- Degrees & Programs
- Student Activities
- Career Services
Course Code: LSTD517 Course ID: 4490 Credit Hours: 3 Level: Graduate
This course focuses on the ways that law, ethics and cybersecurity overlap and intersect. Besides laws related to cybersecurity, the course examines laws related to intellectual property, civil litigation, criminal prosecutions, and privacy. This examination will provide the means to identify and analyze the policies reflected in those laws. Those policies could guide the creation of policies on a business-level, using qualitative risk assessment and planning. An exploration of ethics and cybersecurity, as well as of workplace ethics, will involve the use of an ethical framework.
|Registration Dates||Course Dates||Session||Weeks|
|03/30/20 - 09/04/20||09/07/20 - 11/01/20||Summer 2020 Session D||8 Week session|
|04/27/20 - 10/02/20||10/05/20 - 11/29/20||Fall 2020 Session B||8 Week session|
|05/25/20 - 10/30/20||11/02/20 - 12/27/20||Fall 2020 Session I||8 Week session|
|06/29/20 - 12/04/20||12/07/20 - 01/31/21||Fall 2020 Session D||8 Week session|
|07/27/20 - 01/01/21||01/04/21 - 02/28/21||Winter 2021 Session B||8 Week session|
|09/28/20 - 02/26/21||03/01/21 - 04/25/21||Winter 2021 Session D||8 Week session|
After completing this course the Student will be able to:
Apply general principles of law and ethics to cybersecurity matters;
Integrate laws and ethical rules within cybersecurity contexts;
Differentiate among the social and political factors influencing the research of cybersecurity-related law and ethics;
Critique a cybersecurity-related legal or ethical position, especially within the context of how the situation may affect the general public;
Propose novel amendments to existing laws and policies to better address future cybersecurity-related issues; and
Reflect on what he or she has learned.
Contact between students and instructor can occur by in-class Messages or telephone. However, the best way to reach your instructor is via Messages. Do not use the mycampus email for any correspondence with me about the class. I will copy your personal emails into the course when I answer your questions to make sure you receive my Messages. I expect you to check your classroom messages frequently, and I also expect you to respond back to my messages using the in-class Message tool. If you have questions about this, please ask.
The number of these contacts may vary according to the specific course and individual student need. FOR ALL MESSAGES, PLEASE PUT YOUR MESSAGE’S SUBJECT IN THE SUBJECT HEADING. If you have not received a response from me within 48 hours, please follow up, as the message may not have been received.
If you want to contact me telephonically, you may do so by scheduling a time for such. Simply send me an in-class Message, tell me that you would like to talk with me, and offer me two or three dates/times so that we can make it work for both of us as conveniently as possible.
This course includes nine (9) Forum discussions.
Questions and topics posed in the Forums are designed to promote thought and insight. Students must provide a critical review of the questions, topics and issues posed and substantively reply to the contributions of at least three peers. Individual postings should include a full discussion of the content of the question posed and explain how it relates to the concepts in the weekly text readings and other resources. The postings should be analytic in nature and include comparisons/contrasts, and examples that can bolster your point. The Forum is for your benefit and it is important to respond to the discussion topic and to engage others in a running dialogue.
Your initial post should be made by Thursday each week. You should then respond to 3 or more posts. Note that at least one response to your classmates must be made before Sunday. If you make all of your responsive posts on Sunday, you will not earn full points for timeliness.
This can be accomplished by
· Validating with additional evidence from the literature.
· Posing a thoughtful question with commentary which generates further discussion.
· Providing an alternative point-of-view, with evidence and examples.
· Offering additional insight into how the concept might be understood, with evidence provided with real world examples.
You should be active in the classroom throughout the week and actively engaged in the back-and-forth discussion between your colleagues and the professor.
The Graduate Forum grading rubric will be used for grading your participation; it can be found in gradebook by clicking on the forum entry.
All written submissions are required to be DOUBLE SPACED, in Microsoft Word, with one-inch margins and Times New Roman, 12 point font.
This course includes three (3) written assignments:
· The Research Question;
· The Thesis;
· The Claims or argument;
· The Evidence or supporting facts; and,
· The Conclusion(s).
