Your readings are listed below. However, all readings are available to you in the lessons tab of this classroom under Readings and Resources. Please access all required readings there.
Week 1: Why Professionals Should Care About Cybersecurity
Ryan K. Baggett, Chad S. Foster, & Brian K. Simpkins, Chapter One: Introduction: Technology Securing the Homeland in Homeland Security Technologies for the 21st Century, 1 – 13 (2017), psi.praeger.com.
Ryan K. Baggett, Chad S. Foster, & Brian K. Simpkins, Chapter Two: Ethical and Privacy Implications of Technology in Homeland Security Technologies for the 21st Century, 1 – 19 (2017), psi.praeger.com.
Keren Elazari, Hackers: The Internet’s Immune System, YouTube, (March 2014), https://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system.
Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, & National Research Council, At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, 1 – 134 (2014), https://ebookcentral-proquest-com.ezproxy1.apus.edu/lib/apus/reader.action?docID=3379336.
Cynthia D. Waddell, Understanding the Digital Economy: Data, Tools and Research, The Growing Digital Divide in Access for People With Disabilities: Overcoming Barriers to Participation in the Digital Economy, 1 – 29 (ICDRI, 1999), http://www.icdri.org/CynthiaW/the_digital_divide.htm.
Jan L. Jacobowitz & Justin Ortiz, Happy Birthday Siri! Dialing in Legal Ethics for Artificial Intelligence, Smart Phones, and Real Time Lawyers (January 8, 2018). Texas A&M University Journal of Property Law; University of Miami Legal Studies Research Paper No. 18-2 (2018). Available at https://ssrn.com/abstract=3097985
Gregory Bufithis, Hon. John M. Facciola at the Georgetown Cybersecurity Law Institute, YouTube, https://youtu.be/3STFwbuKOso (July 3, 2013).
MrKilswitch88, Electronic Voting Fruad (sic), YouTube, https://youtu.be/Ts5PftZ1kgg, (October 14, 2012).
Week 2: How to Investigate Cybersecurity Legal and Ethics Issues
Aaron J. Burstein, Conducting Cybersecurity Research Legally and Ethically, (University of California, Berkeley School of Law, 2008), https://www.usenix.org/legacy/event/leet08/tech/full_papers/burstein/burstein_html/.
Ronald Deibert & Masashi Crete-Nishihata, Blurred Boundaries: Probing the Ethics of Cyberspace Research, Review of Policy Research, 531 – 537 (2011), http://web.a.ebscohost.com.ezproxy1.apus.edu/ehost/pdfviewer/pdfviewer?vid=1&sid=62e1ec00-88b5-4d5c-96a8-665594d0c516%40sessionmgr4008.
Neil M. Richards & Jonathan H. King, Big Data Ethics, 49 Wake Forest L. Rev. 393 (2014).
Harold Abelson, Peter A. Diamond, Andrew Grosso, & Douglas W. Pfeiffer (support), Report to the President: MIT and the Prosecution of Aaron Swartz, 1 – 182 (2013), http://swartz-report.mit.edu/docs/report-to-the-president.pdf.
Australian National University, Cybersecurity: Mapping the Ethical Terrain YouTube https://youtu.be/do1G7MwKH1s (2014).
Week 3: Cybersecurity and Civil Law
Alicia Solow-Niederman, Beyond the Privacy Torts: Reinvigorating a Common Law Approach for Data Breaches, 127 Yale L. J. F. 614 (2018). https://www.yalelawjournal.org/pdf/Solow-Niederman_qthw8784.pdf
Josip Car, Woan Shin Tan, Zhilian Huang, Peter Sloot, & Bryony Dean Franklin, eHealth in the Future of Medications Management: Personalisation, Monitoring and Adherence, 15 BMC Medicine 73 (2017).
Tobias Holstein, Gordana Dodig-Crnkovic, & Patrizio Pelliccione, Ethical and Social Aspects of Self-Driving Cars, Computers and Society (2018). https://arxiv.org/pdf/1802.04103.pdf
Dan Zureich & William Graebe, Cybersecurity: The Continuing Evolution of Insurance and Ethics, 82 (2) Defense Counsel Journal 192 (2015)
Janice C. Sipior, Burke T. Ward & Linda Volonino, Privacy Concerns Associated With Smartphone Use, 13 Journal of Internet Commerce 177 (2014).
Gregory T. Nojeim, Cybersecurity and Freedom on the Internet, 4 Nat’l Sec L & Pol’y 119 (2010).
CXOTalk, AI & Privacy Engineering With Michelle Dennedy (Cisco) and David Bray (FCC), YouTube, https://www.youtube.com/watch?v=ThaLKe_W4mI (April 30, 2017).
