Designed for business, law, and technology students interested in information security as it impacts the management and operations of business and government. Information security policy and best business practices.
Professor of Record
After taking this course, students will be able to:
- Identify, analyze and evaluate the legal and policy tools available to affect conduct in cyberspace.
- Articulate and defend what type of law (Constitutional, statutory, regulatory, international, and common) is best suited for addressing each of several cyber-security challenges (such as protection of critical infrastructure, privacy, data integrity, formulation of new rules, enforcement mechanism, etc.).
- Explain the nature of the internet, information systems, cyberspace vulnerabilities, exploits and incident response techniques and methods and how they both affect and are affected by law and policy.
- Summarize, evaluate and criticize multi-stakeholder governance.
- Evaluate the role of lawyers, courts, and policy makers in cyberspace.
Name, explain and analyze the Fourth Amendment and various privacy statutes.
Explain, apply, and criticize International Humanitarian Law’s impact in cyberspace.
- Argue in a debate format.
- Collaborate with other students to research facts and law and to formulate arguments for the debate.
- Write two papers, each of which must make a proposal such as a policy, a change in the law, a change in technology or operational practice, or some other recommendation.
- Identify, summarize, examine, and apply the material in the course and gleaned from independent research to construct, appraise and defend the proposals in the two papers.
IST 728/LAW 832 Fall 2021 Syllabus- McKnight, Lee; Perrin, Keli
Other iSchool Courses