshop.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Digital proves. Case studies during the workshop.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cybersecurity policies and the fundamental rights.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Cybersecurity policies and the fundamental rights.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Usage of open sources in the cyberspace. Case studies during the workshop.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Usage of open sources in the cyberspace. Case studies during the workshop.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
International cooperation to combat cybercrimes.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
International cooperation to combat cybercrimes.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Presentation of the final project by groups of students.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Presentation of the final project by groups of students.
|
Bibliography
Required Reading
Brewer Russell, De Vel-Palumbo Melissa, Hutchings Alice, Holt Thomas. (2019). Cybercrime Prevention: Theory and Applications (Crime Prevention and Security Management). 1st ed.
Convention on Cybercrime. Explanatory Reports and Guidance Notes. (2023). Council of Europe.
Cruz-Cunha Maria Manuaela, Mateus-Coelho Nuno. (2022). Handbook of Research on Cyber Crime and Information Privacy. 2 Volumes. IGI Global.
Foresight Cybersecurity Threats For 2030 - Update 2024: Executive Summary. (2024). European Union Agency for Cybersecurity.
Tosoni Luca. (2018). Rethinking Privacy in the Council of Europe`s Convention on Cybercrime. Computer law & Security law 34 (6). Elsevier ScienceDirect
Stoddart Kristian. (2022). Cyberwarfare. Threats to Critical Infrastructure. Palgrave Macmillian.
Thomas J. Holt, Adam M. Bossler, Palgrave Macmillan Cham (Eds). (2020). The Palgrave Handbook of International Cybercrime and Cyberdeviance. E-grāmata.
Additional Reading
Stohl, M. (2019) The Politics of Cybersecurity: How states and security experts understand, perform and discuss security in the digital age. Routledge, Oxfordshire.