Week 4: Cybersecurity and Criminal Law
Joshua B. Hill & Nancy E. Marion, Chapter Two: History Of Cybercrime, in Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century (2016). https://psi-praeger-com.ezproxy2.apus.edu/Topics/Display/2058279?cid=138&sid=2057721
Tim K. MacKey & Bryan A. Liang, Pharmaceutical Digital Marketing and Governance: Illicit Actors and Challenges to Global Patient Safety and Public Health, 9 Globalization and Health 45 (2013), https://doi.org/10.1186/1744-8603-9-45
Ira Rubinstein, Privacy Localism (February 15, 2018). NYU School of Law, Public Law Research Paper. https://ssrn.com/abstract=3124697
Graeme Horsman, A Call for the Prohibition of Encryption: Panacea or Problem?, EEEI Security and Privacy Magazine (2018). http://hdl.handle.net/10149/621677
Shaen Corbet & Constantin Gurdgiev. Regulatory Cybercrime: A Hacking-Based Mechanism to Regulate and Supervise Corporate Cyber Governance? (January 23, 2017). https://ssrn.com/abstract=2904749 or http://dx.doi.org/10.2139/ssrn.2904749
Devanch Parikh, Harshvardhan Shani & Piyush Patel, Organized CyberCrime and the State of User Privacy (2017). http://www.ijirst.org/articles/SALLTNCSP035.pdf
Center for Strategic and International Studies, The Economic Impact of Cybercrime, YouTube, https://www.youtube.com/watch?v=VtvYsaXiLQs (February 21, 2018)
Week 5: Securing the Internet of Things (IoT)
Tan Ming Hui & Walid Lemrini, The Fourth Industrial Revolution: An Orwellian Nightmare?, RSIS Commentaries, No. 029. Singapore: Nanyang Technological University (2018). http://hdl.handle.net/10220/44450 (4 pages)
Sara Sun Beale & Peter Berris,.Hacking the Internet of Things: Vulnerabilities, Dangers, and Legal Responses, 16:1 Duke Law & Technology Review 161 (2018).
Miles Brundage et al., The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation (2018). https://arxiv.org/ftp/arxiv/papers/1802/1802.07228.pdf
Emily Gorcenski, The Ethics of the Internet of Things, YouTube, https://www.youtube.com/watch?v=xLL7Fo_em2E (May 14, 2017)
Week 6: Cryptocurrencies
Joanna Diane Caytas. Blockchain in the U.S. Regulatory Setting: Evidentiary Use in Vermont, Delaware, and Elsewhere. The Columbia Science and Technology Law Review. Posted May 30, 2017. http://stlr.org/2017/05/30/blockchain-in-the-u-s-regulatory-setting-evidentiary-use-in-vermont-delaware-and-elsewhere/
Elizabeth S. Ross, Nobody Puts Blockchain in a Corner: The Disruptive Role of Blockchain Technology in the Financial Services Industry and Current Regulatory Issues, 25 (2) Cath. U. J. L. & Tech 353 (2017). http://scholarship.law.edu/jlt/vol25/iss2/7
Mehdi Benchoufi & Philippe Ravaud, Blockchain Technology for Improving Clinical Research Quality, 18 Trials 335 (2017).
Matthew Weeks, Hacks, Exploits, and Ethical Issues in Cryptocurrency, YouTube, https://www.youtube.com/watch?v=k-dmZuMZmm8 (December 11, 2017).
Week 7: Net Neutrality
Alex Chung & Chi Xing, The Ethics of Net Neutrality, http://web.cs.ucdavis.edu/~rogaway/classes/188/fall11/p211.pdf (2017)
Luca Belli & Primavera De Filippi, The Value of Network Neutrality for the Internet of Tomorrow: Report of the Dynamic Coalition on Network Neutrality (2013). https://ssrn.com/abstract=2468534 or http://dx.doi.org/10.2139/ssrn.2468534
David R. Morrow, When Technologies Make Good People Do Bad Things: Another Argument Against the Value-Neutrality of Technologies, 20 Sci Eng Ethics 329 (2014).
Tristan Harris, How a Handful of Tech Companies Control Billions of Minds Every Day, YouTube, https://www.ted.com/talks/tristan_harris_the_manipulative_tricks_tech_companies_use_to_capture_your_attention/transcript?language=en#t-245226 (July 26, 2017).
Week 8: Cyber-related Legislation and Policies
White House, United States of America, National Strategy to Secure Cyberspace, https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=199137 (2003)
Ryan Hagemann, Jennifer Skees, & Adam D. Thierer. Soft Law for Hard Problems: The Governance of Emerging Technologies in an Uncertain Future (February 5, 2018). Forthcoming - Colorado Technology Law Journal https://ssrn.com/abstract=3118539
W. Perry Hicks & Alan J. Ponce, SB 219 – Autonomous Vehicles, 34:1 Georgia State University Law Review 231 (2018). https://readingroom.law.gsu.edu/cgi/viewcontent.cgi?article=2911&=&context=gsulr&=&sei-redir=1&referer=https%253A%252F%252Fscholar.google.com%252Fscholar%253Fstart%253D10%2526q%253Dunited%252Bstates%252Bcybersecurity%252Btort%252Blaw%252Band%252Bethics%2526hl%253Den%2526as_sdt%253D0%252C10%2526as_ylo%253D2018#search=%22united%20states%20cybersecurity%20tort%20law%20ethics%22
Scott Shackelford & Austin Brady, Is it Time for a National Cybersecurity Safety Board? (January 12, 2018). Albany Law Journal of Science and Technology, 2018. https://ssrn.com/abstract=3100962 (18 pages)
Justin Daniels, You Hold The Key to Overcoming Cyber-Threats, YouTube, https://www.youtube.com/watch?v=HvcJntjqVaM (November 14, 2017)
In addition to the required course materials listed above, the following resources (including but not limited to public domain web sites) are useful. Please abide by the university’s academic honesty policy when using Internet sources as well. Note web site addresses are subject to change.
Cybersecurity Program Guide: https://www.apus.edu/apus-library/online-research/research/research-guides/guides-by-program.html
Cyber Security: Action Against Cybercrime: http://www.slideshare.net/bijayguyz/cyber-security-prt