Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Criminal Law (8)
- Internet Law (4)
- Arts and Humanities (2)
- Business (2)
- Business Analytics (2)
-
- Computer Engineering (2)
- Computer Law (2)
- Computer and Systems Architecture (2)
- Digital Communications and Networking (2)
- Engineering (2)
- Ethics and Political Philosophy (2)
- Fourth Amendment (2)
- Intellectual Property Law (2)
- Law and Society (2)
- Philosophy (2)
- Privacy Law (2)
- Robotics (2)
- Science and Technology Studies (2)
- Social and Behavioral Sciences (2)
- Business Law, Public Responsibility, and Ethics (1)
- Business Organizations Law (1)
- Communication (1)
- Communication Technology and New Media (1)
- Communications Law (1)
- Consumer Protection Law (1)
- Data Storage Systems (1)
- E-Commerce (1)
- Education (1)
- Educational Technology (1)
- Keyword
-
- Public interest technology (6)
- Cybercrime (5)
- Cybersecurity (5)
- Criminal law (2)
- Privacy (2)
-
- Tech policy (2)
- Artificial intelligence (1)
- Business law (1)
- Business organization forms (1)
- Content moderation (1)
- Corporate espionage (1)
- Cybercrime cyber security public interest technology (1)
- Cybersecurity; cybercrime; criminal law; identity theft; public interest technology (1)
- Dark web (1)
- Data for good (1)
- Deepfake (1)
- Ethics (1)
- Fake news (1)
- Federal law enforcement (1)
- Information policy (1)
- Law enforcement (1)
- Legislation (1)
- Security cameras (1)
- Social media groups (1)
- Syllabus; cybersecurity; criminal law; law enforcement; public interest technology (1)
- Tech ethics (1)
- Technology and the fourth amendment (1)
- The internet of things (1)
Articles 1 - 11 of 11
Full-Text Articles in Law
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.
Syllabus For Issues In Law Enforcement: Cybersecurity And Public Interest Technology, Amy J. Ramson
Syllabus For Issues In Law Enforcement: Cybersecurity And Public Interest Technology, Amy J. Ramson
Open Educational Resources
This is a syllabus for a course in Issues in Law Enforcement. The curriculum is a public interest technology course in cybersecurity. Principally, the federal government handles cybersecurity investigations along with some state governments and the FBI acts as the center for all cybersecurity complaints.
The course expands beyond law enforcement and provides a comprehensive background to the field through the following presentations: a history of cybersecurity; an explanation of the Internet; an introduction to cybercrime and cybersecurity techniques; the legal environment, which includes a survey of law enforcement and prosecution departments and agencies, and federal and NY state criminal, …
How To Choose The Right Business Organization Form, Anjelica Cappellino
How To Choose The Right Business Organization Form, Anjelica Cappellino
Open Educational Resources
No abstract provided.
Cybersecurity-The Internet Of Things, Amy J. Ramson
Cybersecurity-The Internet Of Things, Amy J. Ramson
Open Educational Resources
With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.
Cybersecurity-Corporate Espionage, Amy J. Ramson
Cybersecurity-Corporate Espionage, Amy J. Ramson
Open Educational Resources
The goals of this team activity in the area of criminal law, cybersecurity and cyber crime are to facilitate team work, critical thinking and presentation skills. Students will be grouped into two teams. As a team, they will analyze cases about corporate espionage committed by nation states and industry competitors through the questions presented in the activity. They will present their analysis to the class.
Cybersecurity-Fake News, Amy J. Ramson
Cybersecurity-Fake News, Amy J. Ramson
Open Educational Resources
This goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.
Cybersecurity-Online Identity Theft, Amy J. Ramson
Cybersecurity-Online Identity Theft, Amy J. Ramson
Open Educational Resources
This is an activity the goals of which are to facilitate team work; critical thinking; presentation skills in the area of cybersecurity and law. Students will be grouped into two teams. As a team, they will choose and analyze cases about online identity theft through the questions presented in the activity. They will present their analysis to the class.
Cybersecurity-The Silk Road Market, Amy J. Ramson
Cybersecurity-The Silk Road Market, Amy J. Ramson
Open Educational Resources
This presentation is about the Silk Road Market, one of the largest cases of illegal drug activity on the dark web, that the federal government has prosecuted. Beyond discussing the case, the presentation adds general facts about the US Department of Justice, the FBI and the DEA, and federal sentencing. The case discussion includes information about: Ross Ulbricht the creator and head of the market; how the Silk Road operated; the involvement of the FBI and DEA; the trial; the fourth amendment violations alleged by the defense; and the sentencing.
Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson
Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson
Open Educational Resources
This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. sate jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.
Cybercrime And Cyber Security Techniques, Amy J. Ramson
Cybercrime And Cyber Security Techniques, Amy J. Ramson
Open Educational Resources
This lecture presents information about cybercrime, which has become the most ubiquitous crime world-wide and affects individuals, companies and government. The lecture indicates that 95% of all cybercrime is preventable and describes a myriad of cyber security techniques that are available to prevent hacking. Legislation to combat cybercrime is presented as well as the places where cybercrime should be reported.