School of Information Studies
Page tree




Course Description

Designed for business, law, and technology students interested in information security as it impacts the management and operations of business and government. Information security policy and best business practices.

Credit(s)

3.0

Professor of Record

Lee McKnight

Audience


Learning Objectives

After taking this course, students will be able to: 

  1. Identify, analyze and evaluate the legal and policy tools available to affect conduct in cyberspace.
  2. Articulate and defend what type of law (Constitutional, statutory, regulatory, international, and common) is best suited for addressing each of several cyber-security challenges (such as protection of critical infrastructure, privacy, data integrity, formulation of new rules, enforcement mechanism, etc.). 
  3. Explain the nature of the internet, information systems, cyberspace vulnerabilities, exploits and incident response techniques and methods and how they both affect and are affected by law and policy. 
  4. Summarize, evaluate and criticize multi-stakeholder governance. 
  5. Evaluate the role of lawyers, courts, and policy makers in cyberspace. 
  6. Name, explain and analyze the Fourth Amendment and various privacy statutes.

  7. Explain, apply, and criticize International Humanitarian Law’s impact in cyberspace. 

  8. Argue in a debate format. 
  9. Collaborate with other students to research facts and law and to formulate arguments for the debate. 
  10. Write two papers, each of which must make a proposal such as a policy, a change in the law, a change in technology or operational practice, or some other recommendation. 
  11. Identify, summarize, examine, and apply the material in the course and gleaned from independent research to construct, appraise and defend the proposals in the two papers. 

Course Syllabus

IST 728/LAW 832 Fall 2020 Syllabus- McKnight, Lee; Perrin, Keli


Other iSchool Courses