This module is a resource for lecturers
Possible class structure
The following is a recommended structure for the class. Students should complete the required readings before coming to class. The lecture is meant to reinforce what they learned in the readings and the exercises are designed to apply what they learned in the readings and the lecture. The following breakdown is designed for a three-hour class. Lecturers are free to adapt the structure based on their needs and class times.
Introduction and learning outcomes
Lecture (10 minutes):
- Provide a brief introduction to the class and its contents
- Identify and discuss the learning outcomes of the class
The basics of computing
Lecture (20 minutes):
- Define and describe the basic concepts relating to computing
Lecturer guidelines:
- If you are using this Module in a law course, we recommend going more in-depth into the technical aspects of computing. Very often legal courses do not have required technical computing classes.
- If you are using this Module in an information security or engineering course, an in-depth technical background is probably not necessary. Instead focus more on applying students' technical knowledge to legal concepts. Do students' definitions of a computer or network match legal definitions?
- Technical and legal reading materials can be found in the " Advanced Reading" section.
Class exercise (20 minutes):
- Have students complete " Exercise # 1: Legal Definitions of Computer, Data and Network" before class and have them discuss their findings during this lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class.
Global connectivity and technology usage trends
Lecture (20 minutes):
- Discuss global connectivity and technology usage trends
Lecturer guidelines:
- Everyone wants fast Internet. Explaining how to speed up Internet access is a great way to engage students. Start the discussion by saying "did you know you can speed up your Internet by changing DNS servers?" This usually gets students' attention. Then you can explain how DNS works at a level appropriate for their background knowledge. Finally, you can show students how to manually change DNS servers on their devices.
[ Note: There are many free, fast DNS servers available. As of February 2019, CloudFlare (1.1.1.1), Google (8.8.8.8), Cloud9 (9.9.9.9), and OpenDNS (208.67.222.222) are available for testing. For more free DNS servers, see here].
Case study discussion (20 minutes):
- Complete " Exercise # 2: Web page load speeds".
[ Optional: Have students complete " Exercise # 3: Internet Penetration Rates" before class and have them discuss their findings during this lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class].
Break
Time: 10 minutes
Cybercrime in brief and cybercrime trends
Lecture (20 minutes):
- Define and discuss cybercrime
- Discuss why cybercrime is scientifically studied
- Evaluate cybercrime trends
[ Optional: Task students to complete " Homework # 2: Were Any Cybercrimes Not Covered?" under the "Student Assessment" section of this Module before class and have them discuss their findings during this lecture and/or any of the lectures afterwards. You can ask the students the question in this exercise here and/or in any (or all) of the sessions below. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class].
Technical, legal, ethical and operational challenges
Lecture (30 minutes):
- Recognize and analyse the technical, legal, ethical and operational challenges relating to cybercrime and cybercrime prevention
Class Exercise (20 minutes):
- Assign students to complete " Exercise # 4: Data Breach Investigation" before class and have them discuss their findings during this lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class.
Cybercrime Prevention
Lecture (10 minutes):
- Discuss cybercrime prevention.
Next: Core reading
Back to top