- find a law review article in the library concerning ethics, privacy law, and cybersecurity;
- use the IRAC method (Issue, Rule, Analysis and Conclusion) to analyze your selected law review article, especially with regard to how the public may be adversely affected by your topic.
- Identification of the current statute or regulation or policy that underlies your selected topic;
- Analysis of the legal and/or ethical challenges to your selected topic;
- Presentation of your new proposed statute or regulation or policy that better addresses the legal and/or ethical challenges to your selected topic, along with an analysis that justifies your proposal (share both pros and cons for your proposal); and
- Summary of all of the above for your conclusion.
|Forum 1||4.88 %|
|Forum 2||4.88 %|
|Forum 3||4.88 %|
|Forum 4||4.88 %|
|Forum 5||4.88 %|
|Forum 6||4.88 %|
|Forum 7||4.88 %|
|Forum 8||4.88 %|
|Article Deconstruction||10.00 %|
|Week 2: Article Deconstruction||10.00 %|
|Week 3 Privacy Law Analysis||20.00 %|
|Writing Assignment||30.00 %|
|Week 7 Legislative Proposal Creation||30.00 %|
Your readings are listed below. However, all readings are available to you in the lessons tab of this classroom under Readings and Resources. Please access all required readings there.
Week 1: Why Professionals Should Care About Cybersecurity
Ryan K. Baggett, Chad S. Foster, & Brian K. Simpkins, Chapter One: Introduction: Technology Securing the Homeland in Homeland Security Technologies for the 21st Century, 1 – 13 (2017), psi.praeger.com.
Ryan K. Baggett, Chad S. Foster, & Brian K. Simpkins, Chapter Two: Ethical and Privacy Implications of Technology in Homeland Security Technologies for the 21st Century, 1 – 19 (2017), psi.praeger.com.
Keren Elazari, Hackers: The Internet’s Immune System, YouTube, (March 2014), https://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system.
Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, & National Research Council, At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, 1 – 134 (2014), https://ebookcentral-proquest-com.ezproxy1.apus.edu/lib/apus/reader.action?docID=3379336.
Cynthia D. Waddell, Understanding the Digital Economy: Data, Tools and Research, The Growing Digital Divide in Access for People With Disabilities: Overcoming Barriers to Participation in the Digital Economy, 1 – 29 (ICDRI, 1999), http://www.icdri.org/CynthiaW/the_digital_divide.htm.
Jan L. Jacobowitz & Justin Ortiz, Happy Birthday Siri! Dialing in Legal Ethics for Artificial Intelligence, Smart Phones, and Real Time Lawyers (January 8, 2018). Texas A&M University Journal of Property Law; University of Miami Legal Studies Research Paper No. 18-2 (2018). Available at https://ssrn.com/abstract=3097985
Gregory Bufithis, Hon. John M. Facciola at the Georgetown Cybersecurity Law Institute, YouTube, https://youtu.be/3STFwbuKOso (July 3, 2013).
MrKilswitch88, Electronic Voting Fruad (sic), YouTube, https://youtu.be/Ts5PftZ1kgg, (October 14, 2012).
Week 2: How to Investigate Cybersecurity Legal and Ethics Issues
Aaron J. Burstein, Conducting Cybersecurity Research Legally and Ethically, (University of California, Berkeley School of Law, 2008), https://www.usenix.org/legacy/event/leet08/tech/full_papers/burstein/burstein_html/.
Ronald Deibert & Masashi Crete-Nishihata, Blurred Boundaries: Probing the Ethics of Cyberspace Research, Review of Policy Research, 531 – 537 (2011), http://web.a.ebscohost.com.ezproxy1.apus.edu/ehost/pdfviewer/pdfviewer?vid=1&sid=62e1ec00-88b5-4d5c-96a8-665594d0c516%40sessionmgr4008.
Neil M. Richards & Jonathan H. King, Big Data Ethics, 49 Wake Forest L. Rev. 393 (2014).
Harold Abelson, Peter A. Diamond, Andrew Grosso, & Douglas W. Pfeiffer (support), Report to the President: MIT and the Prosecution of Aaron Swartz, 1 – 182 (2013), http://swartz-report.mit.edu/docs/report-to-the-president.pdf.
