This module is a resource for lecturers
Possible class structure
The following is a recommended structure for the class. Students should complete the required readings before coming to class. The lecture is meant to reinforce what they learned in the readings and the exercises are designed to apply what they learned in the readings and the lecture. The following breakdown is designed for a three-hour class. Lecturers can adapt the structure based on their needs and class times.
Introduction and learning outcomes
Lecture (10 minutes):
- Provide a brief introduction to the class and its contents
- Identify and discuss the learning outcomes of the class
Hacktivism
Lecture (30 minutes):
- Discuss hacktivism, the manner in which it is perpetrated, and responses to hacktivism
Ask students to complete "Homework #1: Hacktivism" and discuss their findings in class. [*Reminder: This exercise needs to be completed before class].
Cyberespionage
Lecture (30 minutes):
- Discuss cyberespionage, the manner in which it is perpetrated, and responses to cyberespionage
Ask students to complete "Homework # 2: Cyberespionage" and discuss their findings in class. [*Reminder: This exercise needs to be completed before class].
Break
Time: 10 minutes
Cyberterrorism
Lecture (30 minutes):
- Discuss cyberterrorism, the manner in which it is perpetrated, and responses to cyberterrorism
Ask students to do "Homework # 3: Group Exercise ~ Cyberterrorism Laws" and use the questions in the group exercise to facilitate a discussion on the topic. [*Reminder: This exercise needs to be completed before class].
Have students complete "Exercise # 2 - A Case of Cyberterrorism?" before class and discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].
[ Optional: Have students complete "Homework # 4: Which Incident is Considered Cyberterrorism According to National Law?" before class and have them discuss their findings during the lecture].
Cyberwarfare
Lecture (20 minutes):
- Discuss cyberwarfare, the manner in which it is perpetrated, and responses to cyberwarfare
- Discuss just war principles and their application to cyberwarfare
[ Optional: Have students complete "Exercise # 1 - What Political Cybercrime Is It?" before class and have them discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class].
Information Warfare, Disinformation, and Electoral Fraud
Lecture (30 minutes):
- Discuss information warfare, disinformation, and electoral fraud, the manner in which these are perpetrated online, and responses to them
Have students complete "Exercise # 4 - Fake News" before class and have them discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].
[ Optional: Ask students to complete the assignment of "Homework # 5: Disinformation and Fake News" and discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class].
Responses to Cyberintervention as Prescribed by International Law
Lecture (20 minutes):
- Discuss responses to cyberinterventions that are in accordance with international law
[ Optional: Have students complete "Exercise # 3 - Responses to Political Cybercrime" before class and have them discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class].
Next: Core reading
Back to top