Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Identify, analyze and evaluate the legal and policy tools available to affect conduct in cyberspace.
  2. Articulate and defend what type of law (Constitutional, statutory, regulatory, international, and common) is best suited for addressing each of several cyber-security challenges (such as protection of critical infrastructure, privacy, data integrity, formulation of new rules, enforcement mechanism, etc.). 
  3. Explain the nature of the internet, information systems, cyberspace vulnerabilities, exploits and incident response techniques and methods and how they both affect and are affected by law and policy. 
  4. Summarize, evaluate and criticize multi-stakeholder governance. 
  5. Evaluate the role of lawyers, courts, and policy makers in cyberspace. 
  6. Name, explain and analyze the Fourth Amendment and various privacy statutes.

  7. Explain, apply, and criticize International Humanitarian Law’s impact in cyberspace. 

  8. Argue in a debate format. 
  9. Collaborate with other students to research facts and law and to formulate arguments for the debate. 
  10. Write two papers, each of which must make a proposal such as a policy, a change in the law, a change in technology or operational practice, or some other recommendation. 
  11. Identify, summarize, examine, and apply the material in the course and gleaned from independent research to construct, appraise and defend the proposals in the two papers. 

Course Syllabus

IST 728/LAW 832 Fall 2020 2021 Syllabus- McKnight, Lee; Perrin, Keli

...

Other iSchool Courses

Child pages (Children Display)
alltrue
pageiSchool Graduate Courses

...