Australian National University, Cybersecurity: Mapping the Ethical Terrain YouTube https://youtu.be/do1G7MwKH1s (2014).
Week 3: Cybersecurity and Civil Law
Alicia Solow-Niederman, Beyond the Privacy Torts: Reinvigorating a Common Law Approach for Data Breaches, 127 Yale L. J. F. 614 (2018). https://www.yalelawjournal.org/pdf/Solow-Niederman_qthw8784.pdf
Josip Car, Woan Shin Tan, Zhilian Huang, Peter Sloot, & Bryony Dean Franklin, eHealth in the Future of Medications Management: Personalisation, Monitoring and Adherence, 15 BMC Medicine 73 (2017).
Tobias Holstein, Gordana Dodig-Crnkovic, & Patrizio Pelliccione, Ethical and Social Aspects of Self-Driving Cars, Computers and Society (2018). https://arxiv.org/pdf/1802.04103.pdf
Dan Zureich & William Graebe, Cybersecurity: The Continuing Evolution of Insurance and Ethics, 82 (2) Defense Counsel Journal 192 (2015)
Janice C. Sipior, Burke T. Ward & Linda Volonino, Privacy Concerns Associated With Smartphone Use, 13 Journal of Internet Commerce 177 (2014).
Gregory T. Nojeim, Cybersecurity and Freedom on the Internet, 4 Nat’l Sec L & Pol’y 119 (2010).
CXOTalk, AI & Privacy Engineering With Michelle Dennedy (Cisco) and David Bray (FCC), YouTube, https://www.youtube.com/watch?v=ThaLKe_W4mI (April 30, 2017).
Week 4: Cybersecurity and Criminal Law
Joshua B. Hill & Nancy E. Marion, Chapter Two: History Of Cybercrime, in Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century (2016). https://psi-praeger-com.ezproxy2.apus.edu/Topics/Display/2058279?cid=138&sid=2057721
Tim K. MacKey & Bryan A. Liang, Pharmaceutical Digital Marketing and Governance: Illicit Actors and Challenges to Global Patient Safety and Public Health, 9 Globalization and Health 45 (2013), https://doi.org/10.1186/1744-8603-9-45
Ira Rubinstein, Privacy Localism (February 15, 2018). NYU School of Law, Public Law Research Paper. https://ssrn.com/abstract=3124697
Graeme Horsman, A Call for the Prohibition of Encryption: Panacea or Problem?, EEEI Security and Privacy Magazine (2018). http://hdl.handle.net/10149/621677
Shaen Corbet & Constantin Gurdgiev. Regulatory Cybercrime: A Hacking-Based Mechanism to Regulate and Supervise Corporate Cyber Governance? (January 23, 2017). https://ssrn.com/abstract=2904749 or http://dx.doi.org/10.2139/ssrn.2904749
Devanch Parikh, Harshvardhan Shani & Piyush Patel, Organized CyberCrime and the State of User Privacy (2017). http://www.ijirst.org/articles/SALLTNCSP035.pdf
Center for Strategic and International Studies, The Economic Impact of Cybercrime, YouTube, https://www.youtube.com/watch?v=VtvYsaXiLQs (February 21, 2018)
Week 5: Securing the Internet of Things (IoT)
Tan Ming Hui & Walid Lemrini, The Fourth Industrial Revolution: An Orwellian Nightmare?, RSIS Commentaries, No. 029. Singapore: Nanyang Technological University (2018). http://hdl.handle.net/10220/44450 (4 pages)
Sara Sun Beale & Peter Berris,.Hacking the Internet of Things: Vulnerabilities, Dangers, and Legal Responses, 16:1 Duke Law & Technology Review 161 (2018).
Miles Brundage et al., The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation (2018). https://arxiv.org/ftp/arxiv/papers/1802/1802.07228.pdf
Emily Gorcenski, The Ethics of the Internet of Things, YouTube, https://www.youtube.com/watch?v=xLL7Fo_em2E (May 14, 2017)
Week 6: Cryptocurrencies
Joanna Diane Caytas. Blockchain in the U.S. Regulatory Setting: Evidentiary Use in Vermont, Delaware, and Elsewhere. The Columbia Science and Technology Law Review. Posted May 30, 2017. http://stlr.org/2017/05/30/blockchain-in-the-u-s-regulatory-setting-evidentiary-use-in-vermont-delaware-and-elsewhere/
Elizabeth S. Ross, Nobody Puts Blockchain in a Corner: The Disruptive Role of Blockchain Technology in the Financial Services Industry and Current Regulatory Issues, 25 (2) Cath. U. J. L. & Tech 353 (2017). http://scholarship.law.edu/jlt/vol25/iss2/7
Mehdi Benchoufi & Philippe Ravaud, Blockchain Technology for Improving Clinical Research Quality, 18 Trials 335 (2017).
Matthew Weeks, Hacks, Exploits, and Ethical Issues in Cryptocurrency, YouTube, https://www.youtube.com/watch?v=k-dmZuMZmm8 (December 11, 2017).
Week 7: Net Neutrality
Alex Chung & Chi Xing, The Ethics of Net Neutrality, http://web.cs.ucdavis.edu/~rogaway/classes/188/fall11/p211.pdf (2017)
Luca Belli & Primavera De Filippi, The Value of Network Neutrality for the Internet of Tomorrow: Report of the Dynamic Coalition on Network Neutrality (2013). https://ssrn.com/abstract=2468534 or http://dx.doi.org/10.2139/ssrn.2468534
David R. Morrow, When Technologies Make Good People Do Bad Things: Another Argument Against the Value-Neutrality of Technologies, 20 Sci Eng Ethics 329 (2014).
Tristan Harris, How a Handful of Tech Companies Control Billions of Minds Every Day, YouTube, https://www.ted.com/talks/tristan_harris_the_manipulative_tricks_tech_companies_use_to_capture_your_attention/transcript?language=en#t-245226 (July 26, 2017).
Week 8: Cyber-related Legislation and Policies
White House, United States of America, National Strategy to Secure Cyberspace, https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=199137 (2003)
Ryan Hagemann, Jennifer Skees, & Adam D. Thierer. Soft Law for Hard Problems: The Governance of Emerging Technologies in an Uncertain Future (February 5, 2018). Forthcoming - Colorado Technology Law Journal https://ssrn.com/abstract=3118539
W. Perry Hicks & Alan J. Ponce, SB 219 – Autonomous Vehicles, 34:1 Georgia State University Law Review 231 (2018). https://readingroom.law.gsu.edu/cgi/viewcontent.cgi?article=2911&=&context=gsulr&=&sei-redir=1&referer=https%253A%252F%252Fscholar.google.com%252Fscholar%253Fstart%253D10%2526q%253Dunited%252Bstates%252Bcybersecurity%252Btort%252Blaw%252Band%252Bethics%2526hl%253Den%2526as_sdt%253D0%252C10%2526as_ylo%253D2018#search=%22united%20states%20cybersecurity%20tort%20law%20ethics%22
Scott Shackelford & Austin Brady, Is it Time for a National Cybersecurity Safety Board? (January 12, 2018). Albany Law Journal of Science and Technology, 2018. https://ssrn.com/abstract=3100962 (18 pages)
Justin Daniels, You Hold The Key to Overcoming Cyber-Threats, YouTube, https://www.youtube.com/watch?v=HvcJntjqVaM (November 14, 2017)
In addition to the required course materials listed above, the following resources (including but not limited to public domain web sites) are useful. Please abide by the university’s academic honesty policy when using Internet sources as well. Note web site addresses are subject to change.
Cybersecurity Program Guide: https://www.apus.edu/apus-library/online-research/research/research-guides/guides-by-program.html
Cyber Security: Action Against Cybercrime: http://www.slideshare.net/bijayguyz/cyber-security-prt
Web Site URL/Address
Cornell Legal Information Institute
Basic Outlining (from the Purdue Online Writing Lab (OWL)
Library of Congress
American Bar Association (ABA)
Purdue Online Writing Lab (OWL)
|Book Title:||Various resources from the APUS Library & the Open Web are used. Please visit http://apus.libguides.com/er.php to locate the course eReserve.*|
Not current for future courses.